Professional Documents
Culture Documents
IT Tutorial 2 Part 1
IT Tutorial 2 Part 1
Tutorial 2 Part 1
a) Virus: A computer virus is a malicious software program that infects and spreads from one
computer to another by attaching itself to a legitimate program or document. Once activated,
viruses can damage or corrupt files, steal personal information, and cause other harmful
effects on a computer system.
b) Worm: A computer worm is a type of malware that spreads over a network by exploiting
security vulnerabilities or by using social engineering techniques to trick users into executing
the worm. Unlike viruses, worms can spread and replicate without the need for a host
program, making them more dangerous and difficult to control.
c) Trojan horses: A Trojan horse is a type of malware that disguises itself as a legitimate
program or file, often tricking users into downloading and installing it. Once installed, the
Trojan horse can perform a variety of malicious actions, such as stealing data, damaging files,
or allowing unauthorized access to the infected computer system.
d) Rootkits: A rootkit is a type of malware that allows unauthorized users to gain access to a
computer system and control it without being detected by antivirus software or other security
measures. Rootkits can hide their presence on a system by modifying system files, processes,
and drivers.
e) Backdoor: A backdoor is a hidden entry point in a computer system that allows an attacker
to bypass normal authentication procedures and gain unauthorized access. Backdoors can be
installed by attackers using various techniques, such as exploiting vulnerabilities or using
social engineering tactics to trick users into granting access. Once a backdoor is installed, it
can be used to remotely control a system, steal data, or perform other malicious actions.
1. Phishing: Attackers may send fake emails, messages, or pop-ups that look like
they are from legitimate sources, such as banks or other trusted organizations,
in an attempt to trick the user into providing sensitive information, such as
passwords, account numbers, or other personal details.
2. Malware: Attackers may use malicious software, such as viruses, worms,
Trojans, or spyware, to infect the user's device or system and steal sensitive
data, such as login credentials, credit card numbers, or other personal
information.
3. Social engineering: Attackers may use social engineering tactics, such as
pretexting, baiting, or quid pro quo, to manipulate or deceive users into giving
up sensitive information.
4. Physical access: Attackers may gain physical access to a device or system, such
as a computer or smartphone, and extract data directly from the device or
through peripheral devices, such as USB drives or external hard drives.
5. Network sniffing: Attackers may use network sniffing tools to intercept and
capture data packets as they travel over the network, allowing them to steal
sensitive information, such as passwords or other personal data.
To protect against data theft, users can take various measures, such as using strong
passwords, keeping their software and operating systems up to date with the latest
security patches, avoiding suspicious emails or links, using encryption to protect
sensitive data, and limiting physical access to their devices or systems.
It's worth noting that some malware, such as rootkits, may be difficult to detect and
remove, and may require specialized tools and techniques to eliminate. Additionally,
prevention is often the best defense against malware infections, so it's important to
use a combination of antivirus software, software updates, strong passwords, and
safe browsing practices to reduce the risk of malware infections in the first place.