UNDERSTANDING MALWARE AND EVERYTHING ELSE ABOUT IT [PART1] ||SIZ EDUCATION|| CLUB75

in Steem Infinity Zone2 years ago

10% to @steem-infinity-zone.


Screenshot_20220326-121837.pngdesigned in canva

WHAT ARE MALWARES??

Malwares also known as malicious softwares are intrusive and obtrusive softwares and programs created by cybercrimals to steal,damage and destroy files and data in a computer,server or network.

They are rigorously and intentionally implanted into a computer,phone or server inorder to hack and gain access to the data in it.

The malware major function is to instill itself in a system or network and then spread or disseminate as a virus that it is, in a system or network whereby damaging, stealing data and disrupting the entire system.


Screenshot_20220326-110002.pngimage from Istock

The present of malicious software in one's phone or computer can pose a serious threat to the user as the data and Information stored are no longer safe and it can be tampered with at any time.


TYPE OF MALWARE


Malicious software or malware as it is commonly known as,comes in 7 different types.
They come in different form and they operate and perform a bit differently in a system or network that they manage to gain access Into.

Here are the 7 types of malware that exist:

•VIRUS
Screenshot_20220326-112825.pngimage from Istock

This is perhaps the most common kind of malware we are all familiar with as it is a very common malware that is prone to attack our phones and system.

The virus is a sub-division of the malicious software which operate by attaching itself to a file or documents to be downloaded and then execute it's code in the system whereby spreading from one host(phone, computer,system or network) to another once downloaded.

The virus tend to lay dormant,unactivated or inactive in the network or system without posing any threat until it is finally opened.

It begins to spread like a virus that it is and in the end steal and damage data and document in the network or system and sometimes crashing the whole network if not quickly remedied.

•WORM
Screenshot_20220326-110624.pngimage from Istock

Worm is another kind of malicious software with the ability to disrupt and corrupt data in a system or network.
It is typically used by cybercrimals to hijack data from a system or network.

The worm is more destructive and effective than the virus as it spreads really fast and does not require a material medium or an host to spread, unlike the virus that needs host to spread.

It also operate by attaching itself to a network connection like wifi or file to be downloaded and once downloaded it disseminate and replicate itself faster within the system or network whereby damaging and destroying data present in the system and causing loss of files.

•TROJAN VIRUS
Screenshot_20220326-110421.pngimage from Istock

We can call this kind of virus a "diguising" virus.
This Trojan virus disguise as good and helpful software programs of which they and not,but just to deceive a user to click or download it.

Once a user fall prey of it and eventually downloads it,The Trojan virus attach itself to the system.

The Trojan virus is designed to have and gain access Into sensitive data in a system or network and then it starts stealing, blocking or destroying, deleting or even modifying certain data in a system or network.

This virus is very harmful to a system it attach itself to and it is very potent in carrying out it disastrous activities.

Trojan virus cannot and doesn't replicating or multiply itself in a network unlike the worm or virus.
it doesn't spread.

•SPYWARE
Screenshot_20220326-111029.pngimage Istock

Spyware just as it sounds is a kind of malicious software utilize by cybercrimals to spy on data in a system or network secretly without causing any harm to the network or system.

It is a program implanted secretly in a system which in turn spy and gather information secretly and report back to the remote user.

Unlike the worm and virus,it isn't designed to disrupt,delete or damage a system or network.
It primary function is to spy on sensitive data and Information secretly without the original user knowing this and then granting the remote user access to this information.

It is often used by cybercrimals and targeted towards stealing financial and personal information of people.

One common and typical type of this malicious software is the "keylogger".The keylogger monitors and record the keystrokes of a user especially to reveal their passwords and personal information.

•ADWARE
Screenshot_20220326-111406.pngimage from Istock

The Adware is another malicious software that exist today. Although not all malware is harmful or dangerous,some are legit and do not pose any negative threat to the system, but it can also be a medium or channel where viruses and worm can gain access to ones system or network.

The Adware collects data from your system or computer and then provide you always with appropriate advertisment as that is what it is all about,suggesting advertisment to a user and always making advertisment pop up as notification on one's system or computer.

Like I mentioned earlier,the Adware is always not dangerous as the worm or viruses,however,the Adware can redirect ones browser to a site or website that are unsafe and containing Trojan viruses and worm that can disrupt and damage one's computer.

It is also imperative to note that too much of this Adware in a system or computer can cause the system to slow down or even crash it.
This is the more reason a user needs to have a kind of protection program designed to scan this Adware constantly and intelligently.

•RANSOMWARE
Screenshot_20220326-112250.pngimage from Istock

This kind of malicious software is designed to gain access to sensitive information and data in a system or network whereby encrypting the information and data in the system or network hindering the user from having or gain access to the data.

And just like the name,a ransom is demanded from the user to decrypt the data, allowing the user have access to it again.

It is a malware use by cybercrimals to demand ransom from people who fall victim.
It operate by deceiving users to click a disguise link and once they do,it automatically download itself into the user's system,more like a phishing scam.

Once the ransomware finally settles in the system,the cybercriminal then go ahead to lock or encrypt important and sensitive data and Information in the system that can only be decrypted or opened by a mathematical puzzle or key just like in a blockchain where keys are required to perform operations.

The attacker then demands for ransom,once an agreement is made and settled,the data are released back to the original user.

FILELESS MALWARE
Screenshot_20220326-111953.pngimage from Istock

Fileless malware just like the name is another malicious ware used by cybercrimals.
It is relatively hard to detect or remove as it does not make use or rely on file or data to operate but rather on the hard drive making it practically impossible to scan and detect and it doesn't leave any footprint.

It operate by making use of legitimate programs to infect a system or network.

The fileless Ware came into existence in the year 2017 and is known to be very effective and potent in invading and disrupting even most sophisticated security solutions.
Example of this malicious ware are Frodo and the Dark Avengers.


We will be stopping here for today.

This Lesson is very vast and I don't want to bore you all with too much details,so I will be drawing the curtail here today and will make a PART 2 post to continue from where we stopped today.

I hope you all learnt something new today🥰
see you in my next post on SIZ Education here on @steem-infinity-zone.

Thanks for reading 👍

Special thanks:@siz-official
Cc:@faran-nabeel

Sort:  

Hello @dibie, Your post has been supported by @tucsond using @steemcurator07 account.
Thank You for making a post in the #Science/ #Computing/ #Technology category. We appreciate the work you have put into this post.

We have analyzed your post and come up with the following conclusion :

CriteriaRemarks
PlagiarismNone
Quality of InformationGood
Clarity of LanguageGood
#club75Yes
#steemexclusiveYes
Final ConclusionRecommended

Regards,
Team #Sevengers
Follow @steemitblog for all the latest update and keep creating quality contents on Steemit!

 2 years ago 

Good bro happy to see your post in our community please keep following our day wise schedule.

 2 years ago 

Thanks for dropping by bro..no problem,I will make sure to keep that in mind😊

Coin Marketplace

STEEM 0.18
TRX 0.13
JST 0.030
BTC 57962.42
ETH 3050.85
USDT 1.00
SBD 2.25