SlideShare a Scribd company logo
Computer software
What is
Software?
 Computer Instructions
or data, anything that
can be stored
electronically is
Software
 Examples: MsWord,
Excel, PowerPoint,
Spreadsheets , library
management system
etc.
Types of
Software
System Software
Application Software
Malicious Software
System Software
 The System Software
consist of the Operating
System and all the utilities
that enable the computer
to function.
 System software actually
controls the hardware so
that application software
can perform any action or
task.
 Example:
 Operating Systems,
Compiler, Loader, Linker,
Interpreter, and etc.
Types of System
Software
Operating System
Utilities
Device Drivers
Language Translators
Application
Software:
 Application Software
includes programs that
do real work for user.
 Example:
 Payroll systems,
Inventory Control,
Manage student
database , Word
Processor, Spreadsheet
and Database
Management System
etc..
Categories of
Application Software
Business Software
Graphic and
Multimedia
Home/Personal/Ed
ucation
Communication
What is a malware?
Malware is short for
malicious software,
meaning software that
can be used to
compromise computer
functions, steal data,
bypass access controls, or
otherwise cause harm to
the host computer.
adware
Adware (short for
advertising-supported
software) is a type of
malware that
automatically delivers
advertisements. Common
examples of adware
include pop-up ads on
websites and
advertisements that are
displayed by the software.
Bot
Bots are software
programs created to
automatically perform
specific operations. While
some bots are created for
relatively harmless
purposes (video gaming,
internet auctions, online
contests, etc), it is
becoming increasingly
common to see bots being
used maliciously.
bug
In the context of
software, a bug is a flaw
produces an undesired
outcome. These flaws
are usually the result of
human error and
typically exist in the
source code or
compilers of a program.
ransomware
 Ransomware is a form of malware that
essentially holds a computer system
captive while demanding a ransom.
The malware restricts user access to
the computer either by encrypting files
on the hard drive or locking down the
system and displaying messages that
are intended to force the user to pay
the malware creator to remove the
restrictions and regain access to their
computer.
rootkit
A rootkit is a type of
malicious software
designed to remotely
access or control a
computer without being
detected by users or
security programs.
spyware
Spyware is a type of
malware that functions by
spying on user activity
without their knowledge.
These spying capabilities
can include activity
monitoring, collecting
keystrokes, data
harvesting (account
information, logins,
financial data), and more.
Trojan horse
A Trojan horse, commonly
known as a “Trojan,” is a
type of malware that
disguises itself as a normal
file or program to trick
users into downloading
and installing malware. A
Trojan can give a malicious
party remote access to an
infected computer.
virus
A virus is a form of
malware that is capable of
copying itself and
spreading to other
computers. Viruses often
spread to other computers
by attaching themselves to
various programs and
executing code when a
user launches one of those
infected programs.
Worm
Computer worms are
among the most common
types of malware. They
spread over the computer
networks by exploiting
operating system
vulnerabilities. Worms
typically harm to their host
networks by consuming
bandwidth and
overloading web servers.
Malware symptoms
• Increased CPU usage
• Slow computer or web browser speeds
• Problems connecting to networks
• Freezing or crashing
• Modified or deleted files
• Appearance of strange files, programs, or desktop icons
• Programs running, turning off, or reconfiguring themselves
(malware will often reconfigure or turn off antivirus and firewall
programs)
• Strange computer behavior
• Emails/messages being sent automatically and without user’s
knowledge (a friend receives a strange email from you that you
did not send)
Malware prevention and removal
 Install and run anti-malware and firewall software. When selecting software, choose
a program that offers tools for detecting, quarantining, and removing multiple
types of malware. At the minimum, anti-malware software should protect against
viruses, spyware, adware, Trojans, and worms. The combination of anti-malware
software and a firewall will ensure that all incoming and existing data gets scanned
for malware and that malware can be safely removed once detected.
 Keep software and operating systems up to date with current vulnerability patches.
These patches are often released to patch bugs or other security flaws that could be
exploited by attackers.
 Be vigilant when downloading files, programs, attachments, etc. Downloads that
seem strange or are from an unfamiliar source often contain malware.
spam
Spam is the electronic
sending of mass
unsolicited messages. The
most common medium for
spam is email, but it is not
uncommon for spammers
to use instant messages,
texting, blogs, web forums,
search engines, and social
media.

More Related Content

Similar to Computer-software (1).pptx

Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
Samiullah Khan
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
T.J. Schiel
 
TIC
TICTIC
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
ShubhamKumarClass10t
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Virus
VirusVirus
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
Kahir_alrawi
 
All about viruses
All about virusesAll about viruses
All about viruses
Kahir_alrawi
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
krunal gandhi
 

Similar to Computer-software (1).pptx (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
TIC
TICTIC
TIC
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Virus
VirusVirus
Virus
 
computer security
computer securitycomputer security
computer security
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 

More from JohnRebenRequinto1

Marxian Doctrine. Reporting -John Rpptx
Marxian Doctrine. Reporting  -John RpptxMarxian Doctrine. Reporting  -John Rpptx
Marxian Doctrine. Reporting -John Rpptx
JohnRebenRequinto1
 
motherboardppt-131020054233-phpapp02.pdf
motherboardppt-131020054233-phpapp02.pdfmotherboardppt-131020054233-phpapp02.pdf
motherboardppt-131020054233-phpapp02.pdf
JohnRebenRequinto1
 
