• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Menu
  • About
  • Must Read
      • IIS Performance Boost
      • RFID Security
      • Web App Security Testing
      • How to Secure Home Network
      • Prevent Cross-Site Scripting Attacks
      • Renew Self-Signed Certificates
      • Penetration Testing Tools
      • VPN Concentrator
      • Forensic Investigation Tools
      • Digital Certificates
      • Cloud Security Issues
      • Advanced Evasion Prevention
      • Firewall Types
      • Tips to Prevent Data Exfiltration
      • Classified Info Handling
      • MySQL Security
      • Definition of 7 Types of Malware
      • VOIP Security
      • Why Antivirus Software Fails
      • 15 Network Security Vulnerabilities
      • Web App Security
      • IT Security Standards
      • Types of Virtualization
      • Android Security
      • Digital Signature
      • Advanced Malware Protection
    • Close
  • Consultancy
  • Contact

Definition of 7 Types of Malware

by wing

Though malware may take many forms, they have only one purpose to -disturb your computing environment. We can broadly classify malware depending on how the replicate and function. Remember that any codes that have evil intentions can be called a malware. That is why a virus, worm or even a backdoor program can be considered as a malware. But there is a distinct difference between a malware and an exploit that we will discuss in another post.

  1. Virus– it can replicate itself and can attach to another program. The program to which the virus attaches itself is known as host. And viruses get activated when a user interact with the host program. Normally, a virus cannot update themselves with newer versions released by its creators.
  2. Worm- you must have heard of Code read, Storm, Blaster or SQL Slammer-all of them is worms. Worms are also self-replicating codes like viruses. The main differnce between viruses and worms is that the later one can self-replicate and propagate without human interaction; some worms can even update its codes. Worms target systems and applications that have well-known vulnerabilities.

7 types of malware

  1. Backdoor-A backdoor is a program that has the ability to bypass a system’s security control, allowing an attacker to access the system stealthily. Backdoors are usually installed by the attackers or by a malware program. Whenever you suspect that you system is compromised you may look for backdoor program because attackers installed this sort of program in a compromised system so as they can access the system remotely.
  1. Trojan Horse– as the name suggest, the purpose of a Trojan horse is to make a malicious program appear like a legitimate program. Trojan can monitor users’ action, steal users’ data and can open backdoor for the attackers. When you download a well-known open source program from a download site you need to be aware that that piece of software may have a Trojan version as well. For example, tcpdump has a Trojan version as well. So whenever you download tcpdump, make sure you download it from an authentic site.
  1. User-level Rootkit-This type of malicious code can modify operating systems’ components used by the users. The purpose of user-level rootkit is to give attacker access to the system with administrative or root level privilege. It can successfully hide its presence by modifying the user level component of the OS. Though it can successfully hide its presence from the process lists, it cannot modify the root of the OS.
  1. Kernel-level Rootkit–It can modify the operating system’s kernel and can intercept system calls while remaining hidden to the users. Kernel-level rootkits are so difficult to detect the even the tools used by investigators cannot detects its presence.
  1. Blended Malware–Lion and bugbear are great examples of blended malware. This type of malware has the characteristics of several types of malware discussed above. A blended malware can be installed as a Trojan and then it can spread like worms or viruses and open backdoors for the attackers in the victim’s machine.

Related Posts:

  • Top 12 Effective Ransomware Protection Tips
  • How to Remove Annoying Facebook Virus
  • How to Protect Network Against Advanced Malware

Filed Under: Internet Security and Safety Tagged With: malware, virus

Primary Sidebar

CISSP Sample Test

Take a CISSP Sample Test

CISA IT governance Sample test



Twitter Follow @securitywing

Categories

  • AWS
  • containers
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Network Security Tips
  • Off Track
  • Telecom
  • Tutorial

Pages

  • About
  • Best IT Security Certification Exam
  • CISA IT governance Sample test
  • CISA Sample Test
  • CISSP Sample Test Online
  • Consultancy
  • Contact

Popular Posts

  • 8 Effective Ways to Impro...
  • Yahoo Mail Security Setti...
  • 3 Steps to Install Miniku...
  • How to Setup AWS CloudFro...
  • 3 Simple Steps to Capture...
  • 5 Steps to Setup a Nexus3...
  • How to Configure AAA (TAC...
  • How to Install AWS CLI an...
  • How to Configure SNMP in...
  • How to Renew Self-Signed...

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

antivirus audit AWS backup browser check cisco cloud computer cyber data database encryption firewall home hsrp ids informaiton internet intrusion it kubernetes linux load balancing malware network protection putty risk router security security tips server ssh SSL switch tools virus vpn vulnerability web webserver website windows wordpress

Copyright © 2010-2023 ·All Rights Reserved · SecurityWing.com