1.特洛伊木马:
特洛伊木马(Trojan Horse)也是一种恶意软件,它使用虚假名称来从其真实意图误导用户并执行它们。特洛伊木马通常作为合法且有用的软件安装在系统上,该软件可以向黑客提供未经授权的访问和控制。后孔,Rootkit和Beast木马是一些更有害的常见木马。
2.勒索软件:
勒索软件是一种恶意软件,旨在阻止用户从自己的系统访问,直到向勒索软件创建者支付了勒索费用为止。勒索软件比常规的恶意软件危险得多,并且通过具有感染附件的网络钓鱼电子邮件进行传播。勒索软件已经出现在最近几年,并且可以攻击个人或组织。
Trojan Horse和Ransomware之间的区别:
S.No. | TROJAN HORSE | RANSOMWARE |
---|---|---|
1. | Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. | Ransomware is a form of malware designed to block access from system until a ransom fee is paid. |
2. | The main objective of Trojan horse is to steal the information. |
The main objective of ransomware is to take money by gaining access. |
3. | It is generally install on the system as legitimate and useful software . | It is generally spread through phishing emails having malicious attachments. |
4. |
It is installed for malicious purposes. |
It is installed for commercial purposes. |
5. | It can give unauthorized access and control of the system to the hackers. | It provides profit to the ransomware programmers by getting money from user for unlocking the system. |
6. | Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses. | Crypto, Wanna Cry, Cerber and locker are some of the examples of Ransomwares. |
7. | It is less harmful as compared. | It is more harmful . |