copy to clipboardcopied to clipboard
  1. Home
  2. Help

Answer

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Background

Malware is designed to covertly operate on a compromised system without the consent of the user, such as: Trojan Horse - disguised in what appears to be legitimate software, relies on the user to download it and run it on the target. Virus - infects other programs/files of a target via code injection, can corrupt or delete data, use the user's email to spread, or erase everything on a hard disk. Worm - self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.


If you have any further questions regarding the SupplierAssurance platform, please use our Live Web chat where our support team will be happy to assist you with further information and guidance.

NQC will aim to respond to all support queries within 2 working days.


Was this page helpful? 👍 👎
Your session will end in less than two minutes unless we detect activity in your browser
Are you sure you wish to end this chat? Are you sure you wish to disconnect this chat? New chat message from Please use the 'End Chat' link to end this chat and close the window. Do you want to reset the chat window position? Reset windows