SlideShare a Scribd company logo
1 of 8
Download to read offline
1. DIFFERENCE BETWEEN SPYWARE AND MALWARE
2. DIFFERENCE BETWEEN VIRUS AND SPYWARE
3. DIFFERENCE BETWEEN WORM AND VIRUS
4. DIFFERENCE BETWEEN ADWARE AND SPYWARE
5. DIFFERENCE BETWEEN VIRUS, WORMS, LOGIC BOMBS AND TROJAN HORSES
6. DIFFERENCE BETWEEN LEGITIMATE WEBSITE AND PHISHING SCAM
7. DIFFERENCE BETWEEN SCAM, PHISHING AND RIP OFF
8. DIFFERENCE BETWEEN PHISHING, HACKING AND CRACKING
9. 4 TYPES OF VIRUSES




                                                       COMPILED BY
                                                       A.UMAR ALI
1. DIFFERENCE BETWEEN SPYWARE AND MALWARE                      GO TO INDEX

   1. Malware covers a lot of different software; Spyware is just one of them.

   2. Spyware often doesn’t cause major damage but other malware can.

   3. While other malware can impair the function of your computer, spyware can
      extract personal information like credit card numbers.

   4. Spyware takes up processing power and a part of the bandwidth of your internet
      connection.


REFERENCE

http://www.differencebetween.net/technology/difference-between-spyware-and-
malware/



 2. DIFFERENCE BETWEEN VIRUS AND SPYWARE                    GO TO INDEX

  1. Viruses started rather innocently a long time ago but eventually evolved into a
     harmful digital entity while spyware is more recent and created purely for malicious
     reasons.

  2. Viruses ultimately destroy computer systems (software and hardware). Spyware is
     not gravely destructive in terms of computer damage but the unwanted
     applications it installs can be an annoyance.

  3. A virus is a general term which has a distinctive characteristic of replicating and
    modifying files. It also comes in many types like worms and trojans. Spyware, on
    the other hand is specific. It can qualify as a virus since some can also replicate
    files.

   4.Viruses aim to disrupt human to computer interactivity while spyware stealthily
     monitor computer activity.

REFERENCE

 http://www.differencebetween.net/technology/difference-between-virus-and-
spyware/
3. DIFFERENCE BETWEEN WORM AND VIRUS                  GO TO INDEX

1. Virus needs hosts while worms do not.

2. Worms can spread quicker than virus because it does not need human action to
   replicate.

3. Worms often disguise themselves as DLLs or system files to avoid detection.

4. For both, the payload carries code that does the real damage.

REFERENCE

http://www.differencebetween.net/technology/difference-between-worm-and-virus/




4. DIFFERENCE BETWEEN ADWARE AND SPYWARE                     GO TO INDEX

ADWARE

1. Adware are software applications that are designed to allow a number of pop up
   advertisements straight to the personal computers of potential customers and clients.

2. These advertisements allow Internet browsers to download certain programs free of
   charge since these pop up advertisements contribute to the payment of the use of
   these programs.

3. These are currently seen in trial programs which offer the potential customer the
   ability to evaluate and make his or her decision on whether to purchase the license or
   not.

4. For as long as the customer does not purchase the program and is still within the trial
   period, the adware application will generate a variety of relevant advertisements to
   provide free usage of the said program without compromising the amount of profit
   generated by the company that developed the program.

5. Once the customer purchases the program over the Internet, the adware software
   application is then disabled by the computer program and the user can now be
   able to utilize the computer program without the advertisements.
SPYWARE

1. On the other hand, spyware software applications are programs that are embedded
   to certain websites in order to track the purchasing habits of existing customers.

2. The name spyware comes from the fact that the users are not aware of these
   applications.

3. While they are surfing through the website and make a purchase, the spyware
   gathers the purchase information and stores it in a database to allow the company to
   keep track of the types of the products and services that a particular client avails
   and the frequency of the purchases made.

