From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Comparing viruses, worms, and trojans

Comparing viruses, worms, and trojans

- One of the gravest threats to computer security is the scourge of malware. Short for malicious software, malware objects infect computer systems and then perform some type of evil action, possibly stealing information, damaging data, or otherwise disrupting normal use of the system. Every piece of malware that you encounter will have two components, a propagation mechanism, and a payload. The propagation mechanism is how the malware spreads from one system to another. Propagation mechanisms vary between malware types. In just a minute, we'll talk about three different types of malware objects and how they spread. The payload is the malicious action that the malware performs. Any type of malware object can carry any type of payload. For example, a malware payload might search your hard drive for credit card statements and tax returns, or encrypt data and make it unavailable until you pay a ransom. Or monitor your…

Contents