SlideShare a Scribd company logo
1 of 20
Computer software
What is
Software?
 Computer Instructions
or data, anything that
can be stored
electronically is
Software
 Examples: MsWord,
Excel, PowerPoint,
Spreadsheets , library
management system
etc.
Types of
Software
System Software
Application Software
Malicious Software
System Software
 The System Software
consist of the Operating
System and all the utilities
that enable the computer
to function.
 System software actually
controls the hardware so
that application software
can perform any action or
task.
 Example:
 Operating Systems,
Compiler, Loader, Linker,
Interpreter, and etc.
Types of System
Software
Operating System
Utilities
Device Drivers
Language Translators
Application
Software:
 Application Software
includes programs that
do real work for user.
 Example:
 Payroll systems,
Inventory Control,
Manage student
database , Word
Processor, Spreadsheet
and Database
Management System
etc..
Categories of
Application Software
Business Software
Graphic and
Multimedia
Home/Personal/Ed
ucation
Communication
What is a malware?
Malware is short for
malicious software,
meaning software that
can be used to
compromise computer
functions, steal data,
bypass access controls, or
otherwise cause harm to
the host computer.
adware
Adware (short for
advertising-supported
software) is a type of
malware that
automatically delivers
advertisements. Common
examples of adware
include pop-up ads on
websites and
advertisements that are
displayed by the software.
Bot
Bots are software
programs created to
automatically perform
specific operations. While
some bots are created for
relatively harmless
purposes (video gaming,
internet auctions, online
contests, etc), it is
becoming increasingly
common to see bots being
used maliciously.
bug
In the context of
software, a bug is a flaw
produces an undesired
outcome. These flaws
are usually the result of
human error and
typically exist in the
source code or
compilers of a program.
ransomware
 Ransomware is a form of malware that
essentially holds a computer system
captive while demanding a ransom.
The malware restricts user access to
the computer either by encrypting files
on the hard drive or locking down the
system and displaying messages that
are intended to force the user to pay
the malware creator to remove the
restrictions and regain access to their
computer.
rootkit
A rootkit is a type of
malicious software
designed to remotely
access or control a
computer without being
detected by users or
security programs.
spyware
Spyware is a type of
malware that functions by
spying on user activity
without their knowledge.
These spying capabilities
can include activity
monitoring, collecting
keystrokes, data
harvesting (account
information, logins,
financial data), and more.
Trojan horse
A Trojan horse, commonly
known as a “Trojan,” is a
type of malware that
disguises itself as a normal
file or program to trick
users into downloading
and installing malware. A
Trojan can give a malicious
party remote access to an
infected computer.
virus
A virus is a form of
malware that is capable of
copying itself and
spreading to other
computers. Viruses often
spread to other computers
by attaching themselves to
various programs and
executing code when a
user launches one of those
infected programs.
Worm
Computer worms are
among the most common
types of malware. They
spread over the computer
networks by exploiting
operating system
vulnerabilities. Worms
typically harm to their host
networks by consuming
bandwidth and
overloading web servers.
Malware symptoms
• Increased CPU usage
• Slow computer or web browser speeds
• Problems connecting to networks
• Freezing or crashing
• Modified or deleted files
• Appearance of strange files, programs, or desktop icons
• Programs running, turning off, or reconfiguring themselves
(malware will often reconfigure or turn off antivirus and firewall
programs)
• Strange computer behavior
• Emails/messages being sent automatically and without user’s
knowledge (a friend receives a strange email from you that you
did not send)
Malware prevention and removal
 Install and run anti-malware and firewall software. When selecting software, choose
a program that offers tools for detecting, quarantining, and removing multiple
types of malware. At the minimum, anti-malware software should protect against
viruses, spyware, adware, Trojans, and worms. The combination of anti-malware
software and a firewall will ensure that all incoming and existing data gets scanned
for malware and that malware can be safely removed once detected.
 Keep software and operating systems up to date with current vulnerability patches.
These patches are often released to patch bugs or other security flaws that could be
exploited by attackers.
 Be vigilant when downloading files, programs, attachments, etc. Downloads that
seem strange or are from an unfamiliar source often contain malware.
spam
Spam is the electronic
sending of mass
unsolicited messages. The
most common medium for
spam is email, but it is not
uncommon for spammers
to use instant messages,
texting, blogs, web forums,
search engines, and social
media.

