Professional Documents
Culture Documents
IT App Tools 15
IT App Tools 15
IT App Tools 15
and Safety
IT Application Tools
Learning Objectives:
Viruses Worms
This malware can produce Like viruses, worms can
copies of itself. It can be produce copies of
embedded within files and themselves. They can also
programs. spread out and infect other
computers connected to the
network.
Viruses can corrupt or destroy
programs and data.
Malware
Trojans Ransomware
Trojan horses or trojans are A ransomware locks a rightful
programs that are disguised to user from using his/her device
appear harmless. or its files.
They can act as carriers for other The attacker or malicious actor
malware. would then require the victim to
pay a ransom to unlock or
remove the ransomware.
Malware
Spyware Rootkits
Spyware are used to gather data, Rootkits are designed to provide the
often personal or confidential in attacker privileged access to a
nature, without the consent or computer system. This grants them
knowledge of the user. full control of the system.
Keyloggers Adware
Keyloggers are used to log or record Such program is used to show
the keystrokes (buttons pressed) of advertisements that entice the user
a target, without his/her consent or to visit harmful or compromised
knowledge. websites.