Malware
Malware → Malicious software designed to damage, disrupt, or gain unauthorized access to systems; different types often work together. Prevented using updated antivirus, patched operating systems, strong access controls, user training, and good backups.
Viruses
Viruses → Malware that attaches to legitimate files or programs and spreads when the infected file is executed by the user.
Worms
Worms → Self-replicating malware that spreads automatically across networks without user interaction, making them more dangerous than viruses.
Ransomware
Ransomware → Malware that encrypts data and demands payment (a ransom) for the decryption key, often spreading through phishing or exploited vulnerabilities.
Trojan Horse
Trojan Horse → Malware disguised as legitimate software; once installed, it provides unauthorized access, downloads more malware, or steals data.
Rootkit
Rootkit → Malware that hides itself deep inside the operating system to avoid detection, often modifying system files or drivers.
Keylogger
Keylogger → Malware that records keystrokes to capture sensitive information such as passwords, messages, or credit card numbers.
Adware
Adware → Software that displays unwanted advertisements or tracks browsing behavior, sometimes bundled with other applications.
Spyware
Spyware → Malware that secretly collects information about a user’s activities, browsing, or files, and sends it to an attacker.
Bloatware
Bloatware → Unwanted or unnecessary preinstalled software that consumes system resources and may pose security risks.
Logic Bombs
Logic Bombs → Malicious code hidden inside legitimate programs that activates when specific conditions are met, such as a date or a user action.