SlideShare una empresa de Scribd logo
1 de 7
Is your Deep Packet Inspection testing
‘Deep’ enough?

Ankur Chadda

Product Marketing Manager

PROPRIETARY AND CONFIDENTIAL
The Application Explosion – it never ends!

PROPRIETARY AND CONFIDENTIAL
What are IT Departments Asking for…

PROPRIETARY AND CONFIDENTIAL
Understanding Malware


Short for Malicious Software



Represents hostile software used to
• Disrupt computer operation
• Gather sensitive information
• Gain access to private computer systems



Common malware types:
•
•
•
•

Adware

Keyloggers
Ransomware
Rootkits

•
•
•
•

MALWARE INFECTIONS BY TYPE IN 2012

Spyware
Trojan Horses
Viruses
Worms
Source: PandaLabs Annual Report for 2012 by Panda Security

PROPRIETARY AND CONFIDENTIAL
Malware Testing

Infected host
emulation

Binary transfer
emulation

• Test security counter
measures and policies for
detecting spreading
malware

• Test inline or antivirus
detection effectiveness

Malware testing • Test the effectiveness and
accuracy of your security
under
devices and policies under
application load real work load

PROPRIETARY AND CONFIDENTIAL
Summary


BYOD adds complexity with number
of devices, endpoints and versions
of apps on your network



Security infrastructure testing is no
longer legacy firewall testing, but
more involved with multiple
vectors



Realistic emulation critical to
understand actual impact

www.spirent.com
PROPRIETARY AND CONFIDENTIAL
To listen to the full webinar visit:
http://www.spirent.com/OnDemand/Networks_and_
Applications/DPI_Testing

PROPRIETARY AND CONFIDENTIAL

Más contenido relacionado

Más de Sailaja Tennati

Retail Transformation Begins with a Unified Commerce Platfrom.pdf
Retail Transformation Begins with a Unified Commerce Platfrom.pdfRetail Transformation Begins with a Unified Commerce Platfrom.pdf
Retail Transformation Begins with a Unified Commerce Platfrom.pdfSailaja Tennati
 
IEEE Buenaventura cs Chapter March 9 2016 v4
IEEE Buenaventura cs Chapter March 9 2016  v4IEEE Buenaventura cs Chapter March 9 2016  v4
IEEE Buenaventura cs Chapter March 9 2016 v4Sailaja Tennati
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSailaja Tennati
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter Sailaja Tennati
 
Spirent's Study on Battery life Competition: Samsung S5 vs. S4
Spirent's Study on Battery life Competition: Samsung S5 vs. S4Spirent's Study on Battery life Competition: Samsung S5 vs. S4
Spirent's Study on Battery life Competition: Samsung S5 vs. S4Sailaja Tennati
 
Spirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSpirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSailaja Tennati
 
DevOps Continuous Testing and LaaS – The Perfect Match for SDN
DevOps Continuous Testing and LaaS – The Perfect Match for SDNDevOps Continuous Testing and LaaS – The Perfect Match for SDN
DevOps Continuous Testing and LaaS – The Perfect Match for SDNSailaja Tennati
 
Best Practices for Accelerating Continuous Testing
Best Practices for Accelerating Continuous TestingBest Practices for Accelerating Continuous Testing
Best Practices for Accelerating Continuous TestingSailaja Tennati
 
DevOps – what is it? Why? Is it real? How to do it?
DevOps – what is it? Why? Is it real? How to do it?DevOps – what is it? Why? Is it real? How to do it?
DevOps – what is it? Why? Is it real? How to do it?Sailaja Tennati
 
Case Study - Implementing DevOps for a complex hardware/software-based networ...
Case Study - Implementing DevOps for a complex hardware/software-based networ...Case Study - Implementing DevOps for a complex hardware/software-based networ...
Case Study - Implementing DevOps for a complex hardware/software-based networ...Sailaja Tennati
 
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOpsDevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOpsSailaja Tennati
 
GNSS Receivers and the Cyber Threat
GNSS Receivers and the Cyber ThreatGNSS Receivers and the Cyber Threat
GNSS Receivers and the Cyber ThreatSailaja Tennati
 
Ensuring the User Experience for Global Mobile Device Launches
Ensuring the User Experience for Global Mobile Device LaunchesEnsuring the User Experience for Global Mobile Device Launches
Ensuring the User Experience for Global Mobile Device LaunchesSailaja Tennati
 
Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Sailaja Tennati
 
Spirent 400G Ethernet Test Solution - A Technical Overview
Spirent 400G Ethernet Test Solution - A Technical OverviewSpirent 400G Ethernet Test Solution - A Technical Overview
Spirent 400G Ethernet Test Solution - A Technical OverviewSailaja Tennati
 
ICSA Presents: Scalable Performance Testing - How Spirent Makes That Possible
ICSA Presents: Scalable Performance Testing - How Spirent Makes That PossibleICSA Presents: Scalable Performance Testing - How Spirent Makes That Possible
ICSA Presents: Scalable Performance Testing - How Spirent Makes That PossibleSailaja Tennati
 
Spirent Communications - Networking Field Day Presentation 6 - Sept. 2013
Spirent Communications - Networking Field Day Presentation 6 - Sept. 2013Spirent Communications - Networking Field Day Presentation 6 - Sept. 2013
Spirent Communications - Networking Field Day Presentation 6 - Sept. 2013Sailaja Tennati
 
App-Aware Security Testing with Spirent Avalanche NEXT
App-Aware Security Testing with Spirent Avalanche NEXTApp-Aware Security Testing with Spirent Avalanche NEXT
App-Aware Security Testing with Spirent Avalanche NEXTSailaja Tennati
 
The VoLTE User Experience--Better or Worse
The VoLTE User Experience--Better or WorseThe VoLTE User Experience--Better or Worse
The VoLTE User Experience--Better or WorseSailaja Tennati
 

Más de Sailaja Tennati (20)

Retail Transformation Begins with a Unified Commerce Platfrom.pdf
Retail Transformation Begins with a Unified Commerce Platfrom.pdfRetail Transformation Begins with a Unified Commerce Platfrom.pdf
Retail Transformation Begins with a Unified Commerce Platfrom.pdf
 
IEEE Buenaventura cs Chapter March 9 2016 v4
IEEE Buenaventura cs Chapter March 9 2016  v4IEEE Buenaventura cs Chapter March 9 2016  v4
IEEE Buenaventura cs Chapter March 9 2016 v4
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
Spirent's Study on Battery life Competition: Samsung S5 vs. S4
Spirent's Study on Battery life Competition: Samsung S5 vs. S4Spirent's Study on Battery life Competition: Samsung S5 vs. S4
Spirent's Study on Battery life Competition: Samsung S5 vs. S4
 
Spirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics SystemSpirent: Datum User Experience Analytics System
Spirent: Datum User Experience Analytics System
 
DevOps Continuous Testing and LaaS – The Perfect Match for SDN
DevOps Continuous Testing and LaaS – The Perfect Match for SDNDevOps Continuous Testing and LaaS – The Perfect Match for SDN
DevOps Continuous Testing and LaaS – The Perfect Match for SDN
 
Best Practices for Accelerating Continuous Testing
Best Practices for Accelerating Continuous TestingBest Practices for Accelerating Continuous Testing
Best Practices for Accelerating Continuous Testing
 
DevOps – what is it? Why? Is it real? How to do it?
DevOps – what is it? Why? Is it real? How to do it?DevOps – what is it? Why? Is it real? How to do it?
DevOps – what is it? Why? Is it real? How to do it?
 
Case Study - Implementing DevOps for a complex hardware/software-based networ...
Case Study - Implementing DevOps for a complex hardware/software-based networ...Case Study - Implementing DevOps for a complex hardware/software-based networ...
Case Study - Implementing DevOps for a complex hardware/software-based networ...
 
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOpsDevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
 
GNSS Receivers and the Cyber Threat
GNSS Receivers and the Cyber ThreatGNSS Receivers and the Cyber Threat
GNSS Receivers and the Cyber Threat
 
VoLTE Testing Explained
VoLTE Testing ExplainedVoLTE Testing Explained
VoLTE Testing Explained
 
Ensuring the User Experience for Global Mobile Device Launches
Ensuring the User Experience for Global Mobile Device LaunchesEnsuring the User Experience for Global Mobile Device Launches
Ensuring the User Experience for Global Mobile Device Launches
 
Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance
 
Spirent 400G Ethernet Test Solution - A Technical Overview
Spirent 400G Ethernet Test Solution - A Technical OverviewSpirent 400G Ethernet Test Solution - A Technical Overview
Spirent 400G Ethernet Test Solution - A Technical Overview
 
ICSA Presents: Scalable Performance Testing - How Spirent Makes That Possible
ICSA Presents: Scalable Performance Testing - How Spirent Makes That PossibleICSA Presents: Scalable Performance Testing - How Spirent Makes That Possible
ICSA Presents: Scalable Performance Testing - How Spirent Makes That Possible
 
Spirent Communications - Networking Field Day Presentation 6 - Sept. 2013
Spirent Communications - Networking Field Day Presentation 6 - Sept. 2013Spirent Communications - Networking Field Day Presentation 6 - Sept. 2013
Spirent Communications - Networking Field Day Presentation 6 - Sept. 2013
 
App-Aware Security Testing with Spirent Avalanche NEXT
App-Aware Security Testing with Spirent Avalanche NEXTApp-Aware Security Testing with Spirent Avalanche NEXT
App-Aware Security Testing with Spirent Avalanche NEXT
 
The VoLTE User Experience--Better or Worse
The VoLTE User Experience--Better or WorseThe VoLTE User Experience--Better or Worse
The VoLTE User Experience--Better or Worse
 

Último

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Webinar - Is your deep packet inspection testing deep enough

  • 1. Is your Deep Packet Inspection testing ‘Deep’ enough? Ankur Chadda Product Marketing Manager PROPRIETARY AND CONFIDENTIAL
  • 2. The Application Explosion – it never ends! PROPRIETARY AND CONFIDENTIAL
  • 3. What are IT Departments Asking for… PROPRIETARY AND CONFIDENTIAL
  • 4. Understanding Malware  Short for Malicious Software  Represents hostile software used to • Disrupt computer operation • Gather sensitive information • Gain access to private computer systems  Common malware types: • • • • Adware Keyloggers Ransomware Rootkits • • • • MALWARE INFECTIONS BY TYPE IN 2012 Spyware Trojan Horses Viruses Worms Source: PandaLabs Annual Report for 2012 by Panda Security PROPRIETARY AND CONFIDENTIAL
  • 5. Malware Testing Infected host emulation Binary transfer emulation • Test security counter measures and policies for detecting spreading malware • Test inline or antivirus detection effectiveness Malware testing • Test the effectiveness and accuracy of your security under devices and policies under application load real work load PROPRIETARY AND CONFIDENTIAL
  • 6. Summary  BYOD adds complexity with number of devices, endpoints and versions of apps on your network  Security infrastructure testing is no longer legacy firewall testing, but more involved with multiple vectors  Realistic emulation critical to understand actual impact www.spirent.com PROPRIETARY AND CONFIDENTIAL
  • 7. To listen to the full webinar visit: http://www.spirent.com/OnDemand/Networks_and_ Applications/DPI_Testing PROPRIETARY AND CONFIDENTIAL

Notas del editor

  1. Apps are exploding – over 1 M apps just on Facebook, App Store and Android. In June Android apps are expected to exceed App Store Smartphone usage is shooting up – close to 500 M last year. According to Mobilefuture.org, by 2012 it will exceed combined sales of PC and laptops. According to ATT report, Smartphones account for 30X the bandwidth and the price increase is around 3X. Http is the new tcp. Apps are moving to the cloud and everything –from consumer to business apps and everything in between are accessed over the webAll this is putting intense pressure on all parts of the ecosystem.
  2. Adware – While some forms of adware may be considered legitimate, others make unauthorized access to computer systems and greatly disrupt users.Keyloggers – Typically done in a covert manner, keyloggers track the keys struck on a keyboard and may capture passwords or credit card numbers.Ransomware – After establishing itself on a computer system, ransomware restricts access to the system and demands a ransom be paid to remove it.Rootkits – This type of malware gains privileged access to computer systems and hides itself from normal methods of detection.Spyware – Spyware observes the activities of computer users without their consent and reports it to the software's author or other entity.Trojan Horses – A Trojan Horse initially appears to perform a desirable function and then facilitates unauthorized access to the computer system.Viruses – A computer virus typically attaches itself to an executable file so it can perform malicious activities and replicate itself on other systems.Worms – A worm is a standalone piece of software that, like a virus, can perform malicious activities and replicate itself on other systems.