In this research paper, our intent is to outline different types of malware, their means of operation, and how they are detected in order to protect yourself against such attacks. Varied permission, and limited technical resources mean that detecting malware and such attacks becomes more difficult. With the normal user being limited to the UI, their ability to see what happens in the background is virtually limited to none. Many do not have control on how they distribute permission over the data the applications they use controls, or how that data is stored or distributed. They also do not receive any notification as to whether their data is protected against various attacks and if it has not been attacked already. In this paper, we present evidence on what malware is, how malware operates, different types of malware, and the general means of defence.
翻译:在这份研究文件中,我们的意图是概述不同类型的恶意软件及其操作手段,以及如何发现这些软件以保护自己免受这种攻击。不同的许可和有限的技术资源意味着发现恶意软件和这种攻击变得更加困难。由于普通用户仅限于UI,他们看背景情况的能力几乎完全没有限制。许多人对如何分配数据许可、他们使用的应用程序、或数据如何储存或传播没有控制权。他们也没有收到任何通知,说明其数据是否受到保护,免遭各种攻击,如果数据没有受到攻击,我们在本文件中提供证据,说明恶意软件是什么,恶意软件是如何操作的,不同种类的恶意软件,以及一般的防御手段。