More Related Content

Similar to Computer-software (1).pptx

Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfasujal2009
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,Kahir_alrawi
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 

Similar to Computer-software (1).pptx (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
TIC
TICTIC
TIC
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Virus
VirusVirus
Virus
 
computer security
computer securitycomputer security
computer security
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 

More from JohnRebenRequinto1

Marxian Doctrine. Reporting -John Rpptx
Marxian Doctrine. Reporting  -John RpptxMarxian Doctrine. Reporting  -John Rpptx
Marxian Doctrine. Reporting -John RpptxJohnRebenRequinto1
 
motherboardppt-131020054233-phpapp02.pdf
motherboardppt-131020054233-phpapp02.pdfmotherboardppt-131020054233-phpapp02.pdf
motherboardppt-131020054233-phpapp02.pdfJohnRebenRequinto1
 
cssl07-preparingyourbootabledrive-180816061937 (1).pdf
cssl07-preparingyourbootabledrive-180816061937 (1).pdfcssl07-preparingyourbootabledrive-180816061937 (1).pdf
cssl07-preparingyourbootabledrive-180816061937 (1).pdfJohnRebenRequinto1
 
Assembling and disassembling pc. pdf
Assembling and disassembling pc. pdfAssembling and disassembling pc. pdf
Assembling and disassembling pc. pdfJohnRebenRequinto1
 

More from JohnRebenRequinto1 (7)

Marxian Doctrine. Reporting -John Rpptx
Marxian Doctrine. Reporting  -John RpptxMarxian Doctrine. Reporting  -John Rpptx
Marxian Doctrine. Reporting -John Rpptx
 
motherboardppt-131020054233-phpapp02.pdf
motherboardppt-131020054233-phpapp02.pdfmotherboardppt-131020054233-phpapp02.pdf
motherboardppt-131020054233-phpapp02.pdf
 
P2P Lecture.ppt
P2P Lecture.pptP2P Lecture.ppt
P2P Lecture.ppt
 
cssl07-preparingyourbootabledrive-180816061937 (1).pdf
cssl07-preparingyourbootabledrive-180816061937 (1).pdfcssl07-preparingyourbootabledrive-180816061937 (1).pdf
cssl07-preparingyourbootabledrive-180816061937 (1).pdf
 
Assembling and disassembling pc. pdf
Assembling and disassembling pc. pdfAssembling and disassembling pc. pdf
Assembling and disassembling pc. pdf
 
IP-Address (1).pptx
IP-Address (1).pptxIP-Address (1).pptx
IP-Address (1).pptx
 
Tools-and-Equipment.pptx
Tools-and-Equipment.pptxTools-and-Equipment.pptx
Tools-and-Equipment.pptx
 

Recently uploaded

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Computer-software (1).pptx

  • 2. What is Software?  Computer Instructions or data, anything that can be stored electronically is Software  Examples: MsWord, Excel, PowerPoint, Spreadsheets , library management system etc.
  • 4. System Software  The System Software consist of the Operating System and all the utilities that enable the computer to function.  System software actually controls the hardware so that application software can perform any action or task.  Example:  Operating Systems, Compiler, Loader, Linker, Interpreter, and etc.
  • 5. Types of System Software Operating System Utilities Device Drivers Language Translators
  • 6. Application Software:  Application Software includes programs that do real work for user.  Example:  Payroll systems, Inventory Control, Manage student database , Word Processor, Spreadsheet and Database Management System etc..
  • 7. Categories of Application Software Business Software Graphic and Multimedia Home/Personal/Ed ucation Communication
  • 8. What is a malware? Malware is short for malicious software, meaning software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer.
  • 9. adware Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by the software.
  • 10. Bot Bots are software programs created to automatically perform specific operations. While some bots are created for relatively harmless purposes (video gaming, internet auctions, online contests, etc), it is becoming increasingly common to see bots being used maliciously.
  • 11. bug In the context of software, a bug is a flaw produces an undesired outcome. These flaws are usually the result of human error and typically exist in the source code or compilers of a program.
  • 12. ransomware  Ransomware is a form of malware that essentially holds a computer system captive while demanding a ransom. The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer.
  • 13. rootkit A rootkit is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  • 14. spyware Spyware is a type of malware that functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
  • 15. Trojan horse A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. A Trojan can give a malicious party remote access to an infected computer.
  • 16. virus A virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs.
  • 17. Worm Computer worms are among the most common types of malware. They spread over the computer networks by exploiting operating system vulnerabilities. Worms typically harm to their host networks by consuming bandwidth and overloading web servers.
  • 18. Malware symptoms • Increased CPU usage • Slow computer or web browser speeds • Problems connecting to networks • Freezing or crashing • Modified or deleted files • Appearance of strange files, programs, or desktop icons • Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs) • Strange computer behavior • Emails/messages being sent automatically and without user’s knowledge (a friend receives a strange email from you that you did not send)
  • 19. Malware prevention and removal  Install and run anti-malware and firewall software. When selecting software, choose a program that offers tools for detecting, quarantining, and removing multiple types of malware. At the minimum, anti-malware software should protect against viruses, spyware, adware, Trojans, and worms. The combination of anti-malware software and a firewall will ensure that all incoming and existing data gets scanned for malware and that malware can be safely removed once detected.  Keep software and operating systems up to date with current vulnerability patches. These patches are often released to patch bugs or other security flaws that could be exploited by attackers.  Be vigilant when downloading files, programs, attachments, etc. Downloads that seem strange or are from an unfamiliar source often contain malware.
  • 20. spam Spam is the electronic sending of mass unsolicited messages. The most common medium for spam is email, but it is not uncommon for spammers to use instant messages, texting, blogs, web forums, search engines, and social media.