The most used malware is a virus. 57% of things that infect us are viruses. Viruses, as explained by Microsoft, are software programs that are designed to spread to computers and meddle with computer operation ("What Is a Computer Virus?"). Fred Cohen correctly coined the term computer virus in 1985. Viruses secretly attach themselves to a document or another program and they execute when that document or program is opened. Viruses require user action to execute. This means that the user must do something to trigger the virus. However, once it is triggered it replicates itself by spreading to other computers. As mentioned on Wikipedia, most of viruses target systems that run Microsoft Windows. There are 4 phases that a virus goes through. The first phase known as the dormant phase is when the virus is idle. The dormant phase is when the virus is triggered. The second phase, known as propagation phase, is when the virus starts multiplying itself. The third phase, known as triggering phase, is when the dormant virus gets triggered it comes to this phase. The last phase is known as execution phase and this is where the virus actually does what it was intended to do ("Computer Virus"). There are many reasons why people create virus. For example, people may gain profit from a virus; they may want to gain access to …show more content…
As defined by Wikipedia, Phising is used to get information like usernames, passwords and credit card information and they are disguised as trustworthy. Phishing is a homophone of fishing because it is similar to fishing in the way that the scammers are using a bait to catch the victim. Phishing is an example of social engineering ("Phishing"). Phishing starts with scammers sending an email to the victim asking them to confirm their password or their payment information and the email is usually a link to a website. The fake website looks exactly like the real one. On the website the victim is asked to confirm their password or payment information. The scammers usually get access to all the victims’ information through phishing. In addition phishing emails can also have links that lead to websites that have malware. The way to prevent phishing is not to open any spam mails unless you are hundred percent sure it is not a junk mail. Also, when you get an email on confirming any information, do not use the link in the email. Type it on Google and go to the official website and then confirm the information if