Faronics Anti-Virus Enterprise User Manual

Page 9

Advertising
background image

Definition of Terms

|

9

Faronics Anti-Virus User Guide

Rootkits

A rootkit is software that cloaks the presence of files and data to evade
detection, while allowing an attacker to take control of the machine
without the user's knowledge. Rootkits are typically used by malware
including viruses, spyware, trojans, and backdoors, to conceal
themselves from the user and malware detection software such as
anti-virus and anti-spyware applications. Rootkits are also used by
some adware applications and DRM (Digital Rights Management)
programs to thwart the removal of that unwanted software by users.

Spyware

Spyware is software that transmits information to a third party
without notifying you. It is also referred to as trackware, hijackware,
scumware, snoopware, and thiefware. Some privacy advocates even
call legitimate access control, filtering, Internet monitoring, password
recovery, security, and surveillance software spyware because those
could be used without notifying you.

Trojan

A trojan is installed under false or deceptive pretenses and often
without the user's full knowledge and consent. In other words, what
may appear to be completely harmless to a user is in fact harmful by
containing malicious code. Most trojans exhibit some form of
malicious, hostile, or harmful functionality or behavior.

Virus

A computer virus is a piece of malicious code that has the ability to
replicate itself and invade other programs or files in order to spread
within the infected machine. Viruses typically spread when users
execute infected files or load infected media, especially removable
media such as CD-ROMs or flash drives. Viruses can also spread via
email through infected attachments and files. Most viruses include a
payload that can be anywhere from annoying and disruptive to
harmful and damaging; viruses can cause system damage, loss of
valuable data, or can be used to install other malware.

Worm

A worm is a malicious program that spreads itself without any user
intervention. Worms are similar to viruses in that they self-replicate.
Unlike viruses, however, worms spread without attaching to or
infecting other programs and files. A worm can spread across
computer networks via security holes on vulnerable machines
connected to the network. Worms can also spread through email by
sending copies of itself to everyone in the user's address book. A worm
may consume a large amount of system resources and cause the
machine to become noticeably sluggish and unreliable. Some worms
may be used to compromise infected machines and download
additional malicious software.

Term

Definition

Advertising