Term Malware is short for malicious software. It performs action without user knowledge or consent.
Law
The Computer Fraud and Abuse Act
This law addresses federal computer-related offences
The Patriot Act
Expansion on powers included in The Computer Fraud and Abuse Act
CAN-SPAM Act

Categories of Malware
Viruses
Replicates and attaches itself to other files on the system. In most cases require some sort of user interaction
Worms
Can replicate on there own very quickly. Responsible for some of devastating DOS attacks in the past
Trojans
Like virus requires in most cases some sort of user interaction. Based on social engineering for the large part.
Rootkits
Can hide within core components of the system. Can be undetected by many scanners.
Spyware
Gathers user and computer activity while being in stealth mode. Keyloggers are good example.
Adware
Design to advertise product on infected system. May replace home page or place pop-up’s on infected computers.

Viruses

  • System or boot sector virus
  • Macro virus
  • Cluster virus
  • Logic bomb
  • Companion or camouflage virus
  • Cavity or file-overwriting virus
  • Encryption virus
  • Stealth virus

Worms

  • Do not require a host application to perform their activities
  • Do not require user interaction
  • Replicate very rapidly
  • Consume bandwidth and resources

Methods of Spyware Infection

  • Peer-to-Peer Networks
  • Instant Messaging
  • Internet Relay Chat
  • Email Attachment
  • Physical Access
  • Browser Defects
  • Freeware
  • Websites
  • Software Installations