Malicious files

1. Trojan. Trojan is one of the most complicated threats that can attack a computer overall. Most of the time a Trojan is coded to look like antivirus software or a antivirus detector on your computer then it attacks your bank account buy stealing your bank details, meaning they have full access to your bank account compromising it. If a Trojan is coded to be really powerful, then it is capable to take over your entire security system, this means Trojans are extremely powerful and can be a massive threat to a computer. A Trojan can cause damage, starting from your own computer to your online account.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

2. Virus. Virus is something really popular, it is a malicious program where it replicates itself and aim to only destroy a computer and all of its files that, most of the time viruses force its self onto the computer system by either braking a firewall or by the user clicking on a dodgy link that downloads a file but also downloads the virus onto the system. The main goal of a virus is to disable the victim’s computer and make it unusable, viruses are extremely powerful but security has risen on virus security so they have become redundant so the only reason people use viruses is for revenge attacks.

3. Worms. Worms are one of the most harmless threats to a computer, its program designed only to spread. It does nothing to alter what’s on your computer, it just replicates its self on your computer system but it can spread from one computer to another computer within a network or even the internet causing the worm to be spread to computers on your network or even 10s of thousands of computers around the world. This is the reason it counts as a computer security risk, it will use up your computer hard disk space due to the replication and took up most of your bandwidth due to the spread.

4. Spyware. Malware is designed to spy on the victim’s computer, If a computer is infected with it, the daily activity done on the system by the user will be spied by the spyware and it will find itself a way to contact the host of this malware. Mainly, the use of this spyware is to know what a user’s daily activity is so that the attacker can make use of your information. Such as if you browse on sex toys for a week every day, the attacker will try to come out with a sex toy scam to cheat on your money causing the user to be scammed out of his money.

5. Phishing. Phishing is fake website which is designed to look almost like the actual website is a form of phishing attack. The website is a way of tricking the user into entering their personal log in and the server running the fake website will store each username and password that the people enter, causing the server to have access to their personal data and initially steal their personal information. The phishing server is an attacker controlled server.


1.    Anti-virus.  Antivirus software is a type of utility software downloaded by the user, this enables the user to scan and remove viruses from your computer if they are found on the computers files. While many types of antivirus programs exist, their primary purpose is to protect computers from viruses and remove any viruses that are found. This is important because the computer is more secure than what it would originally be if it wasn’t installed onto the computer.

2.    Vpn. A vpn stands for virtual private network, is a type of network that is constructed using public wires to connect remote users or regional offices to a company’s private, internal network allowing the user to surf the internet anonymously so there is no way of tracing what you search back onto you.

3.    Anti-spam for email. They protect your email from malicious email links and they are important for companies to use because they cannot have any viruses or worms on their system.