SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Computer Virus
The First Computer Virus
 Elk Cloner is one of the first known microcomputer
viruses that spread "in the wild," i.e., outside the
computer system or lab in which it was written.
 It was written around 1982 by a 15-year-old high
school student named Rich Skrenta for Apple II
systems.
Types of viruses
Boot viruses
Program viruses
Multipartite viruses
Stealth viruses
Polymorphic viruses
Macro Viruses
 Infect floppy disk boot records or master boot
records in hard disks.
 They replace the boot record program copying it
elsewhere on the disk or overwriting it.
 Boot viruses load into memory if the computer
tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus
 infect executable program files, such as those
with extensions like
.BIN, .COM, .EXE, .OVL, .DRV (driver) and
.SYS (device driver).
 These programs are loaded in memory during
execution, taking the virus with them.
 The virus becomes active in memory, making
copies of itself and infecting files on disk.
Examples: Sunday, Cascade
 A hybrid of Boot and Program viruses
 They infect program files and when the
infected program is executed, these viruses
infect the boot record.
 When you boot the computer next time the
virus from the boot record loads in memory
and then starts infecting other program files
on disk.
Examples: Invader, Flip, andTequila
 These viruses use certain techniques to avoid
detection
 They may either redirect the disk head to
read another sector instead of the one in
which they reside or they may alter the
reading of the infected file’s size shown in the
directory listing.
Examples: Frodo, Joshi,Whale
 A virus that can encrypt its code in different
ways so that it appears differently in each
infection.
 These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil,
Proud,Virus 101
 A macro virus is a new type of computer virus
that infects the macros within a document or
template.
 When you open a word processing or
spreadsheet document, the macro virus is
activated and it infects the Normal template
(Normal.dot)-a general purpose file that
stores default document formatting settings.
 Every document you open refers to the
Normal template, and hence gets infected
with the macro virus.
 Since this virus attaches itself to
documents, the infection can spread if such
documents are opened on other computers.
Examples: DMV, Nuclear,Word Concept.
 Adware or advertising-supported software
is any software package which automatically
plays, displays, or downloads advertisements
to a computer after the software is installed
on it or while the application is being used.
Some types of adware are also spyware and
can be classified as privacy-invasive software.
 Malware, short for malicious software, is
software designed to infiltrate a computer
without the owner's informed consent. The
expression is a general term used by
computer professionals to mean a variety of
forms of hostile, intrusive, or annoying
software or program code. The term
"computer virus" is sometimes used as a
catch-all phrase to include all types of
malware, including true viruses.
 Once a malicious program is installed on a system, it is
essential that it stay concealed, to avoid detection and
disinfection.The same is true when a human attacker
breaks into a computer directly.Techniques known as
rootkits allow this concealment, by modifying the host
operating system so that the malware is hidden from the
user. Rootkits can prevent a malicious process from being
visible in the system's list of processes, or keep its files
from being read. Originally, a rootkit was a set of tools
installed by a human attacker on a Unix system where the
attacker had gained administrator (root) access.
Today, the term is used more generally for concealment
routines in a malicious program.
 A backdoor is a method of bypassing normal
authentication procedures.Once a system has
been compromised one or more backdoors may
be installed in order to allow easier access in the
future. Backdoors may also be installed prior to
malicious software, to allow attackers entry
 Crackers typically use backdoors to secure
remote access to a computer, while attempting
to remain hidden from casual inspection.
 Spam is the abuse of electronic messaging systems
(including most broadcast media, digital delivery
systems) to send unsolicited bulk messages
indiscriminately. While the most widely recognized
form of spam is e-mail spam
 E-mail spam, known as unsolicited bulk Email (UBE),
junk mail, or unsolicited commercial email (UCE), is
the practice of sending unwanted e-mail messages,
frequently with commercial content, in large
quantities to an indiscriminate set of recipients.
 Spyware is a type of malware that is installed on
computers and that collects information about
users without their knowledge. The presence of
spyware is typically hidden from the user.
Typically, spyware is secretly installed on the
user's personal computer.
Sometimes, however, spywares such as
keyloggers are installed by the owner of a
shared, corporate, or public computer on purpose
in order to secretly monitor other users.
 Wikipedia
Thank
s

Weitere ähnliche Inhalte

Was ist angesagt?

