Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views11 pages

CPT Notes

The document explains various types of malware, including Trojans, backdoors, rootkits, ransomware, adware, viruses, worms, spyware, botnets, and crypters. Each type is described with an analogy to illustrate its function and impact on devices and users. Overall, it highlights the harmful nature of these malicious software and their methods of operation.

Uploaded by

youremail000000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views11 pages

CPT Notes

The document explains various types of malware, including Trojans, backdoors, rootkits, ransomware, adware, viruses, worms, spyware, botnets, and crypters. Each type is described with an analogy to illustrate its function and impact on devices and users. Overall, it highlights the harmful nature of these malicious software and their methods of operation.

Uploaded by

youremail000000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Malware Attack

Malware stands for Malicious Software. It refers to any software designed to harm or
exploit devices, data, or users.
Trojans
A Trojan horse is a type of malware that pretends to be a useful program (like
a game or tool), but secretly does harmful things like stealing your data or
letting hackers into your system.

Think of it like a fake gift hiding something bad inside.


Backdoors
Backdoors allow attackers to secretly enter a system without being noticed.
It's like a hidden door that skips the password.

Imagine someone sneaking into your house through a secret door only they
know about.
Rootkits
Rootkits hide other malware on your computer and make it very hard to detect or
remove. They give hackers deep control over your system.

It’s like a thief who not only hides in your house but also disables your security
cameras.
Ransomware
Ransomware locks your files or computer and demands money (a ransom) to
unlock them.

Like someone locking your notebook and asking for money to return the key.
Adware
Adware shows unwanted advertisements, often slowing down your device.
It can also track your online activity.

Like someone who keeps showing you pop-up ads every time you open your
computer.
Viruses
A virus attaches itself to files or programs and spreads when those files are
shared. It can damage data or slow down the computer.

Just like a flu virus spreads and makes people sick, a computer virus spreads
and harms systems.
Worms
Worms are like viruses but can spread on their own—without needing to
attach to files.

Like a worm crawling from one apple to another, spreading damage by itself.
Spyware
Spyware secretly watches what you do and sends information (like passwords)
to hackers.

Like someone secretly reading your private diary or watching your screen.
Botnets
Botnets are a group of infected computers controlled by hackers, used to do
big attacks (like DDoS) without users knowing.

Like remote-controlled robots used for crime without the owner knowing.
Crypters
Crypters are tools used to hide malware from antivirus software. They make
malware invisible.

Like wrapping a dangerous object in a package so scanners can’t see what’s


inside.

You might also like