3. What is Computer malware infection?
Computer malware infection refers to any software program or code
designed to disrupt, damage, and gain unauthorized access to a
computer system.
It’s intent is to exploit vulnerabilities in computer system and network
in order to steal information, cause harm or take control over the
system.
4. Common types of malware
Virus
Worm
Trojan horse
Spyware
Ransom ware
Botnets
Keyloggers
5. What is virus?
Virus is a malicious program that is able to attach itself to executable
program that is able to spread from one computer to another and cause
damage and destruction.
common signs of virus
Shrinking storage space
Slow start up and slow performance
Missing files
Email hijacked
Security attacks
6. What is a worm?
A worm is a self-replicating virus that does not alter files but resides
in active memory and duplicate itself.
Worms use parts of an operating system that are automatic and
usually invisible to the user.
They can only be noticed when their uncontrolled replication
consumes system resources , slowing or halting other tasks.
7. What is ransomware?
Ransomware is a malware that is capable of blocking a computer and
threaten to erase everything Unless a ransom is paid to it’s owner.
It is designed to extort Money from individuals or organizations.
8. What is botnet?
Botnets are networks of infected computers that are made to work
together under the control of an attacker.
These botnets can be used to launch coordinated attacks, send spam
mails and Carry out other malicious activities.
9. What is Trojan horse?
Trojan horse horse is any program that invites the user to run it, concealing
harmful or malicious code
The code take effect immediately and can lead to many undesirable effect
such as deleting the user’s files or installing harmful software.
10. What is spyware?
Spyware is a type of malware installed in computers to collect
information about users Online activities login credentials and
Personal information without their knowledge.
The spyware is typically hidden from the user and can be difficult to
detect.
It can be used to identity theft and fraud.
11. What is keyloggers
Keylogger is a program installed on a victim’s machine to record every
keystroke that a user makes .
These tools can obviously be very useful for stealing login and password
details.
Data can be used for identity theft or unauthorized access.
12. Solutions to deal with malware infection
Install antivirus /malware software.
Keep anti-virus software up to date.
Run regularly scheduled scans with anti-virus software.
Keep operating system current.
Secure the network.
Keep personal information safe.
Don’t use open Wi-Fi.
Back up files.
13. What is Anti-virus?
This is the most popular software that is used to prevent, scan, detect, and
delete viruses from a computer.
The picture below shows the examples of anti-virus software.
14. Conclusion
Remember, prevention is key when it comes to protecting yourself
from malware infections. Stay vigilant and adopt these good
cybersecurity practices to reduce the risk of falling victim to
malware. If you suspect your device is infected, seek professional help
to remove the malware and secure your system. Stay safe!