SlideShare a Scribd company logo
1 of 22
FUNDAMENTALS OF CYBERSECURITY
PRESENTATION
TOPIC –MALWARE
GROUP MEMBERS
SREELAKSHMI SUNEESH-21BCAR0331
RAKSHIT SETHI-21BCAR0322
RUBY SAHA-21BCAR0323
SHRAVAN DUBEY-21BCAR0338
WHAT IS MALWARE?
• Malware is intrusive software that is designed to damage and destroy
computers and computer systems.
• Malware is a contraction for “malicious software”.
• Malware gets installed in your device and performs
unwanted tasks.
• Mainly designed to transmit information about your web
browsing habits to the third party
TYPES OF MALWARES
• Virus
• Worms
• Spyware
• Adware
• Trojan Horse
• Fileless Malware
• Ransomware
• keylogger
• Bot/Botnets
VIRUS
• Virus is a program written to enter to your computer and damage/alter your
files/data.
• A virus might corrupt or delete data on your computer. Viruses can also
replicate themselves.
• A computer Virus is more dangerous than a computer worm as it makes
changes or deletes your files while worms only replicates itself with out making
changes to your files/data.
• . Once downloaded, the virus will lay dormant until the file is opened and in use.
• Viruses are designed to disrupt a system’s ability to operate. As a result,
viruses can cause significant operational issues and data loss
WORMS
• Worms are a malicious software that rapidly
replicates and spreads to any device within the
network.
• Unlike viruses, worms do not need host
programs to disseminate.
• A worm infects a device via a downloaded file
or a network connection before it multiplies
and disperses at an exponential rate.
• It doesn’t harm any data/file on the computer.
• Unlike a virus, it does not need to attach itself
to an existing program.
• Worms spread by exploiting vulnerabilities in
operating systems
• worms can be used by malicious actors to
launch DDoS attacks
• Eg- Stuxnet
SPYWARE • Spyware is installed with or without your permission on
your personal computers to collect information about
users, their computer or browsing habits tracks each and
everything that you do without your knowledge and send
it to remote user.
• Rather than simply disrupting a device’s operations,
spyware targets sensitive information and can grant
remote access to predators.
• Spyware is often used to steal financial or personal
information.
• It also can download other malicious programs from
internet and install it on the computer.
• Spyware works like adware but is usually a separate
program that is installed unknowingly when you install
another freeware type program or application.
• A specific type of spyware is a keylogger, which records
your keystrokes to reveal passwords and personal
information.
• Eg- DarkHotel
ADWARE
• Adware is malicious software used to
collect data on your computer usage
and provide appropriate advertisements
to you.
• While adware is not always dangerous,
in some cases adware can cause
issues for your system.
• Adware can redirect your browser to
unsafe sites, and it can even contain
Trojan horses and spyware.
• Additionally, significant levels of
adware can slow down your system
noticeably.
• Because not all adware is malicious, it
is important to have protection that
constantly and intelligently scans these
programs.
• Eg- Fireball
TROJAN HORSE • A Trojan horse is not a virus. It is a
destructive program that looks as a
genuine application.
• Unlike viruses, Trojan horses do not
replicate themselves but they can be
just as destructive.
• Trojans also open a backdoor entry to
your computer which gives malicious
users/programs access to your system,
allowing confidential and personal
information to be theft.
• Once the user downloads it, the Trojan
virus can gain access to sensitive data
and then modify, block, or delete the
data.
• Eg- Emotet
RANSOMWARE
• Ransomware is malicious software
that gains access to sensitive
information within a system, encrypts
that information so that the user
cannot access it, and then demands a
financial payout for the data to be
released.
• Ransomware is commonly part of a
phishing scam.
• By clicking a disguised link, the user
downloads the ransomware.
• The attacker proceeds to encrypt
specific information that can only be
opened by a mathematical key they
know. When the attacker receives
payment, the data is unlocked.
• Eg- RobbinHood
FILELESS MALWARE
• Fileless malware is a type of
memory-resident malware.
• As the term suggests, it is
malware that operates from a
victim’s computer’s memory,
not from files on the hard drive.
• Because there are no files to
scan, it is harder to detect than
traditional malware.
• It also makes forensics more
difficult because the malware
disappears when the victim
computer is rebooted.
