SlideShare a Scribd company logo
1 of 12
Download to read offline
Maintenance and
Security Assignment
Different Types of Malware
Virus
A virus is a piece of code
that is capable of copying
itself and typically is there
to destroy the computer.
Trojan Horses
A program designed to
breach the security of a
computer system and
perform some innocuous
function.
Worms
Worms are a self-replicating
program able to propagate
itself across a network.
Spyware
Software that enables the
user to obtain covert
information about another's
computers activities by
transmitting data.
Adware
Software that automatically
displays or downloads
advertisements when a user
is online.
Malevolent Marcos
A macro virus is a computer virus
that "infects" a Microsoft Word or
similar application and causes a
sequence of actions to be
performed automatically when the
application is started or something
else triggers it.
Common signs of an intrusion
- Applications that don't work properly.
- Disks can't be accessed.
- Printing doesn't work correctly.
- Pull-down menus are distorted.
- File size changes for no apparent reason.
- Date of last access does not match date of last use.
- An increase in the number of files on the system when
nothing has been added
- Uncommanded disk drive activity.
- Unusual error messages.
- System slows down, freezes or crashes
Create a list of tips on how
to prevent malware attacks.
- Get anti virus
- -don’t download bootleg things
- don’t click on link from people you don't
trust
- always update your antivirus
- don’t leave your computer unattended so
ppl cant put a usb virus in
Importance of Updating
It is important to update your software
systems, because the company updates
them mostly to make it even more secure
than the last software.They also know
that hackers are always trying to hack
into their softwares, so updating it makes
hacking into more of a challenge.
Importance of Preventive
Maintenance
The importance of
preventing maintenance is
the viruses you obtain
onyourcomputer the slower
it will work and eventually,
not at all.

More Related Content

What's hot

Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Malware and careless computing
Malware and careless computingMalware and careless computing
Malware and careless computingcollimic
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effectguest7b2ba1
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threatsRemo Software
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 

What's hot (20)

Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Malware and careless computing
Malware and careless computingMalware and careless computing
Malware and careless computing
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threats
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 

Viewers also liked

Perspectives-Summer-12
Perspectives-Summer-12Perspectives-Summer-12
Perspectives-Summer-12Adrian Murphy
 
A Post-Agency:Brand Vocabulary POV
A Post-Agency:Brand Vocabulary POVA Post-Agency:Brand Vocabulary POV
A Post-Agency:Brand Vocabulary POVJason Newport
 
Vocabulario tema 4 natural science
Vocabulario tema 4 natural scienceVocabulario tema 4 natural science
Vocabulario tema 4 natural sciencemabel cardenas rueda
 
Submitted Report Final Draft
Submitted Report Final DraftSubmitted Report Final Draft
Submitted Report Final DraftOwen Walton
 
Conventions of a Pop Magazine
Conventions of a Pop MagazineConventions of a Pop Magazine
Conventions of a Pop Magazineludlow8571
 
Visitação da Imagem Peregrina de Nossa Senhora Aparecida
Visitação da Imagem Peregrina de Nossa Senhora AparecidaVisitação da Imagem Peregrina de Nossa Senhora Aparecida
Visitação da Imagem Peregrina de Nossa Senhora AparecidaParoquiaDeSaoPedro
 
Folha de São Pedro - O Jornal da Paróquia de São Pedro (Salvador-BA) - Janeir...
Folha de São Pedro - O Jornal da Paróquia de São Pedro (Salvador-BA) - Janeir...Folha de São Pedro - O Jornal da Paróquia de São Pedro (Salvador-BA) - Janeir...
Folha de São Pedro - O Jornal da Paróquia de São Pedro (Salvador-BA) - Janeir...ParoquiaDeSaoPedro
 
design and fabrication of soya seed fabrication machine
design and fabrication of soya seed fabrication machinedesign and fabrication of soya seed fabrication machine
design and fabrication of soya seed fabrication machineBHASKAR KULKARNI
 
iProspect Client Summit 2014
iProspect Client Summit 2014iProspect Client Summit 2014
iProspect Client Summit 2014Jason Newport
 
INsightYoung'10: Traits And Tools -Indian Youth Insights from INgene
INsightYoung'10:  Traits And Tools -Indian Youth Insights from INgeneINsightYoung'10:  Traits And Tools -Indian Youth Insights from INgene
INsightYoung'10: Traits And Tools -Indian Youth Insights from INgenekaustav sengupta
 
Indian youth trend insights from INgene
Indian youth trend insights from INgeneIndian youth trend insights from INgene
Indian youth trend insights from INgenekaustav sengupta
 
Youth Trends & Insights
Youth Trends & InsightsYouth Trends & Insights
Youth Trends & InsightsJason Newport
 

Viewers also liked (19)

