Post by Chief Admin on Mar 22, 2017 22:55:46 GMT 3
A computer security risk is really anything on your computer that may damage or steal your data, or allow someone else to access your computer, without your knowledge or consent. There are a lot of different things that can create a computer risk, so let's look at a few examples.
Computer Risk Examples
Malware
Malware is a general term used to describe many types of bad software. We commonly think of computer viruses, but, there are several types of bad software that can create a computer security risk.
Viruses
Viruses are malware that are attached to other files in your system and may be used to destroy your data. Viruses have many capabilities, but, unlike Worms, they usually require human interaction to spread from system to system, even if the user is unaware they are spreading it.
Worms
Worms are like viruses, but, they have the ability to spread themselves from computer to computer, all on their own. They know how to attach themselves to portable storage devices like USB drives or removable hard drives, or to move through the network by automatically moving to connected machines.
Ransomware
Ransomware is a relatively new term for malware that, when installed on your system, makes all of your files unreadable, holding your data hostage until you pay the hacker the ransom. Ransomware may be delivered by a virus or by a worm and there is no guarantee that, even if you pay the ransom, you'll get your data restored.
Spyware
Spyware is malware that steals your data and may be used to spy on you by using your webcam or microphone without your knowledge. Once spyware is installed, it may steal your sensitive data by recording the login information you use or looking for sensitive files on your computer, then sending that data back to an attacker. In recent months, hackers have been able to access the webcam and microphone of computers and use pictures, video, or audio recordings to blackmail their victims.
Trojan Horses
Trojan Horses are a special kind of virus. Like the famed wooden horse used by the Greeks to infiltrate the walled city of Troy, Trojan Horse viruses are used to deliver other types of malware by hiding them inside programs or files that look legitimate.
Computer Risk Examples
Malware
Malware is a general term used to describe many types of bad software. We commonly think of computer viruses, but, there are several types of bad software that can create a computer security risk.
Viruses
Viruses are malware that are attached to other files in your system and may be used to destroy your data. Viruses have many capabilities, but, unlike Worms, they usually require human interaction to spread from system to system, even if the user is unaware they are spreading it.
Worms
Worms are like viruses, but, they have the ability to spread themselves from computer to computer, all on their own. They know how to attach themselves to portable storage devices like USB drives or removable hard drives, or to move through the network by automatically moving to connected machines.
Ransomware
Ransomware is a relatively new term for malware that, when installed on your system, makes all of your files unreadable, holding your data hostage until you pay the hacker the ransom. Ransomware may be delivered by a virus or by a worm and there is no guarantee that, even if you pay the ransom, you'll get your data restored.
Spyware
Spyware is malware that steals your data and may be used to spy on you by using your webcam or microphone without your knowledge. Once spyware is installed, it may steal your sensitive data by recording the login information you use or looking for sensitive files on your computer, then sending that data back to an attacker. In recent months, hackers have been able to access the webcam and microphone of computers and use pictures, video, or audio recordings to blackmail their victims.
Trojan Horses
Trojan Horses are a special kind of virus. Like the famed wooden horse used by the Greeks to infiltrate the walled city of Troy, Trojan Horse viruses are used to deliver other types of malware by hiding them inside programs or files that look legitimate.