SlideShare a Scribd company logo
1 of 15
COMPUTER MALWARE INFECTION
NAME: ‘MAKOMOTERE MONOKOANE
EMAIL:makomoteremonokoane@gmail.com
I am a DEP3 student from Lesotho college of
education
What is Computer malware infection?
 Computer malware infection refers to any software program or code
designed to disrupt, damage, and gain unauthorized access to a
computer system.
 It’s intent is to exploit vulnerabilities in computer system and network
in order to steal information, cause harm or take control over the
system.
Common types of malware
 Virus
 Worm
 Trojan horse
 Spyware
 Ransom ware
 Botnets
 Keyloggers
What is virus?
Virus is a malicious program that is able to attach itself to executable
program that is able to spread from one computer to another and cause
damage and destruction.
common signs of virus
 Shrinking storage space
 Slow start up and slow performance
 Missing files
 Email hijacked
 Security attacks
What is a worm?
 A worm is a self-replicating virus that does not alter files but resides
in active memory and duplicate itself.
 Worms use parts of an operating system that are automatic and
usually invisible to the user.
 They can only be noticed when their uncontrolled replication
consumes system resources , slowing or halting other tasks.
What is ransomware?
 Ransomware is a malware that is capable of blocking a computer and
threaten to erase everything Unless a ransom is paid to it’s owner.
 It is designed to extort Money from individuals or organizations.
What is botnet?
 Botnets are networks of infected computers that are made to work
together under the control of an attacker.
 These botnets can be used to launch coordinated attacks, send spam
mails and Carry out other malicious activities.
What is Trojan horse?
 Trojan horse horse is any program that invites the user to run it, concealing
harmful or malicious code
 The code take effect immediately and can lead to many undesirable effect
such as deleting the user’s files or installing harmful software.
What is spyware?
 Spyware is a type of malware installed in computers to collect
information about users Online activities login credentials and
Personal information without their knowledge.
 The spyware is typically hidden from the user and can be difficult to
detect.
 It can be used to identity theft and fraud.
What is keyloggers
 Keylogger is a program installed on a victim’s machine to record every
keystroke that a user makes .
 These tools can obviously be very useful for stealing login and password
details.
 Data can be used for identity theft or unauthorized access.
Solutions to deal with malware infection
 Install antivirus /malware software.
 Keep anti-virus software up to date.
 Run regularly scheduled scans with anti-virus software.
 Keep operating system current.
 Secure the network.
 Keep personal information safe.
 Don’t use open Wi-Fi.
 Back up files.
What is Anti-virus?
 This is the most popular software that is used to prevent, scan, detect, and
delete viruses from a computer.
 The picture below shows the examples of anti-virus software.
Conclusion
Remember, prevention is key when it comes to protecting yourself
from malware infections. Stay vigilant and adopt these good
cybersecurity practices to reduce the risk of falling victim to
malware. If you suspect your device is infected, seek professional help
to remove the malware and secure your system. Stay safe!
Reference
 https:www.Techtarget.com /searchsecurity/definition/malware
 https://novaappai.page.link/edcjbtSC8YUa7SxW8

More Related Content

Similar to Malware

Similar to Malware (20)

Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
TIC
TICTIC
TIC
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Virus
VirusVirus
Virus
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
virus
virusvirus
virus
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Malware

  • 2. NAME: ‘MAKOMOTERE MONOKOANE EMAIL:makomoteremonokoane@gmail.com I am a DEP3 student from Lesotho college of education
  • 3. What is Computer malware infection?  Computer malware infection refers to any software program or code designed to disrupt, damage, and gain unauthorized access to a computer system.  It’s intent is to exploit vulnerabilities in computer system and network in order to steal information, cause harm or take control over the system.
  • 4. Common types of malware  Virus  Worm  Trojan horse  Spyware  Ransom ware  Botnets  Keyloggers
  • 5. What is virus? Virus is a malicious program that is able to attach itself to executable program that is able to spread from one computer to another and cause damage and destruction. common signs of virus  Shrinking storage space  Slow start up and slow performance  Missing files  Email hijacked  Security attacks
  • 6. What is a worm?  A worm is a self-replicating virus that does not alter files but resides in active memory and duplicate itself.  Worms use parts of an operating system that are automatic and usually invisible to the user.  They can only be noticed when their uncontrolled replication consumes system resources , slowing or halting other tasks.
  • 7. What is ransomware?  Ransomware is a malware that is capable of blocking a computer and threaten to erase everything Unless a ransom is paid to it’s owner.  It is designed to extort Money from individuals or organizations.
  • 8. What is botnet?  Botnets are networks of infected computers that are made to work together under the control of an attacker.  These botnets can be used to launch coordinated attacks, send spam mails and Carry out other malicious activities.
  • 9. What is Trojan horse?  Trojan horse horse is any program that invites the user to run it, concealing harmful or malicious code  The code take effect immediately and can lead to many undesirable effect such as deleting the user’s files or installing harmful software.
  • 10. What is spyware?  Spyware is a type of malware installed in computers to collect information about users Online activities login credentials and Personal information without their knowledge.  The spyware is typically hidden from the user and can be difficult to detect.  It can be used to identity theft and fraud.
  • 11. What is keyloggers  Keylogger is a program installed on a victim’s machine to record every keystroke that a user makes .  These tools can obviously be very useful for stealing login and password details.  Data can be used for identity theft or unauthorized access.
  • 12. Solutions to deal with malware infection  Install antivirus /malware software.  Keep anti-virus software up to date.  Run regularly scheduled scans with anti-virus software.  Keep operating system current.  Secure the network.  Keep personal information safe.  Don’t use open Wi-Fi.  Back up files.
  • 13. What is Anti-virus?  This is the most popular software that is used to prevent, scan, detect, and delete viruses from a computer.  The picture below shows the examples of anti-virus software.
  • 14. Conclusion Remember, prevention is key when it comes to protecting yourself from malware infections. Stay vigilant and adopt these good cybersecurity practices to reduce the risk of falling victim to malware. If you suspect your device is infected, seek professional help to remove the malware and secure your system. Stay safe!