4. With the help of these applications, companies are then able to generate a number of
   Internet marketing strategies to directly market future products and services to these
   customers to further increase the amount of the profit that they generate.

REFERENCE

http://www.differencebetween.net/technology/difference-between-adware-and-spyware/
5. DIFFERENCE BETWEEN VIRUS, WORMS, LOGIC BOMBS AND TROJAN HORSES GO TO INDEX



Virus

1. A program that replicates by attaching itself to other programs.

2. The infected program must be executed for a virus to run.

3. Most of the time a system file or a program that you use occasionally.

Worm

1. Program that copies itself throughout a network or the internet without a host program.

2. Creates problems by overloading the network as it replicates.

3. Damaging just by their presence.

4. Overloads memory or hard drive space by replicating repeatedly.

Logic Bomb

1. Dormant code added to software and triggered at a predetermined time or by a

  predetermined event.

Trojan horse

1. Does not need a host program to work; rather, it substitutes itself for a legitimate program.

2. Likely to introduce one or more Viruses into your system.

3. Sometimes called downloaders.

REFERENCE

http://wiki.answers.com/Q/Define_and_explain_the_difference_between_virus_worms_logic_bo
mbs_and_trogen_horses
6. DIFFERENCE BETWEEN LEGITIMATE WEBSITE AND PHISHING SCAM                             GO TO INDEX

1. Phishing scams are typically propagated through emails.

2. The crooks send out emails looking like official emails from banks or other financial

  institutions.

3. They insist that you must click on a link and enter personal information or something dire will

  happen, but the link actually takes you to a fake website that looks like the real thing.

4. There are lots of websites and blogs talking about phishing.

5. Here is one that really nets it out:

  http://keynotesupport.blogspot.com/2009/09/urgent-how-to-avoid-phishing-scams-on.html

6. Also, when surfing the web, you should install a free program like McAfee's SiteAdvisor that

  will display warning symbols next to websites that may not be safe to visit. You can download

  free code from the McAfee website at:

  http://www.siteadvisor.com/


7. Remember, if it looks too good to be true, it definitely is! Don't fall for emails or websites that

  claim you have won a prize. And never click on a link in an email.



REFERENCE

http://wiki.answers.com/Q/How_can_you_tell_the_difference_between_a_legitimate_website_a
nd_a_phishing_scam
7. DIFFERENCE BETWEEN SCAM, PHISHING AND RIP OFF                    GO TO INDEX

 A scam is a deliberate attempt to defraud you.

 Phishing is trying to obtain your data to steal your identity and/or credit.

 A rip off is where you are getting something, just not as good a quality, or for as good a price,
 as most people would feel appropriate.

REFERENCE

http://wiki.answers.com/Q/What_is_the_difference_between_a_scam_and_phishing_and_a_rip
_off



8. DIFFERENCE BETWEEN PHISHING, HACKING AND CRACKING                        GO TO INDEX

Phishing is trying to get some ones username, password, credit card info, Social, or other
personal information by means of a fraudulent message, email, instant message.

Hacking is referred to as getting into another system or computer and copying, modifying, or
just looking a data on that host PC.

Cracking is actually changing code, or modifying a program to function beyond its limits, delete
registration, or any other modification of that program.

REFERENCE

http://wiki.answers.com/Q/What_is_the_difference_between_phishing_and_hackingcracking



9. 4 TYPES OF VIRUSES        GO TO INDEX

There are a lot more than 4 types but these are some of the most common.

1. Worms: A virus that copies itself throughout your computer without you knowing and eats

           through stored data on your computer.


2. Smart Bomb: A multiple type of a virus that waits until activated or a set date to run.


3. Batch: Most common, simple "virus". Though not many real hackers consider it a virus but it

          is a common thing on the internet... It can be used for malicious intent and delete files.
          They come in the .bat extention.
4. Trojan: One of the most common viruses normally installs with another program you

          downloaded. It’s binded, with it. Makes your computer accessible to RATS (Remote

          admin Tools) that allows others to connect to your computer. Or allows you to

          become a part of a botnet.

