Cybersecurity
Cybersecurity
1.VIRUS
2.HACKER
3.MALWARE
4.TROJAN HORSES
5.PASSWORD CRACKING
VIRUSES
A computer program that can copy itself and infect a
computer without permission or knowledge of the user. A virus
might corrupt or delete data on a computer, use e-mail programs
to spread itself to other computers, or even erase everything on a
hard disk.
❑ SOLUTION:
Install a security suite that protects the computer against
threats such as viruses.
Example of Anti-virus
HACKER
softWARE.”
permission.
MALWARE
To Stop Malware
❑ Maintain backup.
Trojan, is a type of malicious code or software that can take control of your
computer. It is designed to damage, disrupt, steal, or in general inflict some other
harmful action on your data or network. Once installed, a Trojan can perform the
action it was designed for.
❑ Example of Trojan Horse:
Zeus/Zbot: The Zeus (Zbot) trojan is malware software that targets Microsoft
Windows-based devices. It infiltrates devices by generating a trojan horse, which
appears to your system as a legitimate file but is malware that can grant third-
party access to your system.
❑ How To Avoid Trojans