1. Virus

As we all know virus is a thing that we don't want to enter into our system. It such a problem dealing with this virus.
Computer virus is a term that is common to us. Viruses are described as a program that is encoded in your computer without your consent or knowledge and runs against your commands. It is easily spread or replicated just by itself. Viruses are unique to each other, they have their own characteristics.
Computer viruses are just so annoying. They reduce the memory of your computer, corrupt your data’s, erase files without your permission, and many more.
2. Worm
Worm, similar to virus, is also a program/software that is able to replicate and copies itself to each devices. It is also said that it often hits in the computer networks. Worm also hits the security holes. Maybe that’s why it’s called a worm, because it also replicates or process/work by means of passing through the security hole.
Worm can also spread easily because like for example like when you have sent a data and has a single worm, it can also send it to all the address listed in your contacts.
3. Trojan Horse
After hearing this term, I remembered the story of Homer’s Iliad. The Trojan horse was same as catchy as the story of where the term came from. The similarity comes by its characteristic that when it is installed it has the access to ruin your files, and they can even get your files and transfers it to the designer/innovator of the virus. This might even control your computer and this may cause in slowing the device.
4. Pay load
It is used to describe malicious activity that may result to viruses. It is what the computer virus is programmed to do. Some viruses do nothing more that copy themselves onto another PC, much like a real virus does from host to host. This is the simplest payload that a virus can have. However, just like viruses in nature, some computer viruses have a greater effect - maybe they steal files or data or allow someone to take control over the PC while some will destroy some will destroy some or all of the data on the computer.
5. Honey pots
Honey pots have a great use for it traps the malicious things that may try to penetrate on your computer.They are also designed to mimic system that the intruder would like to break but it limits the intruder to have access. And it is also said that if the honeypot is successful, the intruder wouldn't realized he is already being monitored.
A honey pot has its own disadvantages also like it can only track the ones that interact with the computer. They will not capture attacks against other systems, unless the attacker or threat interacts with the honey pots also.
6. Botnets
The term botnet came from the word robot. It is compared to a robot because the characteristics of this thing is that once this occurs it works like a zombie and manages without you knowing it.
They use botnets as spam e-mails, spread viruses, and it may also slow your computer.
7. Spoofing
It is also used in network management to reduce traffic. It is also used as a technique to gain unauthorized access by sending IP address by saying that it is a safe and trusted host.
It is a technique a intruder uses to get to the network or internet. It may appear as a legitimate thing but it isn’t.
It is also used in network management to reduce traffic. It is also used as a technique to gain unauthorized access by sending IP address by saying that it is a safe and trusted host.
8. Denial of Service Attacks
“It is an assault whose purpose is to disrupt computer access to an internet server such a web or e-mail”. – Shelly, Cashman, Vermaat. Discovering Computers 2007: A Gateway to Information
9. Backdoor
“A backdoor is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or even a network.” – Shelly, Cashman, Vermaat. Discovering Computers 2007: A Gateway to Information
Every time I hear the word “backdoor”, it really reminds me of the movie entitled “The Net” and “Hackers” which are really great movies.
It is said also that programmers are often build back doors into program so they can gain access to the system but they only use these back doors for testing and writing programs. If they cannot remove the back door, someone could hack or have the access to the system easily.
Firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming
from the outside world and can be purchased as a stand-alone product or
in broadband routers.
from the outside world and can be purchased as a stand-alone product or
in broadband routers.