P2P Lecture.ppt
P2P Lecture.pptP2P Lecture.ppt
P2P Lecture.ppt
JohnRebenRequinto1
 
cssl07-preparingyourbootabledrive-180816061937 (1).pdf
cssl07-preparingyourbootabledrive-180816061937 (1).pdfcssl07-preparingyourbootabledrive-180816061937 (1).pdf
cssl07-preparingyourbootabledrive-180816061937 (1).pdf
JohnRebenRequinto1
 
Assembling and disassembling pc. pdf
Assembling and disassembling pc. pdfAssembling and disassembling pc. pdf
Assembling and disassembling pc. pdf
JohnRebenRequinto1
 
IP-Address (1).pptx
IP-Address (1).pptxIP-Address (1).pptx
IP-Address (1).pptx
JohnRebenRequinto1
 
Tools-and-Equipment.pptx
Tools-and-Equipment.pptxTools-and-Equipment.pptx
Tools-and-Equipment.pptx
JohnRebenRequinto1
 

More from JohnRebenRequinto1 (7)

Marxian Doctrine. Reporting -John Rpptx
Marxian Doctrine. Reporting  -John RpptxMarxian Doctrine. Reporting  -John Rpptx
Marxian Doctrine. Reporting -John Rpptx
 
motherboardppt-131020054233-phpapp02.pdf
motherboardppt-131020054233-phpapp02.pdfmotherboardppt-131020054233-phpapp02.pdf
motherboardppt-131020054233-phpapp02.pdf
 
P2P Lecture.ppt
P2P Lecture.pptP2P Lecture.ppt
P2P Lecture.ppt
 
cssl07-preparingyourbootabledrive-180816061937 (1).pdf
cssl07-preparingyourbootabledrive-180816061937 (1).pdfcssl07-preparingyourbootabledrive-180816061937 (1).pdf
cssl07-preparingyourbootabledrive-180816061937 (1).pdf
 
Assembling and disassembling pc. pdf
Assembling and disassembling pc. pdfAssembling and disassembling pc. pdf
Assembling and disassembling pc. pdf
 
IP-Address (1).pptx
IP-Address (1).pptxIP-Address (1).pptx
IP-Address (1).pptx
 
Tools-and-Equipment.pptx
Tools-and-Equipment.pptxTools-and-Equipment.pptx
Tools-and-Equipment.pptx
 

Recently uploaded

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Recently uploaded (20)

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

Computer-software (1).pptx

  • 2. What is Software?  Computer Instructions or data, anything that can be stored electronically is Software  Examples: MsWord, Excel, PowerPoint, Spreadsheets , library management system etc.
  • 4. System Software  The System Software consist of the Operating System and all the utilities that enable the computer to function.  System software actually controls the hardware so that application software can perform any action or task.  Example:  Operating Systems, Compiler, Loader, Linker, Interpreter, and etc.
  • 5. Types of System Software Operating System Utilities Device Drivers Language Translators
  • 6. Application Software:  Application Software includes programs that do real work for user.  Example:  Payroll systems, Inventory Control, Manage student database , Word Processor, Spreadsheet and Database Management System etc..
  • 7. Categories of Application Software Business Software Graphic and Multimedia Home/Personal/Ed ucation Communication
  • 8. What is a malware? Malware is short for malicious software, meaning software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer.
  • 9. adware Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by the software.
  • 10. Bot Bots are software programs created to automatically perform specific operations. While some bots are created for relatively harmless purposes (video gaming, internet auctions, online contests, etc), it is becoming increasingly common to see bots being used maliciously.
  • 11. bug In the context of software, a bug is a flaw produces an undesired outcome. These flaws are usually the result of human error and typically exist in the source code or compilers of a program.
  • 12. ransomware  Ransomware is a form of malware that essentially holds a computer system captive while demanding a ransom. The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer.
  • 13. rootkit A rootkit is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
  • 14. spyware Spyware is a type of malware that functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
  • 15. Trojan horse A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. A Trojan can give a malicious party remote access to an infected computer.
  • 16. virus A virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs.
  • 17. Worm Computer worms are among the most common types of malware. They spread over the computer networks by exploiting operating system vulnerabilities. Worms typically harm to their host networks by consuming bandwidth and overloading web servers.
  • 18. Malware symptoms • Increased CPU usage • Slow computer or web browser speeds • Problems connecting to networks • Freezing or crashing • Modified or deleted files • Appearance of strange files, programs, or desktop icons • Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs) • Strange computer behavior • Emails/messages being sent automatically and without user’s knowledge (a friend receives a strange email from you that you did not send)
  • 19. Malware prevention and removal  Install and run anti-malware and firewall software. When selecting software, choose a program that offers tools for detecting, quarantining, and removing multiple types of malware. At the minimum, anti-malware software should protect against viruses, spyware, adware, Trojans, and worms. The combination of anti-malware software and a firewall will ensure that all incoming and existing data gets scanned for malware and that malware can be safely removed once detected.  Keep software and operating systems up to date with current vulnerability patches. These patches are often released to patch bugs or other security flaws that could be exploited by attackers.  Be vigilant when downloading files, programs, attachments, etc. Downloads that seem strange or are from an unfamiliar source often contain malware.
  • 20. spam Spam is the electronic sending of mass unsolicited messages. The most common medium for spam is email, but it is not uncommon for spammers to use instant messages, texting, blogs, web forums, search engines, and social media.