1 00:00:01,020 --> 00:00:02,490 Cybersecurity, malware. 2 00:00:04,020 --> 00:00:10,170 Now we have the virus and Wolf, so the primary difference between virus and what is that viruses must 3 00:00:10,170 --> 00:00:12,470 be triggered by activities of their host. 4 00:00:13,170 --> 00:00:19,560 When I ask what our standard on malicious software that can self replicate and propagate independently 5 00:00:19,560 --> 00:00:21,920 as soon as they have breached the system. 6 00:00:22,380 --> 00:00:28,290 So worms do not require activation or any human intervention to execute or spread their code. 7 00:00:29,700 --> 00:00:36,810 Now we have the Trojan, now the Trojan horse or the Trojan horse type of malware that is often disguised 8 00:00:36,810 --> 00:00:43,170 as legitimate software, Trojan can be employed by cyber thieves and hackers trying to gain access to 9 00:00:43,170 --> 00:00:44,520 the user's systems. 10 00:00:45,030 --> 00:00:50,580 Uses aren't typically tricked by some form of social engineering into loading and executing Trojan's 11 00:00:50,730 --> 00:00:51,800 on their systems. 12 00:00:51,810 --> 00:00:57,930 Once activated, Trojan Skandinavia Cyber Criminal to spy on you, steal your sensitive data and gain 13 00:00:57,930 --> 00:00:59,370 backdoor access to your system. 14 00:01:00,400 --> 00:01:07,320 We have spyware and adware, so spyware is basically any technology that helps gather information about 15 00:01:07,330 --> 00:01:14,140 a computer user without their knowledge, but the hardware is any software with bad advertisements display 16 00:01:14,290 --> 00:01:15,190 why it is. 17 00:01:15,240 --> 00:01:17,910 I think we have the ransomware now. 18 00:01:17,920 --> 00:01:26,170 Ransomware is a form of malware that encrypts a victim's file and that demands a ransom from the victim 19 00:01:26,170 --> 00:01:28,120 to restore access to the data. 20 00:01:28,120 --> 00:01:34,630 Upon payment, users are shown instructions for how to pay a fee to get the description key.