SlideShare a Scribd company logo
COMPUTER
Presented by
akshat
Welcome
• What are malwares?
• Types of malwares
• What is Computer Virus?
• What is Spam?
• What is spyware?
• What is Adware?
LETS FIND OUT ANSWERS OF ALL THESE!
What is a malware ?
• A Malware is a set of instructions that
run on your computer and make your
system do something that an attacker
wants it to do.
Why hackers use Malwares?
• Steal personal information
• Delete files
• Click fraud
• Steal software serial numbers
• Use your computer as relay
Types Of Malwares
• Virus
• Backdoor
• Trojan horse
• Root kit
• Scare ware
• Adware
• Worm
What is a Virus ?
• A computer virus is a malware program that, when executed,
replicates by inserting copies of itself (possibly modified) into other
computer programs, data files or the boot sector of the hard disk,
when this replication is succeeds, the affected areas are then said to
be as “infected”. Viruses often perform some type of harmful
activity on host information ,corrupting data, displaying political
or humorous messages on the user’s screen, spamming their
contacts, or logging their keystrokes. However not all viruses carry
a destructive payload or attempt to hide themselves. the defining
characteristic of viruses is that they are self-replicating
computer programs which install themselves without the
user's consent.
- Fred Cohen 1983
Some Virus Type
• Polymorphic : Uses a polymorphic
engine to mutate while keeping the
original algorithm intact (packer).
• Metamorpic: Change after each
infection.
What is a trojan
A Trojan describes the class of malware that
appears to perform a desirable function but in fact
performs undisclosed malicious functions that allow
unauthorized access to the victim Computer.
What is rootkit
• A root kit is a component that uses
stealth to maintain a persistent and
undetectable presence on the machine.
What is a worm
A computer worm is a self-replicating computer
program. It uses a network to send copies of itself
to other nodes and do so without any user
intervention.
Almost 30 years of Malware
History
1999 Melissa virus
1999 Zombie concept
1999 Knark root kit
2000 love bug
2001 Code Red Worm
2001 Kernel Intrusion System
2001 Nimda worm
2003 SQL Slammer worm
Number of malware
signatures
0
200000
400000
600000
800000
1000000
1200000
1400000
1600000
1800000
2002 2003 2004 2005 2006 2007 2008
Malware Cases Repartition
74%
3%
1%
9%
13%
Trojan
Worm
Other
Adware
Spyware
SPAM
• “SPAM” is a popular Monty python sketch,
first televised in 1970. In this sketch, two
customers are in greasy spoon café trying to
order a breakfast from a menu that includes
spam in almost all dishes. The term spam in
the context of electronic communications is
derived from this sketch. The sketch was
written by Terry Jones and Michael Palin.
• A person who creates electronic spam is called
a spammer.
Electronic spam
• Electronic spamming is the use of electronic
messaging systems to send unsolicited bulk
messages (spam), especially advertising,
indiscriminately. While the most widely
recognized form of spam is email spam, the
term is applied to similar abuses in other
media: instant message spam, Usenet group
spam, Web search engine spam, spam in
blogs, wiki spam, online classified
adds spam, mobile phone messaging
spam, Internet forum spam, Junk fax
transitions', social spam,
television advertising and file sharing spam.
• Spamming remains economically viable because
advertisers have no operating costs beyond the
management of their mailing lists, and it is difficult
to hold senders accountable for their mass
mailings. Because the barrier to entry is so low,
spammers are numerous, and the volume of
unsolicited mail has become very high. In the year
2011, the estimated figure for spam messages is
around seven trillion. The costs, such as lost
productivity and fraud, are borne by the public
and by internet service providers, which have been
forced to add extra capacity to cope with the
deluge. Spamming has been the subject of
legislation in many jurisdictions.
ACTIONS ON SPAMS
Spyware
• Spyware is software that aids in gathering information about a person or
organization without their knowledge and that may send such information to
another entity without the consumer's consent, or that asserts control over a
computer without the consumer's knowledge.
• Whenever spyware is used for malicious purposes, its presence is typically hidden
from the user and can be difficult to detect. Some spyware, such as key loggers, may
be installed by the owner of a shared, corporate, or public computer intentionally in
order to monitor users.
• While the term spyware suggests software that monitors a user's computing, the
functions of spyware can extend beyond simple monitoring. Spyware can collect
almost any type of data, including personal information like Internet surfing habits,
user logins, and bank or credit account information. Spyware can also interfere with
user control of a computer by installing additional software or redirecting Web
browsers Some spyware can change computer settings, which can result in slow
Internet connection speeds, un-authorized changes in browser settings, or changes to
software settings.
Types of spyware
Spyware is mostly classified into four ways:
• System monitors
• Trojans
• Adware
• Tracking cookies
Adware
• Adware, or advertising-supported software, is
any software package which automatically renders
advertisements in order to generate revenue for its
author. The advertisements may be in the user
interface of the software or on a screen presented
to the user during the installation process. The
functions may be designed to analyze which
Internet sites the user visits and to present
advertising pertinent to the types of goods or
services featured there. The term is sometimes
used to refer to software that displays unwanted
advertisements.
Computers Diseases

