Because of the evolution of malware, current malware has properties of virus, worm, Trojan, and rootkit all bundled up in a single package to enable survival and dissemination. Various methods to infect a host include File-infecting Virus, Cavity virus, Armored Virus and Companion Virus.
- [Teacher] Because of the evolution of malware,…current malware has properties…of a virus, worm, Trojan, and rootkit,…all bundled up in a single package…to enable survival and dissemination.…Getting malware is fairly easy, as most of the time,…we carelessly visit a webpage or click on a link from…a friend and expose the system to malicious activity.…Many people feel that malware protection is sufficient,…when in fact, it's hard to keep ahead of the latest threats.…
Some malware, such as worms and…botnets, propagate independently.…Others, such as a Trojan, uses a wrapper, which wraps…the malware in some enticing message, utility, or game.…There are various methods to infect a host.…A file-infecting virus is a classic form of a virus.…Typically, it infects files with a .exe or .com extension.…Once the file is infected by the virus,…the virus attempts to reach out and infect other files.…
Once infected, the file is unusable.…Depending on the virus, malicious code may be…partially or completely overwritten by the virus.…
Learn more about the Certified Ethical Hacking exam and the benefits of certification at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Understanding viruses and worms
- Recognizing a virus attack
- Identifying different virus types
- Creating a simple virus
- Analyzing malware
- Countering malware