SlideShare a Scribd company logo
HARMFUL SOFTWARE
Malware and Virus
Software and Computer
 Software is an inseparable component of the computer
 Different types of software have made our work easy
BUT…
Some software that are very harmful for our system and data
Malware
 Combination of two words
Malicious + Software
Software written and developed to create mischief or hurt the user
Various types:
 Virus
 Trojan Horse
 Worms
 Rootkits
 Backdoors
 Ransomware
 Spyware
 Adware
 Sacreware
Purpose of Malware
 In the beginning Malware was written for purpose of
experiments.
 Sometimes, it was also written as a joke.
 With advancement in technology, it is being used with
more intensions:
 Steal Personal informations
 Obtain bank account details and credit card details.
 Disturb activities
 Take control of users computer for illegal activities
 Send email spams
 Advertise products
Symptoms of presence of Malware
 Unexplained messages start appearing on the screen
 Some files deleted on their own.
 Keyboard does not work properly
 Unexplained problems occur while printing files
 Making system unusable/ crashing of the system
 Slowing down of your system
 Automatic rebooting/restarting
 Data on the system becomes inaccessible
 Random playing of strange sounds
Types of Malware
1. Virus
 The term ‘VIRUS’ was first used by John Von Neumann in 1949
 A computer virus is nothing but an electronic version of ‘Biological virus’
Vital
Information
Resource
Under
Siege
 When enters the computer, it replicates itself and cause infection.
CREEPER is widely acclaimed as
the first virus on ARPANET
(First version of Internet)
Types of Viruses
 File Infector Virus: This virus attacks executable files of the computer.
 This virus either deletes or damages files.
 Eg: Sunday, Invader, Cascade
 Boot Sector Virus: Infects the boot sector of hard disk
 Either copies boot sector instructions present in hard disk to some other
location or overwrites these instructions
 Eg: Disk Killer, stone Virus
 Macro Virus: Infects the macro files of MS Office files
 Difficult to detect(They enter the system as a part of office file and appear
non-suspesious)
 Eg: Nuclear, DMV
2. Trojan Horses
 These are ordinary looking files but are actually programs
that delete/ corrupt files.
 They are transferred as innocent attachments to an email.
 They do not replicate themselves.
 They are usually written with the intention of stealing
data.
 These are used to take unauthorized access and control of
infected system.
 Eg: PC-Write (First Trojan Horse in cyber history)
The Trojan Horse can:
 Crash the computer
 Corrupt user data
 Format HD
 Make unauthorized transfer of data/electronic money
 Modify/delete data
 Unnecessary download or upload files
 Control computer remotely
3. Worms
 Viruses are transferred from one system to another as an
attachment to a file or a program.
 Worms can spread on their own. (Do not need the support
of another file)
 Worms are designed only to spread from one computer to
another.
 NOT TO CAUSE CHANGES IN DATA OF THE SYSTEMS.
 Some worms cause problem of increased network traffic.
 Eg: Red Code, Slammer worm, Storm
4. Backdoors
 When you log into a computer system, it asks for the user
name and password
 Backdoor malware has been designed to bypass this
process
 It can get installed to a computer with/without the
knowledge of the user.
 Eg: Subseven, NetBus, Award BIOS
5.Rootkit
 Rootkit is a special type of malware that gives
administrative rights to use the computer.
 Unlike other malware, they are not harmful.
 They are simply cover other malware, gain entry to the
computer and then attack the computer using other
malware like virus, Trojan etc.
 Eg: Back Orifice
6.Spyware
 Spyware is a type of malware that does not
corrupt the computer
 It is designed to collect personal information
about an individual/ organization.
 It is designed to collect informations like web
visiting history of the user
 advertisement start appearing according to
the web visiting history
 Some spyware designed to download unwanted
softwares/files form internet.
 It does not multiply
Symptoms of spyware infected systems:
 Performance of the computer has started
decreasing.
 The free space in the computer HD has
decreased on its own.
 Huge network traffic
 Applications installed on the computer
started closing in their own.
 User has started facing difficulty in
connecting to the computer.
Check your knowledge:
 Macros present in ……………………….. File.
 Ans: Office file
 Malware is written and developed to
create…………… or ………………….. The user.
 Ans: Mischief or Hurt
 ………………… collects information about an
individual or an organization.
 Ans:Spyware
 ………………………. Is considered as the first Trojan
Horse in cyber history
 Ans:PC-write
 …………………….. Is widely acclaimed as the first
virus on ARPANET
 Creeper

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
Computer virus
Computer virusComputer virus
Computer virus
SeethaDinesh
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
Nitish Xavier Tirkey
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
Tamim Ahmed
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
ainizbahari97
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
ShashankRoy11
 
Virus
VirusVirus
Virus
Protik Roy
 
Computer virus
Computer virusComputer virus
Computer virus
Rohit Nayak
 
Computer virus
Computer virusComputer virus
Computer virus
Ra Bia
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
simron2002
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
Ppt123
Ppt123Ppt123
Ppt123
Faiz Khan
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ppt123
Ppt123Ppt123
Ppt123
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 