• In late 2017, the Cisco Talos
threat intelligence team posted
an example of fileless malware
that they called
DNSMessenger.
• Eg- Astaroth
ROOTKITS
• A rootkit is software that gives
malicious actors remote control
of a victim’s computer with full
administrative privileges.
• Rootkits can be injected into
applications, kernels,
hypervisors, or firmware.
• They spread through phishing,
malicious attachments,
malicious downloads, and
compromised shared drives.
• Rootkits can also be used to
conceal other malware, such as
keyloggers.
KEYLOGGER
• A keylogger is a type of spyware that
monitors user activity. Keyloggers
have legitimate uses; businesses can
use them to monitor employee activity
and families may use them to keep
track of children’s online behaviors.
• However, when installed for malicious
purposes, keyloggers can be used to
steal password data, banking
information and other sensitive
information.
• Keyloggers can be inserted into a
system through phishing, social
engineering or malicious downloads.
• Eg- Olympic Vision
BOT/BOTNETS
• A bot is a software application that
performs automated tasks on
command.
• They’re used for legitimate purposes,
such as indexing search engines, but
when used for malicious purposes,
they take the form of self-
propagating malware that can
connect back to a central server.
• Usually, bots are used in large
numbers to create a botnet, which is
a network of bots used to launch
broad remotely-controlled floods of
attacks, such as DDoS attacks.
Botnets can become quite expansive.
• For example, the Mirai IoT botnet
ranged from 800,000 to 2.5M
computers.
• Eg- Echobot
HOW TO DETECT AND RESPOND TO MALWARE?
• Malware will inevitably penetrate your network.
• You must have defences that provide significant visibility and breach
detection.
• In order to remove malware, you must be able to identify malicious actors
quickly. This requires constant network scanning.
• Once the threat is identified, you must remove the malware from your
network.
PROTECTING AGAINST MALWARE
• Malware security protection provides that second vital layer of protection for
your computer or network.
• A robust antivirus software package is the primary component of technological
defenses that every personal and business computer system should have.
• Well-designed antivirus protection has several characteristics. It checks any
newly downloaded program to ensure that it is malware-free.
• It periodically scans the computer to detect and defeat any malware that might
have slipped through.
• It is regularly updated to recognize the latest threats.
ANTIVIRUS / ANTI-MALWARE SOFTWARE
• For example, Microsoft Security Essentials (for Windows XP, Vista, and
Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides
real-time protection.
• The Windows Malicious Software Removal Tool removes malicious
software from the system.
• Additionally, several capable antivirus software programs are available for
free download from the Internet (usually restricted to non-commercial use).
ANTIVIRUS / ANTI-MALWARE SOFTWARE
• Real-time protection: They can provide real time protection against the
installation of malware software on a computer. This type of malware
protection works the same way as that of antivirus protection in that the
anti-malware software scans all incoming network data for malware and
blocks any threats it comes across.
• Sandboxing: Provide sandboxing of apps considered dangerous (such as
web browsers where most vulnerabilities are likely to be installed from)
ANTIVIRUS / ANTI-MALWARE SOFTWARE
• Removal: Anti-malware software programs can be used solely for detection
and removal of malware software that has already been installed onto a
computer. This type of anti-malware software scans the contents of the
Windows registry, operating system files, and installed programs on a
computer and will provide a list of any threats found, allowing the user to
choose which files to delete or keep, or to compare this list to a list of
known malware components, removing files that match.
MALWARE DETECTION TECHNIQUES
• Anomaly-based: Uses its knowledge of what constitutes
normal behaviour to decide the maliciousness of a program•
• Specification-based detection: leverage a rule set of what is
valid behaviour
• Signature-based: Uses its characterization of what is known
to be malicious to decide the maliciousness of a program
MALWARE DETECTION TECHNIQUES
• Specific approach is determined by how the technique gathers information
to detect malware
• Static analysis: Before the program under inspection executes i.e.
Sequence of bytes
• Dynamic analysis: During or after program execution i.e. Systems seen on
the runtime stack
Thankyou

