What Are Examples Of Malicious Code?
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
1. Viruses: malicious software that self–replicates and spreads by attaching itself to other programs or files.
2. Trojan Horses: malicious software that masquerades as a legitimate program, such as a game or music player, but actually contains hidden malicious code.
3. Worms: malicious software designed to spread from computer to computer, consuming system resources and potentially causing computer crashes or network outages.
4. Spyware: malicious software designed to record or monitor user activity.
5. Ransomware: malicious software that encrypts important data and demands money in order to decrypt it.
6. Logic Bombs: malicious software that is triggered when certain conditions are met, such as a user reaching a specific date or accessing a particular file.
1. Viruses: A virus is a malicious code or program that can replicate itself and spread from one computer to another, often without the user’s knowledge or consent.
2. Worms: A worm is a malicious program that uses computer networks and security loopholes to replicate itself. Unlike a virus, it does not need to attach itself to a host file or program.
3. Trojan Horses: A Trojan horse is a type of malicious code that appears to be legitimate software but is actually a malicious program that can damage or gain access to a user’s system.
4. Logic Bombs: A logic bomb is a piece of malicious code designed to cause damage to a system when certain conditions are met.
5. Backdoors: A backdoor is a piece of malicious code that allows attackers to gain access to a computer system.
6. Rootkits: A rootkit is a type of malicious code that allows attackers to gain administrator-level access to a computer system.
7. Spyware: Spyware is a type of malicious code that is designed to spy on a user’s activities, often by logging keystrokes or collecting other sensitive information.