REFERENCE

http://wiki.answers.com/Q/4_types_of_viruses

More Related Content

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Internet threats in a nutshell

  • 1. 1. DIFFERENCE BETWEEN SPYWARE AND MALWARE 2. DIFFERENCE BETWEEN VIRUS AND SPYWARE 3. DIFFERENCE BETWEEN WORM AND VIRUS 4. DIFFERENCE BETWEEN ADWARE AND SPYWARE 5. DIFFERENCE BETWEEN VIRUS, WORMS, LOGIC BOMBS AND TROJAN HORSES 6. DIFFERENCE BETWEEN LEGITIMATE WEBSITE AND PHISHING SCAM 7. DIFFERENCE BETWEEN SCAM, PHISHING AND RIP OFF 8. DIFFERENCE BETWEEN PHISHING, HACKING AND CRACKING 9. 4 TYPES OF VIRUSES COMPILED BY A.UMAR ALI
  • 2. 1. DIFFERENCE BETWEEN SPYWARE AND MALWARE GO TO INDEX 1. Malware covers a lot of different software; Spyware is just one of them. 2. Spyware often doesn’t cause major damage but other malware can. 3. While other malware can impair the function of your computer, spyware can extract personal information like credit card numbers. 4. Spyware takes up processing power and a part of the bandwidth of your internet connection. REFERENCE http://www.differencebetween.net/technology/difference-between-spyware-and- malware/ 2. DIFFERENCE BETWEEN VIRUS AND SPYWARE GO TO INDEX 1. Viruses started rather innocently a long time ago but eventually evolved into a harmful digital entity while spyware is more recent and created purely for malicious reasons. 2. Viruses ultimately destroy computer systems (software and hardware). Spyware is not gravely destructive in terms of computer damage but the unwanted applications it installs can be an annoyance. 3. A virus is a general term which has a distinctive characteristic of replicating and modifying files. It also comes in many types like worms and trojans. Spyware, on the other hand is specific. It can qualify as a virus since some can also replicate files. 4.Viruses aim to disrupt human to computer interactivity while spyware stealthily monitor computer activity. REFERENCE http://www.differencebetween.net/technology/difference-between-virus-and- spyware/
  • 3. 3. DIFFERENCE BETWEEN WORM AND VIRUS GO TO INDEX 1. Virus needs hosts while worms do not. 2. Worms can spread quicker than virus because it does not need human action to replicate. 3. Worms often disguise themselves as DLLs or system files to avoid detection. 4. For both, the payload carries code that does the real damage. REFERENCE http://www.differencebetween.net/technology/difference-between-worm-and-virus/ 4. DIFFERENCE BETWEEN ADWARE AND SPYWARE GO TO INDEX ADWARE 1. Adware are software applications that are designed to allow a number of pop up advertisements straight to the personal computers of potential customers and clients. 2. These advertisements allow Internet browsers to download certain programs free of charge since these pop up advertisements contribute to the payment of the use of these programs. 3. These are currently seen in trial programs which offer the potential customer the ability to evaluate and make his or her decision on whether to purchase the license or not. 4. For as long as the customer does not purchase the program and is still within the trial period, the adware application will generate a variety of relevant advertisements to provide free usage of the said program without compromising the amount of profit generated by the company that developed the program. 5. Once the customer purchases the program over the Internet, the adware software application is then disabled by the computer program and the user can now be able to utilize the computer program without the advertisements.
  • 4. SPYWARE 1. On the other hand, spyware software applications are programs that are embedded to certain websites in order to track the purchasing habits of existing customers. 2. The name spyware comes from the fact that the users are not aware of these applications. 3. While they are surfing through the website and make a purchase, the spyware gathers the purchase information and stores it in a database to allow the company to keep track of the types of the products and services that a particular client avails and the frequency of the purchases made. 4. With the help of these applications, companies are then able to generate a number of Internet marketing strategies to directly market future products and services to these customers to further increase the amount of the profit that they generate. REFERENCE http://www.differencebetween.net/technology/difference-between-adware-and-spyware/
