Ais FT Rev
Ais FT Rev
2. Malware Actions
a. Adware. Adware is not malicious; however, it breaches users' privacy. It usually displays ads
on anyone's computer desktop or in any individual program. It is normally associated with free
software. For example, an attacker of the system can embed malicious code in any of your
software and adware can only monitor your system's activities and compromise your system.
b. Spyware. True to its name, a spyware works just like a spy by monitoring a user's computer
activities and gathering information that might be of interest to a third party. A common spyware
is the keylogger. A keylogger records timestamped keystrokes of a user and takes important
personal information such as usernames, pins and passwords, credit card information, and so on.
c. Ransomware. A ransomware has the ability to encrypt files and lock a computer, rendering
them inaccessible. Information on the screen is then shown to make the user aware of the cost it
would take to unlock the computer.
d. Rootkits. A rootkit is devised to give a hacker administrative control in a computer's system.
This gives him/her the power to perform whatever task on the system.
e. Scareware. A scareware disguises itself as a tool that will help fix a computer system, that if
activated, infects and completely damages a system. It notifies a user to pay the hackers to fix the
system.
f. Zombies. A zombie works just like a spyware; however, it does not necessarily spy on the
user's activity. Instead, it stays put until commanded by the hacker.