More Related Content

What's hot

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 

What's hot (20)

Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Malware
MalwareMalware
Malware
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Malicious
MaliciousMalicious
Malicious
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security threats
Security threatsSecurity threats
Security threats
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Ransomware
RansomwareRansomware
Ransomware
 
System security
System securitySystem security
System security
 

Similar to Malware ppt final.pptx

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.SangishettyDikshitha
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virusKennethMorales26
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)SHUBHA CHATURVEDI
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfWajdiElhamzi3
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 

Similar to Malware ppt final.pptx (20)

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
information about virus
information about virusinformation about virus
information about virus
 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Recently uploaded (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

Malware ppt final.pptx

  • 1. FUNDAMENTALS OF CYBERSECURITY PRESENTATION TOPIC –MALWARE GROUP MEMBERS SREELAKSHMI SUNEESH-21BCAR0331 RAKSHIT SETHI-21BCAR0322 RUBY SAHA-21BCAR0323 SHRAVAN DUBEY-21BCAR0338
  • 2. WHAT IS MALWARE? • Malware is intrusive software that is designed to damage and destroy computers and computer systems. • Malware is a contraction for “malicious software”. • Malware gets installed in your device and performs unwanted tasks. • Mainly designed to transmit information about your web browsing habits to the third party
  • 3. TYPES OF MALWARES • Virus • Worms • Spyware • Adware • Trojan Horse • Fileless Malware • Ransomware • keylogger • Bot/Botnets
  • 4. VIRUS • Virus is a program written to enter to your computer and damage/alter your files/data. • A virus might corrupt or delete data on your computer. Viruses can also replicate themselves. • A computer Virus is more dangerous than a computer worm as it makes changes or deletes your files while worms only replicates itself with out making changes to your files/data. • . Once downloaded, the virus will lay dormant until the file is opened and in use. • Viruses are designed to disrupt a system’s ability to operate. As a result, viruses can cause significant operational issues and data loss
  • 5. WORMS • Worms are a malicious software that rapidly replicates and spreads to any device within the network. • Unlike viruses, worms do not need host programs to disseminate. • A worm infects a device via a downloaded file or a network connection before it multiplies and disperses at an exponential rate. • It doesn’t harm any data/file on the computer. • Unlike a virus, it does not need to attach itself to an existing program. • Worms spread by exploiting vulnerabilities in operating systems • worms can be used by malicious actors to launch DDoS attacks • Eg- Stuxnet
  • 6. SPYWARE • Spyware is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user. • Rather than simply disrupting a device’s operations, spyware targets sensitive information and can grant remote access to predators. • Spyware is often used to steal financial or personal information. • It also can download other malicious programs from internet and install it on the computer. • Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application. • A specific type of spyware is a keylogger, which records your keystrokes to reveal passwords and personal information. • Eg- DarkHotel
  • 7. ADWARE • Adware is malicious software used to collect data on your computer usage and provide appropriate advertisements to you. • While adware is not always dangerous, in some cases adware can cause issues for your system. • Adware can redirect your browser to unsafe sites, and it can even contain Trojan horses and spyware. • Additionally, significant levels of adware can slow down your system noticeably. • Because not all adware is malicious, it is important to have protection that constantly and intelligently scans these programs. • Eg- Fireball
  • 8. TROJAN HORSE • A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. • Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. • Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft. • Once the user downloads it, the Trojan virus can gain access to sensitive data and then modify, block, or delete the data. • Eg- Emotet
