explain different kind of online thteats
Answers
Answer:
Any kind of software designed to annoy or harm the users is considered malware. Trojan horses, spyware, adware, ransomware, phishing, viruses, worms, rootkits, and browser hijackers are all types of malware. ... Malware is usually picked up from the internet or through one's email.
Explanation:
pls mark as brainlist answer pls
Answer:
Hacker
Skilled programmers using their coding knowledge for bad deeds are better known as hackers. By using scripts or malware they access data of users for fun, financial gain or some other harm. With the help of malicious applications, they develop themselves, hackers may come to one’s personal information or some other details that can harm.
Computer Virus
Just like biological ones, PC viruses also enter one’s system unnoticed with a goal to take control over it. Computer viruses can be complex malicious programs or just pieces of code designed to make a mess. The greatest threat of virus is its capability to copy itself and to spread to other computers. Besides that, virus always attacks vulnerable parts of one’s PC until it takes over the whole system.
Computer Worm
One of the nastiest malware one can get to his/her PC is a computer worm. This malicious application self-replicates all until one’s computer is impossible to use.
Trojan
Just like the epic Trojan horse, its malware namesake was designed to fool its victims. You can get a Trojan almost anywhere, from your downloads and emails to all kinds of different content. Trojan is designed that way to make you think it is helping you with some task but instead is causing harm or stealing data from your PC.
Ransomware
Ransomware is a literal kidnap of your PC remotely. Hackers use codes to lock your computer. If you want to unlock it ransom has to be paid. Getting to this kind of situation is tricky and by all means unpleasant.
Spyware
Any type of malware that collects personal information, browsing history, and one’s surfing habits is considered a spyware. Its name comes from a great ability to hide. First of all, collected information is shared with the third parties and then it gets abused.
Explanation:
hope it helps :)
mark me as the brainliest plzzzz