Computer virus
Computer virusComputer virus
Computer virusarif srk
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securityAlireza Ghahrood
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 

Was ist angesagt? (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Ppt123
Ppt123Ppt123
Ppt123
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 

Ähnlich wie Computer virus (20)

W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus
VirusVirus
Virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 

Mehr von Ambadi S - HR Professional (9)

HR Dictionary
HR DictionaryHR Dictionary
HR Dictionary
 
Recruitment plan
Recruitment planRecruitment plan
Recruitment plan
 
Psychology of Learning
Psychology of LearningPsychology of Learning
Psychology of Learning
 
Organisation Study - Indian Rare Earths Limited
Organisation Study - Indian Rare Earths LimitedOrganisation Study - Indian Rare Earths Limited
Organisation Study - Indian Rare Earths Limited
 
Mis
MisMis
Mis
 
Hrm wages
Hrm  wagesHrm  wages
Hrm wages
 
Comic Presentation
Comic PresentationComic Presentation
Comic Presentation
 
Consumer Protection Act 1986
Consumer Protection Act 1986Consumer Protection Act 1986
Consumer Protection Act 1986
 
Constitution of india
Constitution of indiaConstitution of india
Constitution of india
 

Kürzlich hochgeladen

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Kürzlich hochgeladen (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Computer virus

  • 2.
  • 3. The First Computer Virus  Elk Cloner is one of the first known microcomputer viruses that spread "in the wild," i.e., outside the computer system or lab in which it was written.  It was written around 1982 by a 15-year-old high school student named Rich Skrenta for Apple II systems.
  • 4. Types of viruses Boot viruses Program viruses Multipartite viruses Stealth viruses Polymorphic viruses Macro Viruses
  • 5.  Infect floppy disk boot records or master boot records in hard disks.  They replace the boot record program copying it elsewhere on the disk or overwriting it.  Boot viruses load into memory if the computer tries to read the disk while it is booting. Examples: Form, Disk Killer, Michelangelo, and Stone virus
  • 6.  infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver).  These programs are loaded in memory during execution, taking the virus with them.  The virus becomes active in memory, making copies of itself and infecting files on disk. Examples: Sunday, Cascade
  • 7.  A hybrid of Boot and Program viruses  They infect program files and when the infected program is executed, these viruses infect the boot record.  When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk. Examples: Invader, Flip, andTequila
  • 8.  These viruses use certain techniques to avoid detection  They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. Examples: Frodo, Joshi,Whale
  • 9.  A virus that can encrypt its code in different ways so that it appears differently in each infection.  These viruses are more difficult to detect. Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101 Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud,Virus 101
  • 10.  A macro virus is a new type of computer virus that infects the macros within a document or template.  When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings.
  • 11.  Every document you open refers to the Normal template, and hence gets infected with the macro virus.  Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers. Examples: DMV, Nuclear,Word Concept.
  • 12.
  • 13.  Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.
  • 14.  Malware, short for malicious software, is software designed to infiltrate a computer without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
  • 15.  Once a malicious program is installed on a system, it is essential that it stay concealed, to avoid detection and disinfection.The same is true when a human attacker breaks into a computer directly.Techniques known as rootkits allow this concealment, by modifying the host operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker had gained administrator (root) access. Today, the term is used more generally for concealment routines in a malicious program.
  • 16.  A backdoor is a method of bypassing normal authentication procedures.Once a system has been compromised one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry  Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection.
  • 17.  Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam  E-mail spam, known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
  • 18.  Spyware is a type of malware that is installed on computers and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.