Similar to Harmful software

Computer viruses
Computer virusesComputer viruses
Computer viruses
nkosana cusson ngwenya
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
AkshayIngole17
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
Robin Garza
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Computervirus
ComputervirusComputervirus
Computervirus
kishan alagiya
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Viruses
VirusesViruses
Viruses
Shahidaffridi
 
Malwares
MalwaresMalwares
Malwares
Abolfazl Naderi
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
aaberra
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
Softex Software House
 

Similar to Harmful software (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Viruses
VirusesViruses
Viruses
 
Malwares
MalwaresMalwares
Malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 

Recently uploaded

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 

Recently uploaded (20)

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 

Harmful software

  • 2. Software and Computer  Software is an inseparable component of the computer  Different types of software have made our work easy BUT… Some software that are very harmful for our system and data
  • 3. Malware  Combination of two words Malicious + Software Software written and developed to create mischief or hurt the user Various types:  Virus  Trojan Horse  Worms  Rootkits  Backdoors  Ransomware  Spyware  Adware  Sacreware
  • 4. Purpose of Malware  In the beginning Malware was written for purpose of experiments.  Sometimes, it was also written as a joke.  With advancement in technology, it is being used with more intensions:  Steal Personal informations  Obtain bank account details and credit card details.  Disturb activities  Take control of users computer for illegal activities  Send email spams  Advertise products
  • 5. Symptoms of presence of Malware  Unexplained messages start appearing on the screen  Some files deleted on their own.  Keyboard does not work properly  Unexplained problems occur while printing files  Making system unusable/ crashing of the system  Slowing down of your system  Automatic rebooting/restarting  Data on the system becomes inaccessible  Random playing of strange sounds
  • 6. Types of Malware 1. Virus  The term ‘VIRUS’ was first used by John Von Neumann in 1949  A computer virus is nothing but an electronic version of ‘Biological virus’ Vital Information Resource Under Siege  When enters the computer, it replicates itself and cause infection. CREEPER is widely acclaimed as the first virus on ARPANET (First version of Internet)
  • 7. Types of Viruses  File Infector Virus: This virus attacks executable files of the computer.  This virus either deletes or damages files.  Eg: Sunday, Invader, Cascade  Boot Sector Virus: Infects the boot sector of hard disk  Either copies boot sector instructions present in hard disk to some other location or overwrites these instructions  Eg: Disk Killer, stone Virus  Macro Virus: Infects the macro files of MS Office files  Difficult to detect(They enter the system as a part of office file and appear non-suspesious)  Eg: Nuclear, DMV
  • 8. 2. Trojan Horses  These are ordinary looking files but are actually programs that delete/ corrupt files.  They are transferred as innocent attachments to an email.  They do not replicate themselves.  They are usually written with the intention of stealing data.  These are used to take unauthorized access and control of infected system.  Eg: PC-Write (First Trojan Horse in cyber history)
  • 9. The Trojan Horse can:  Crash the computer  Corrupt user data  Format HD  Make unauthorized transfer of data/electronic money  Modify/delete data  Unnecessary download or upload files  Control computer remotely
  • 10. 3. Worms  Viruses are transferred from one system to another as an attachment to a file or a program.  Worms can spread on their own. (Do not need the support of another file)  Worms are designed only to spread from one computer to another.  NOT TO CAUSE CHANGES IN DATA OF THE SYSTEMS.  Some worms cause problem of increased network traffic.  Eg: Red Code, Slammer worm, Storm
  • 11. 4. Backdoors  When you log into a computer system, it asks for the user name and password  Backdoor malware has been designed to bypass this process  It can get installed to a computer with/without the knowledge of the user.  Eg: Subseven, NetBus, Award BIOS
  • 12. 5.Rootkit  Rootkit is a special type of malware that gives administrative rights to use the computer.  Unlike other malware, they are not harmful.  They are simply cover other malware, gain entry to the computer and then attack the computer using other malware like virus, Trojan etc.  Eg: Back Orifice
  • 13. 6.Spyware  Spyware is a type of malware that does not corrupt the computer  It is designed to collect personal information about an individual/ organization.  It is designed to collect informations like web visiting history of the user  advertisement start appearing according to the web visiting history  Some spyware designed to download unwanted softwares/files form internet.  It does not multiply
  • 14. Symptoms of spyware infected systems:  Performance of the computer has started decreasing.  The free space in the computer HD has decreased on its own.  Huge network traffic  Applications installed on the computer started closing in their own.  User has started facing difficulty in connecting to the computer.
  • 15. Check your knowledge:  Macros present in ……………………….. File.  Ans: Office file  Malware is written and developed to create…………… or ………………….. The user.  Ans: Mischief or Hurt  ………………… collects information about an individual or an organization.  Ans:Spyware  ………………………. Is considered as the first Trojan Horse in cyber history  Ans:PC-write  …………………….. Is widely acclaimed as the first virus on ARPANET  Creeper