4.4 THE PROTECTION OF COMPUTERS COMPUTER THREATS A is a negative action or event that can compromise it. Threats can lead to cyber attacks or data being stolen, lost or modified by others. A threat can be either intentional, as in the case of hacking , or accidental, as in the case of computer malfunctioning or a natural disaster that seriously damages the system. Most intentional threats can be classified as follows. computer threat 1 DO Give a definition of the word “hacking”. 1 Malware The term (short for "malicious software") refers to any intrusive software or code created to damage or disable computers or mobile devices. Its most common forms are: malware , which attach to another program and, when executed by the user, replicate themselves by modifying computer programs and infecting them with their own code; Viruses unaware , which is unwanted software designed to make adverts pop up on the screen most often within a web browser, which slows down the system; Adware , which secretly keeps track of the computer user's activities without permission; Spyware , which are similar to viruses because they self-replicate, but which, unlike viruses, can spread across systems on their own without any action from the user; Worms , which, once on the computer system, allow attackers to gain unauthorized access to the computer in order to steal financial information or install other forms of malware; Trojans 1 , which locks the user out of the device and/or encrypts files, and forces them to pay a to regain access. Ransomware ransom MORE The term is derived from the Ancient Greek story of the deceptive Trojan horse that led to the fall of the city of Troy. 1 Trojan Crimeware is a general term referring to a set of programs used to commit illegal activities online, such as stealing personal identities, money, sensitive data or proprietary information. An example of crimeware action is when a user's financial accounts are accessed with the purpose of taking from them or completing unauthorized transactions. Crimeware uses different types of malware so it may be a virus, spyware or other piece of software that can be used to commit . Crimeware funds fraud Network threats A or attack is aimed at gaining unauthorized access to an organization's network to steal data or perform other malicious activity. Network attacks can be: network threat , when attackers gain access to a network without making any change to the data; or passive , when attackers gain access and modify data, either deleting or encrypting it. active (Distributed of Service) is one of the most common network threats that cybercriminals use to make an online service or network resource unavailable to its users on the Internet by it with thousands or millions of superfluous requests, the system. DDoS Denial flooding overwhelming