The document lists and describes common types of malware including viruses, worms, Trojan horses, backdoors, exploits, downloaders, auto-rooters, virus kits, spammers, flooders, keyloggers, rootkits, and zombies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
58 views1 page
Terminology of Malicious Programs
The document lists and describes common types of malware including viruses, worms, Trojan horses, backdoors, exploits, downloaders, auto-rooters, virus kits, spammers, flooders, keyloggers, rootkits, and zombies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Name Description
Virus Attaches itself to a program and propagates copies of itself to other
programs Worm Program that propagates copies of itself to other computers Logic bomb Triggers action when condition occurs Trojan horse Program that contains unexpected additional functionality Backdoor Program modification that allows unauthorized access to functionality (trapdoor) Exploits Code specific to a single vulnerability or set of vulnerabilities Downloaders Program that installs other items on a machine that is under attack. Usually, a downloader is sent in an e-mail. Auto-rooter Malicious hacker tools used to break into new machines remotely Kit (virus Set of tools for generating new viruses automatically generator) Spammer Used to send large volumes of unwanted e-mail programs Flooders Used to attack networked computer systems with a large volume of traffic to carry out a denial of service (DoS) attack Keyloggers Captures keystrokes on a compromised system Rootkit Set of hacker tools used after attacker has broken into a computer system and gained root-level access Zombie Program activated on an infected machine that is activated to launch attacks on other machines