Information Technology IT – 5 eSecurity | e-Consult
5 eSecurity (1 questions)
Login to see all questions.
Click on a question to view the answer
| Malware Type | Propagation Method | Primary Objective | Typical Impact |
| Trojan Horse | User interaction (e.g., infected file) | Create backdoor, steal data, remote access | Affects individual systems; limited damage (usually). |
| Worm | Exploits vulnerabilities; self-replication | Network congestion, data theft, backdoors | Widespread impact; disruption and data loss. |
| Spyware | Bundled with legitimate software; often through malicious websites | Secretly monitor user activity; collect sensitive data | Compromises user privacy; identity theft, financial fraud. |
| Ransomware | Phishing emails, malicious websites, exploited vulnerabilities | Encrypt files and demand ransom for decryption | Data loss, disruption; no guarantee of file recovery even after payment. |