We often hear people talking about viruses, spyware, and adware. In this video, learn what is meant by these terms and what the objectives are of those who create them.
- [Instructor] A virus is a type of malicious software which is designed to do two things. Firstly, to propagate copies of itself to other computers in whatever way it can. And secondly, to eventually attack its host computer. Spyware is different. It's software which typically doesn't propagate and is designed to extract information from its host computer, typically for marketing purposes. Adware is like spyware, but it's designed for advertising, for example, in a pop-up screen. Adware and spyware are called PUPs, Potentially Unwanted Programs and they're often introduced inadvertently during the installation of other programs. Viruses and PUPs can be detected and removed by antivirus software. Antivirus software checks all files in-coming into the system, from USB, mail, or websites to see if they match any of the virus or PUP signatures. If they do, they'll typically be removed or quarantined. Antivirus programs are only about 95% effective in detecting viruses and PUPs. New viruses and PUPs are being created all the time and antivirus software needs to be updated regularly so that new signatures can be added. Businesses will often download new signatures every four hours or so, but a home user may only check once a week. Consequently, a new virus or PUP can get into a system if it arrives before it signature is in the system's antivirus database. To catch these exceptions, antivirus software can scan the hard disk to look for viruses and PUPs that have been written to disk. This is typically done weekly, after the signature update.
- Hackers and the kill chain
- Viruses, spyware, and adware
- Detecting malware with Windows Defender
- Using Windows Firewall and Linux iptables
- Scanning with Nmap
- Monitoring network communications with Netcat
- Combating application-level threats
- Scanning a website to check for vulnerabilities
- Capturing intruders through packet inspection
Skill Level Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. Why Cybersecurity?
4. Network Scanning
5. Network Connections
6. Vulnerability Scanning
7. Web Applications
8. Monitoring Packets
Next steps1m 27s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.