There are many different types of malware. A virus requires a host system and application in order to function and spread, while a Trojan disguises itself to appear benign. A worm replicates across networks without needing a host. Other malware includes rootkits, logic bombs, ransomware, botnets, adware, spyware, polymorphic viruses, and armored viruses. Backdoors bypass authentication to access systems or networks.
2. Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
PC Hardware
Network Administration
IT Project Management
Network Design
User Training
IT Troubleshooting
Qualifications Summary
Education
M.B.A., IT Management, Western Governor’s University
B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
5. Page 5
Malware can be defined as
any code based (i.e.,
software based) attack that
can be utilized against a
system or network.
In most cases, malware has been specifically designed to
perform a malicious (causing harm) action. As such, it can also
be defined as any software that harms or misuses the system
(which can include just slowing the system down).
This means that a poorly written software package can also fall
into the definition of malware, even if harm was not the intent.
Always thoroughly test any software package before deploying it
in a production setting. This will help to reduce the chances of
introducing unintentional malware into the network.
Types of malware.
7. Page 7
– Virus.
» Malware that has two jobs—to replicate and to activate.
» Requires a host program, a host machine, and user action to
spread.
» Viruses only affect drives (e.g., hard drives and USB drives).
» Often contains a destructive payload.
– Trojan.
» Malware that hides its purpose by disguising itself as
something that the end user desires.
» Used to get the end user to download a virus package.
» This is often the method that is used to establish botnets or
zombie nodes.
– Worm.
» Similar to a virus, but it replicates itself across a network
without user action.
» It doesn’t need a host file in order to operate.
» Worms will replicate themselves across networks, creating
havoc.
Types of malware.
8. Page 8
– Rootkit.
» A software package that gets installed on a system, giving the
attacker privileged access to the system.
• Most often, the attacker attempts to hide the rootkit from the
administrator.
– Logic bomb.
» A virus that, after getting installed on a system, waits for a
specific event to occur before activating its payload (performing
its malicious action).
• The application carrying the logic bomb will function normally
until the trigger event occurs.
• Often, logic bombs are triggered by date and time.
– Ransomware.
» A virus package that takes over an infected system for the
purpose of extorting money from the end user.
• Often, the virus will encrypt all the files and folders on the
infected system—effectively locking out the end user.
Types of malware.
9. Page 9
– Botnet.
» A collection of infected systems (zombie nodes) under the
control of the attacker. The zombies are used to perform other
attacks.
• The zombie controller will often rent out the use of a botnet for
other attackers to use.
– Adware.
» A software package designed to automatically load
advertisements on a system—usually in the form of pop-up
windows.
• The goal is to entice users to purchase something; the result
is usually just annoyance and poor system performance.
– Spyware.
» Malicious code that collects information about the system and
may change some settings.
• May be programed to send the collected information to an
attacker at specific times.
• May be programmed to save the collected information until
the attacker performs another action.
Types of malware.
10. Page 10
– Polymorphic virus.
» A virus package that self-mutates in order to avoid detection by
antivirus applications.
• Allows the virus to avoid signature based malware detection.
– Armored virus.
» A virus package that attempts to harden itself against defensive
actions, making it difficult to be decompiled.
• Antivirus vendors often decompile (take apart) viruses when
developing countermeasures.
– Backdoor access.
» When creating applications, developers often create backdoors
into the programs. Backdoors are a means of accessing an
application or service, while bypassing the normal
authentication process.
• In most cases, the application is listening on a specific port
(e.g., an open port) for a request for access.
» Malware can also be used to open a backdoor into a program,
a computer system, or even a network.
Types of malware.
11. Page 11
Types of malware.
Malware can be defined as any code based attack that can be used against
a system or network. In most cases, the malware is specifically designed to
perform a specific attack. Unfortunately, poorly written software may also
act as malware (unintentionally)—as it may harm a network or system.
Topic
Malware defined.
Summary
There are many different types of malware. A virus requires a host system
and application in order to function. A Trojan is an application that disguises
its true purpose (appears to be something other than what it is). A worm
replicates across a network and doesn’t require a host system or user
interaction. Other types of malware include: rootkits, logic bombs,
ransomware, botnets, adware, spyware, polymorphic viruses, armored
viruses, and backdoors.
Common types of malware.
13. This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.