Viruses
• - Attachesto legitimate files or programs
• - Spreads when the host file is executed
• - Can corrupt, delete, or steal data
5.
Worms and Trojans
•Worms:
• - Spread without user action
• - Exploit vulnerabilities in software
• Trojans:
• - Disguise as legitimate software
• - Create backdoors for attackers
6.
Spyware and Adware
•Spyware:
• - Monitors user activity
• - Steals sensitive information
• Adware:
• - Displays unwanted ads
• - May track browsing habits
7.
Ransomware and Rootkits
•Ransomware:
• - Encrypts files and demands ransom
• - Threatens to delete data
• Rootkits:
• - Hide presence of malware
• - Gain unauthorized root-level access
8.
Prevention Tips
• -Install and update antivirus software
• - Avoid clicking suspicious links
• - Keep software and OS updated
• - Use strong passwords
• - Regularly back up important data
9.
Conclusion
• Malicious programspose serious threats to
data and privacy.
• Awareness and preventive measures are key
to protecting systems.