| 
 |  | Types of hreats  |  | 
                          
                            |  | 
                          
                            | There are a vast number of threats that could 
								affect your computer today: | 
                          
                            |  | 
                          
                            | Worms | 
                          
                            |  | 
                          
                            | This malicious program category largely exploits 
								operating system vulnerabilities to | 
                          
                            | spread itself. The class was named for the way the 
								worms crawl from computer to | 
                          
                            | computer, using networks and e-mail. This feature 
								gives many worms a rather high | 
                          
                            | speed in spreading themselves. | 
                          
                            |  | 
                          
                            | Viruses | 
                          
                            |  | 
                          
                            | Programs that infected other programs, adding 
								their own code to them to gain | 
                          
                            | control of the infected files when they are 
								opened. This simple definition explains the | 
                          
                            | fundamental action performed by a virus - 
								infection. | 
                          
                            |  | 
                          
                            | Trojans | 
                          
                            |  | 
                          
                            | Programs that carry out unauthorized actions on 
								computers, such as deleting | 
                          
                            | information on drives, making the system hang, 
								stealing confidential information, | 
                          
                            | etc. This class of malicious program is not a 
								virus in the traditional sense of the word | 
                          
                            | (meaning it does not infect other computers or 
								data). Trojans cannot break into | 
                          
                            | computers on their own and are spread by hackers, 
								who disguise them as regular | 
                          
                            | software. The damage that they incur can exceed 
								that done by traditional virus | 
                          
                            | attacks by several fold. | 
                          
                            |  | 
                          
                            | Spyware | 
                          
                            |  | 
                          
                            | Software that collects information about a 
								particular user or organization without | 
                          
                            | their knowledge. You might never guess that you 
								have spyware installed on your | 
                          
                            | computer. | 
                          
                            |  | 
                          
                            | Riskware | 
                          
                            |  | 
                          
                            | Potentially dangerous applications include 
								software that has not malicious features | 
                          
                            | but could form part of the development environment 
								for malicious programs or could | 
                          
                            | be used by hackers as auxiliary components for 
								malicious programs. | 
                          
                            |  | 
                          
                            | Rootkits | 
                          
                            |  | 
                          
                            | Utilities used to conceal malicious activity. They 
								mask malicious programs to keep | 
                          
                            | anti-virus programs from detecting them. Rootkits 
								modify the operating system on | 
                          
                            | the computer and alter its basic functions to hide 
								its own existence and actions that | 
                          
                            | the hacker undertakes on the infected computer. | 
                          
                            |  | 
                          
                            |  |