1. 特洛伊木马:
特洛伊木马也是一种恶意软件,它使用假名和假名来误导用户并执行其真实意图。特洛伊木马通常作为合法且有用的软件安装在系统上,这些软件可以让黑客未经授权访问和控制系统。 Back orifice、Rootkit 和 Beast Trojan 是一些常见的木马,危害性更大。
2. 勒索软件:
勒索软件是一种恶意软件,旨在阻止用户访问自己的系统,直到向勒索软件创建者支付赎金为止。勒索软件比普通恶意软件危险得多,它通过带有受感染附件的网络钓鱼电子邮件进行传播。勒索软件在过去几年出现,可以攻击个人或组织。
特洛伊木马和勒索软件的区别:
S.No. | TROJAN HORSE | RANSOMWARE |
---|---|---|
1. | Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. | Ransomware is a form of malware designed to block access from system until a ransom fee is paid. |
2. | The main objective of Trojan horse is to steal the information. |
The main objective of ransomware is to take money by gaining access. |
3. | It is generally install on the system as legitimate and useful software . | It is generally spread through phishing emails having malicious attachments. |
4. |
It is installed for malicious purposes. |
It is installed for commercial purposes. |
5. | It can give unauthorized access and control of the system to the hackers. | It provides profit to the ransomware programmers by getting money from user for unlocking the system. |
6. | Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses. | Crypto, Wanna Cry, Cerber and locker are some of the examples of Ransomwares. |
7. | It is less harmful as compared. | It is more harmful . |