  • 5. 5. DIFFERENCE BETWEEN VIRUS, WORMS, LOGIC BOMBS AND TROJAN HORSES GO TO INDEX Virus 1. A program that replicates by attaching itself to other programs. 2. The infected program must be executed for a virus to run. 3. Most of the time a system file or a program that you use occasionally. Worm 1. Program that copies itself throughout a network or the internet without a host program. 2. Creates problems by overloading the network as it replicates. 3. Damaging just by their presence. 4. Overloads memory or hard drive space by replicating repeatedly. Logic Bomb 1. Dormant code added to software and triggered at a predetermined time or by a predetermined event. Trojan horse 1. Does not need a host program to work; rather, it substitutes itself for a legitimate program. 2. Likely to introduce one or more Viruses into your system. 3. Sometimes called downloaders. REFERENCE http://wiki.answers.com/Q/Define_and_explain_the_difference_between_virus_worms_logic_bo mbs_and_trogen_horses
  • 6. 6. DIFFERENCE BETWEEN LEGITIMATE WEBSITE AND PHISHING SCAM GO TO INDEX 1. Phishing scams are typically propagated through emails. 2. The crooks send out emails looking like official emails from banks or other financial institutions. 3. They insist that you must click on a link and enter personal information or something dire will happen, but the link actually takes you to a fake website that looks like the real thing. 4. There are lots of websites and blogs talking about phishing. 5. Here is one that really nets it out: http://keynotesupport.blogspot.com/2009/09/urgent-how-to-avoid-phishing-scams-on.html 6. Also, when surfing the web, you should install a free program like McAfee's SiteAdvisor that will display warning symbols next to websites that may not be safe to visit. You can download free code from the McAfee website at: http://www.siteadvisor.com/ 7. Remember, if it looks too good to be true, it definitely is! Don't fall for emails or websites that claim you have won a prize. And never click on a link in an email. REFERENCE http://wiki.answers.com/Q/How_can_you_tell_the_difference_between_a_legitimate_website_a nd_a_phishing_scam
  • 7. 7. DIFFERENCE BETWEEN SCAM, PHISHING AND RIP OFF GO TO INDEX A scam is a deliberate attempt to defraud you. Phishing is trying to obtain your data to steal your identity and/or credit. A rip off is where you are getting something, just not as good a quality, or for as good a price, as most people would feel appropriate. REFERENCE http://wiki.answers.com/Q/What_is_the_difference_between_a_scam_and_phishing_and_a_rip _off 8. DIFFERENCE BETWEEN PHISHING, HACKING AND CRACKING GO TO INDEX Phishing is trying to get some ones username, password, credit card info, Social, or other personal information by means of a fraudulent message, email, instant message. Hacking is referred to as getting into another system or computer and copying, modifying, or just looking a data on that host PC. Cracking is actually changing code, or modifying a program to function beyond its limits, delete registration, or any other modification of that program. REFERENCE http://wiki.answers.com/Q/What_is_the_difference_between_phishing_and_hackingcracking 9. 4 TYPES OF VIRUSES GO TO INDEX There are a lot more than 4 types but these are some of the most common. 1. Worms: A virus that copies itself throughout your computer without you knowing and eats through stored data on your computer. 2. Smart Bomb: A multiple type of a virus that waits until activated or a set date to run. 3. Batch: Most common, simple "virus". Though not many real hackers consider it a virus but it is a common thing on the internet... It can be used for malicious intent and delete files. They come in the .bat extention.
  • 8. 4. Trojan: One of the most common viruses normally installs with another program you downloaded. It’s binded, with it. Makes your computer accessible to RATS (Remote admin Tools) that allows others to connect to your computer. Or allows you to become a part of a botnet. REFERENCE http://wiki.answers.com/Q/4_types_of_viruses