Malware (malicious software) is a type of program that combines malicious code with genuine application to perform unauthorized operations in such a way that it can take control of a system or cause damage.
A trojan is a malicious program, bound with a harmless application program or data in such a way that it can help an attacker gain control and cause damage to the targeted machine. Malware tries to steal victims’ confidential information and sends it back to the attacker.
VIRUS stands for Vital Information Resource Under Seize. The virus can self-replicate by producing a copy of itself and attaching it to another program, computer boot sector, or a document.
Batch file programming can be used to automate several jobs in the windows operating system, which means the repetitive tasks can be written in a file by the administrators to simplify the job just by running the file instead of executing the command separately.
Shell scripting performs a similar job in a Linux environment to automate the execution of simple commands. Hackers take advantage of batch or shell scripting knowledge to create dangerous viruses which can destroy data on a victim machine or can consume all the PC resources to make the PC either crash or slow down.
Worms are malicious programs that replicate and spread across the network connections independently without human restrictions to infect computers
A rootkit is a malicious program that has the ability to hide its presence from the user (victim) and perform malicious activities to grant full access of the infected computer to the attacker.
Spyware is a program that records user interaction with the computer, without their knowledge and sends them to the remote attackers over the internet. Spyware hides its process, files, and other objects to avoid detection and removal.
Ransomware is malware that can restrict access to computer system files and folders and demands an online ransom payment to the malware creator to remove the restrictions.
Adware is designed to display unwanted advertisements on the browser which redirects users’ search requests to malicious web pages that forces them to download malware onto their computers. Adware can also be used to collect users’ search habits.
A backdoor is a piece of code executed on a victim’s computer system by an attacker to bypass standard authentication and maintain secure unauthorized access to the remote desktop.