More Related Content

What's hot

Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Virus
VirusVirus
Virus
CHITRA S
 
Internet threats
Internet threatsInternet threats
Internet threats
GicelDelaCruz
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
Internet threats
Internet threatsInternet threats
Internet threats
rhustysambile
 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it
Amit Jaglan
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Spyware
SpywareSpyware
Spyware
Ishita Bansal
 
Spyware
SpywareSpyware
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
Buffalo Seminary
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
spyware
spywarespyware
spyware
Akhil Kumar
 
Internet threats
Internet threatsInternet threats
Internet threats
AngelicaMaliwat
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
Spyware
SpywareSpyware
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
Ganeshdev Chavhan
 

What's hot (20)

Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
spyware
spywarespyware
spyware
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware
SpywareSpyware
Spyware
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 

Similar to Computers Diseases

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
ChSheraz3
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
SHUBHA CHATURVEDI
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
Avinash627658
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 

Similar to Computers Diseases (20)

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious
MaliciousMalicious
Malicious
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Malwares
MalwaresMalwares
Malwares
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 

Recently uploaded

The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
OECD Directorate for Financial and Enterprise Affairs
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
Claudio Gallicchio
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
 
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptxThe remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
JiteshKumarChoudhary2
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Ben Linders
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
kainatfatyma9
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
Robin Haunschild
 

Recently uploaded (20)

The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
 
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptxThe remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
 
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
 

Computers Diseases

  • 2. Welcome • What are malwares? • Types of malwares • What is Computer Virus? • What is Spam? • What is spyware? • What is Adware? LETS FIND OUT ANSWERS OF ALL THESE!
  • 3. What is a malware ? • A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
  • 4. Why hackers use Malwares? • Steal personal information • Delete files • Click fraud • Steal software serial numbers • Use your computer as relay
  • 5. Types Of Malwares • Virus • Backdoor • Trojan horse • Root kit • Scare ware • Adware • Worm
  • 6. What is a Virus ? • A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files or the boot sector of the hard disk, when this replication is succeeds, the affected areas are then said to be as “infected”. Viruses often perform some type of harmful activity on host information ,corrupting data, displaying political or humorous messages on the user’s screen, spamming their contacts, or logging their keystrokes. However not all viruses carry a destructive payload or attempt to hide themselves. the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. - Fred Cohen 1983
  • 7. Some Virus Type • Polymorphic : Uses a polymorphic engine to mutate while keeping the original algorithm intact (packer). • Metamorpic: Change after each infection.
  • 8. What is a trojan A Trojan describes the class of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the victim Computer.
  • 9. What is rootkit • A root kit is a component that uses stealth to maintain a persistent and undetectable presence on the machine.
  • 10. What is a worm A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and do so without any user intervention.
  • 11. Almost 30 years of Malware
  • 13. 1999 Melissa virus 1999 Zombie concept 1999 Knark root kit 2000 love bug 2001 Code Red Worm 2001 Kernel Intrusion System 2001 Nimda worm 2003 SQL Slammer worm
  • 16. SPAM • “SPAM” is a popular Monty python sketch, first televised in 1970. In this sketch, two customers are in greasy spoon café trying to order a breakfast from a menu that includes spam in almost all dishes. The term spam in the context of electronic communications is derived from this sketch. The sketch was written by Terry Jones and Michael Palin. • A person who creates electronic spam is called a spammer.
  • 17. Electronic spam • Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant message spam, Usenet group spam, Web search engine spam, spam in blogs, wiki spam, online classified adds spam, mobile phone messaging spam, Internet forum spam, Junk fax transitions', social spam, television advertising and file sharing spam.
  • 18. • Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions. ACTIONS ON SPAMS
  • 19. Spyware • Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. • Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as key loggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. • While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.
  • 20. Types of spyware Spyware is mostly classified into four ways: • System monitors • Trojans • Adware • Tracking cookies
  • 21. Adware • Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. The term is sometimes used to refer to software that displays unwanted advertisements.