  • 9. RANSOMWARE • Ransomware is malicious software that gains access to sensitive information within a system, encrypts that information so that the user cannot access it, and then demands a financial payout for the data to be released. • Ransomware is commonly part of a phishing scam. • By clicking a disguised link, the user downloads the ransomware. • The attacker proceeds to encrypt specific information that can only be opened by a mathematical key they know. When the attacker receives payment, the data is unlocked. • Eg- RobbinHood
  • 10. FILELESS MALWARE • Fileless malware is a type of memory-resident malware. • As the term suggests, it is malware that operates from a victim’s computer’s memory, not from files on the hard drive. • Because there are no files to scan, it is harder to detect than traditional malware. • It also makes forensics more difficult because the malware disappears when the victim computer is rebooted. • In late 2017, the Cisco Talos threat intelligence team posted an example of fileless malware that they called DNSMessenger. • Eg- Astaroth
  • 11. ROOTKITS • A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges. • Rootkits can be injected into applications, kernels, hypervisors, or firmware. • They spread through phishing, malicious attachments, malicious downloads, and compromised shared drives. • Rootkits can also be used to conceal other malware, such as keyloggers.
  • 12. KEYLOGGER • A keylogger is a type of spyware that monitors user activity. Keyloggers have legitimate uses; businesses can use them to monitor employee activity and families may use them to keep track of children’s online behaviors. • However, when installed for malicious purposes, keyloggers can be used to steal password data, banking information and other sensitive information. • Keyloggers can be inserted into a system through phishing, social engineering or malicious downloads. • Eg- Olympic Vision
  • 13. BOT/BOTNETS • A bot is a software application that performs automated tasks on command. • They’re used for legitimate purposes, such as indexing search engines, but when used for malicious purposes, they take the form of self- propagating malware that can connect back to a central server. • Usually, bots are used in large numbers to create a botnet, which is a network of bots used to launch broad remotely-controlled floods of attacks, such as DDoS attacks. Botnets can become quite expansive. • For example, the Mirai IoT botnet ranged from 800,000 to 2.5M computers. • Eg- Echobot
  • 14. HOW TO DETECT AND RESPOND TO MALWARE? • Malware will inevitably penetrate your network. • You must have defences that provide significant visibility and breach detection. • In order to remove malware, you must be able to identify malicious actors quickly. This requires constant network scanning. • Once the threat is identified, you must remove the malware from your network.
  • 15. PROTECTING AGAINST MALWARE • Malware security protection provides that second vital layer of protection for your computer or network. • A robust antivirus software package is the primary component of technological defenses that every personal and business computer system should have. • Well-designed antivirus protection has several characteristics. It checks any newly downloaded program to ensure that it is malware-free. • It periodically scans the computer to detect and defeat any malware that might have slipped through. • It is regularly updated to recognize the latest threats.
  • 16. ANTIVIRUS / ANTI-MALWARE SOFTWARE • For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. • The Windows Malicious Software Removal Tool removes malicious software from the system. • Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).
  • 17. ANTIVIRUS / ANTI-MALWARE SOFTWARE • Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. • Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from)
  • 18. ANTIVIRUS / ANTI-MALWARE SOFTWARE • Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.
  • 19.
  • 20. MALWARE DETECTION TECHNIQUES • Anomaly-based: Uses its knowledge of what constitutes normal behaviour to decide the maliciousness of a program• • Specification-based detection: leverage a rule set of what is valid behaviour • Signature-based: Uses its characterization of what is known to be malicious to decide the maliciousness of a program
  • 21. MALWARE DETECTION TECHNIQUES • Specific approach is determined by how the technique gathers information to detect malware • Static analysis: Before the program under inspection executes i.e. Sequence of bytes • Dynamic analysis: During or after program execution i.e. Systems seen on the runtime stack