Wednesday, July 18, 2018
Cyber Security Lingo: Jargon Buster Part 1

Cyber Security Lingo: Jargon Buster Part 1


Malware Taxonomy.

What different 'species' of malware are there and what do they do?.

The Information Security/Cyber-Security world is full of its own jargon and TLAs. In this article, we try to name and describe different types of malware.


Let’s talk about the term ‘Malware’ first. Malware is basically a combination of the words ‘malicious’ and ‘software’, creating the word ‘malware’.

A malware is a piece of software which was created with malicious intents and purposes by its author(s).

The purpose or purposes of a piece of malware can be anything between destroying data on its victim’s machine to highly covert data stealing or remote controlling operations.

Diferent types of malware are:

(1) Virus
(2) Worm
(3) Trojan
(4) Bot
(4) Rootkit

In some cases, a malware can also be named after what it does specifically. Such as the term ‘Ransomware’ or has become an established way to describe a group of malware since they ask for ransom from their victims after locking the victims’ file making them unusable.

Malware taxonomy


A computer ‘Virus’ is a piece of software which (much like a biological virus) can replicate itself and propagate from one computer to another.


A computer ‘Worm’ is very similar to a computer Virus in that it can also replicate itself from one computer to another.

But the difference between a virus and an worm is that a ‘Virus’ needs a host computer to propagate itself (much like a biological virus) whereas a ‘Worm’ can exploit a weakness of a software application or network to propagate from one computer to another.


A ‘Trojan’ is named after ‘Trojan horse’ of Greek mythology. This is a piece of software which might look legitimate and appears to perfom some legitimate tasks but in reality it performs malicious activities without the consent of the its victim.


A ‘Rootkit’ is a piece of malware that is designed to blend in with the target computer’s operating system and stay hidden for a very long time and manipulate the operations of the victim computer yet stay undetected.

Final Comments

Coming later…


This website uses cookies so that we can provide you with the best user experience and to deliver advertising messages and offers on the website that are relevant to you. To read more about the cookies we use and to change your settings see our policy, please click on the link next:

Our Cookie Policy.

This website uses cookies so that we can provide you with the best user experience and to deliver advertising messages and offers on the website that are relevant to you. By continuing to use the site, you agree to the use of cookies.

What are 'COOKIES' ?

Web Browser Cookies

A cookie is a small text file that is sent by a website to your computer or mobile/tablet where it is stored by your web browser. A cookie contains limited non-personal data, usually a unique identifier and the name of the site. This enables a website to recognise you as you move around the site and/or each time you revisit. Cookies are used for a wide variety of purposes such as to keep you logged in or to remember what's in your basket if you're shopping online, to remember your preferences and settings, to analyse how the site is used by you, and to serve advertising to you.

Cookies which are served by the website you are visiting are called "first party cookie". If they are served by another web-site providing services to that website, such as an analytics company or advertising network then they are called "Third party cookies". They will either be stored for the duration of your visit called a "session cookie" or they might remain for a fixed period, which could be months or even years, to remember you across multiple browsing sessions (known as a "persistent cookie").

Google Analytics

We use 'Google Analytics' to collect statistical information about how our websites are used. They use information such as your IP address, browser type and unique identifiers stored in (first party) cookies on your device to record how you interact with our website. We also use 'Google Demographics' data to help us tknow how many users we have, which parts of our sites are most popular, what browsers are used (so we can maximise compatibility), the country or region where our users are located, and the demographics and interests of our users. This enables us to better understand who is using our site and to ensure we are reaching our target demographic, and to improve and tailor our services accordingly.


For more information on cookies and privacy, please visit the UK Information Commissioner's Offce web-site at:

ICO Cookie and Privacy Information