CIS B_Consulting 2
CIS B_Consulting 2CIS B_Consulting 2
CIS B_Consulting 2
 
Cv david sugarman
Cv david sugarman Cv david sugarman
Cv david sugarman
 
Perspectives-Summer-12
Perspectives-Summer-12Perspectives-Summer-12
Perspectives-Summer-12
 
A Post-Agency:Brand Vocabulary POV
A Post-Agency:Brand Vocabulary POVA Post-Agency:Brand Vocabulary POV
A Post-Agency:Brand Vocabulary POV
 
Indian Youth
Indian YouthIndian Youth
Indian Youth
 
Vocabulario tema 4 natural science
Vocabulario tema 4 natural scienceVocabulario tema 4 natural science
Vocabulario tema 4 natural science
 
Google
GoogleGoogle
Google
 
Submitted Report Final Draft
Submitted Report Final DraftSubmitted Report Final Draft
Submitted Report Final Draft
 
CV
CVCV
CV
 
ACKNOWLE.RTF
ACKNOWLE.RTFACKNOWLE.RTF
ACKNOWLE.RTF
 
Conventions of a Pop Magazine
Conventions of a Pop MagazineConventions of a Pop Magazine
Conventions of a Pop Magazine
 
Maize starch and industrial applications
Maize starch and industrial applicationsMaize starch and industrial applications
Maize starch and industrial applications
 
Visitação da Imagem Peregrina de Nossa Senhora Aparecida
Visitação da Imagem Peregrina de Nossa Senhora AparecidaVisitação da Imagem Peregrina de Nossa Senhora Aparecida
Visitação da Imagem Peregrina de Nossa Senhora Aparecida
 
Folha de São Pedro - O Jornal da Paróquia de São Pedro (Salvador-BA) - Janeir...
Folha de São Pedro - O Jornal da Paróquia de São Pedro (Salvador-BA) - Janeir...Folha de São Pedro - O Jornal da Paróquia de São Pedro (Salvador-BA) - Janeir...
Folha de São Pedro - O Jornal da Paróquia de São Pedro (Salvador-BA) - Janeir...
 
design and fabrication of soya seed fabrication machine
design and fabrication of soya seed fabrication machinedesign and fabrication of soya seed fabrication machine
design and fabrication of soya seed fabrication machine
 
iProspect Client Summit 2014
iProspect Client Summit 2014iProspect Client Summit 2014
iProspect Client Summit 2014
 
INsightYoung'10: Traits And Tools -Indian Youth Insights from INgene
INsightYoung'10:  Traits And Tools -Indian Youth Insights from INgeneINsightYoung'10:  Traits And Tools -Indian Youth Insights from INgene
INsightYoung'10: Traits And Tools -Indian Youth Insights from INgene
 
Indian youth trend insights from INgene
Indian youth trend insights from INgeneIndian youth trend insights from INgene
Indian youth trend insights from INgene
 
Youth Trends & Insights
Youth Trends & InsightsYouth Trends & Insights
Youth Trends & Insights
 

Similar to Different Types of Malware and Signs of Intrusion

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 

Similar to Different Types of Malware and Signs of Intrusion (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Computervirus
Computervirus Computervirus
Computervirus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
TIC
TICTIC
TIC
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 

Different Types of Malware and Signs of Intrusion

  • 3. Virus A virus is a piece of code that is capable of copying itself and typically is there to destroy the computer.
  • 4. Trojan Horses A program designed to breach the security of a computer system and perform some innocuous function.
  • 5. Worms Worms are a self-replicating program able to propagate itself across a network.
  • 6. Spyware Software that enables the user to obtain covert information about another's computers activities by transmitting data.
  • 7. Adware Software that automatically displays or downloads advertisements when a user is online.
  • 8. Malevolent Marcos A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it.
  • 9. Common signs of an intrusion - Applications that don't work properly. - Disks can't be accessed. - Printing doesn't work correctly. - Pull-down menus are distorted. - File size changes for no apparent reason. - Date of last access does not match date of last use. - An increase in the number of files on the system when nothing has been added - Uncommanded disk drive activity. - Unusual error messages. - System slows down, freezes or crashes
  • 10. Create a list of tips on how to prevent malware attacks. - Get anti virus - -don’t download bootleg things - don’t click on link from people you don't trust - always update your antivirus - don’t leave your computer unattended so ppl cant put a usb virus in
  • 11. Importance of Updating It is important to update your software systems, because the company updates them mostly to make it even more secure than the last software.They also know that hackers are always trying to hack into their softwares, so updating it makes hacking into more of a challenge.
  • 12. Importance of Preventive Maintenance The importance of preventing maintenance is the viruses you obtain onyourcomputer the slower it will work and eventually, not at all.