• Like
Malware
Upcoming SlideShare
Loading in...5
×
Uploaded on

Assignment 4 by Max Lindholm

Assignment 4 by Max Lindholm

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
396
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
23
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. As a risk or a threat in social media in marketing
  • 2.  What is malware? Avoid malware How to detect malware How to get rid of malware Computer viruses Different types of viruses Litterature
  • 3.  Malware is short for malicious software It’s usually includes viruses and spyware that infects your computer or smartphone Malwares can be very troublesome and can even crash computers Criminals use malware for identity theft
  • 4.  The easiest way is to keep your antivirus and firewall up to date Don’t open “trash mail” or visit any suspicious websites Back up your data
  • 5.  By monitoring your computer you will be able to identify a possible malware Especially if your computer is acting slow, crashes or displays repeated error messages Other signs might be new unwanted toolbars, new icons on your desktop or changes in your internet homepage
  • 6.  Virus-protection programs on the computer can handle most of the usual malwares For more complicated malware it’s good to take your computer to a ”tech support” or a manufacturer You can also report malwares to the federal trade commission
  • 7.  Computer viruses can be used as malware The computer virus is a small software that ”piggybacks on a program. There are different types of viruses: viruses, e- mail viruses, trojan horses and worms
  • 8.  Viruses: Each time an infected program runs, the virus runs too, and it infects other programs while it’s conscious E-mail viruses: E-mail viruses travels as an attachment to a e-mail. It also replicates by sending itself to other e-mail addresses Trojan horses: Is a computer program. It’s usually disguised as another program(for ex. a game). It can erase your hard disk. Trojan horses doesn’t replicate automatically Worms: Worms are small pieces of software that uses security holes and computer networks to reduplicate. They are often very advanced and scans network for security holes
  • 9.  http://www.onguardonline.gov/articles/0011 -malware, 17.10.12 http://computer.howstuffworks.com/virus.ht m, 17.10.12 http://en.wikipedia.org/wiki/Malware,17.10. 12