SlideShare a Scribd company logo
1 of 38
WHAT IS MALWARE???
MALWARE
 The word MALWARE comes form the combination of Malicious and Software.
 In Spanish, ‘MAL’ is a prefix that means, ‘BAD’ , making the term ‘bad ware’.
 This is software that is specifically designed to gain access or damage a
computer without the knowledge of the owner.
 Mainly designed to transmit information about your web browsing
habits to the third party.
PURPOSE
 To hurt others and make money, usually by affecting important information adversely.
 Stealing, encrypting or deleting sensitive data.
 Altering or hijacking core computing functions.
 Monitoring users’ computer activity without their permission.
 To steal personal, financial, or business information from individuals &
govs.
HISTORY
 People first started writing malware in the 1970s and early 1980s. They were written as
experiments or pranks for fun.
 ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage -
but did foretell the future of malware with its quick spread through systems. ‘Reaper’ was
created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’ program.
 Term ‘malware’ coined in 1990.
 Use of malware increased in the early 2000s.
 Experts believe that 31.5% of the world's computers have some type of
malware installed today.
HOW DOES MALWARE WORK ?
Delivered physically to a system through a USB flash drives or external hard
drives.
 Drive-by-Downloads via the Internet.
 Spam E-mails and Phishing Attacks.
 Bundled with other software.
Accessing hacked or compromised webpages.
5 STAGE OF MALWARE ATTACK
ENTRY
DISTRIBUTION
EXPLOIT
INFECTION
EXECUTION
TYPES OF MALWARE
1.Viruses
2.Worms
3.Trojan Horse
4.Ransomware
5.Spyware
6.Adware
7.Scareware
8.Rootkit
VIRUSES
A computer virus is a program, script, or macro designed to cause damage, steal
personal information, modify data, send e-mail, display messages, or some combination
of these actions.
 May do nothing on your machine or destroy all your files.
 Seek to use your machine as launching point to infect other machine.
 VIRUS enters your device via attached images ,greeting ,Audio /video file etc.
VIRUS
Logic bomb virus
Time bomb virus
Boot sector virus
Macro virus
TYPES OF VIRUSES
WORMS
 Like a virus but they are self-contained programs (they don’t need a host).
 Copy themselves from machine-to-machine.
Scan for other vulnerable machines.
Can cause slowness or even block network transmissions.
They attack the weakened points in a network.
TROJAN HORSE
 In computing, a Trojan horse is a program that appears harmless, but is, in fact,
malicious. Unexpected changes to computer settings and unusual activity, even when
the computer should be idle, are strong indications that a Trojan is residing on a
computer.
WHAT IS TROJAN HORSE ??
 A Trojan horse may also be referred to as a Trojan horse virus, but that is technically incorrect.
Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without
an end user's assistance. This is why attackers must use social engineering tactics to trick the end
user into executing the Trojan. Typically, the malware programming is hidden in an innocent-
looking email attachment or free download. When the user clicks on the email attachment or
downloads the free program, the malware that is hidden inside is transferred to the user's
computing device. Once inside, the malicious code can execute whatever task the attacker
designed it to carry out.
TYPES OF TROJAN
Remote Access Trojans
TROJAN
Data Sending Trojans
FTP Trojans
Security software disabler Trojans
Denial-of-service attack (DoS) Trojans
Proxy Trojans
Destructive Trojans
RANSOMWARE
RANSOMWARE is a type of malware
which is widely classified as a Trojan.
It restricts access to or damages the
computer for the purpose of extorting
money from the victim.
 It also has the capability to encrypt a user’s files , display
different threat messages , and force the user to pay
ransom via an online payment system.
 Originated in Russia,2005-06. Crypto-ransomware in
2013.
SPYWARE
WHAT IS SPYWARE
Spyware is a program that get installed without the user’s permission.
 It’s monitors the user’s activities on the internet and transmit the
information to the third party
TYPES OF SPYWARE
SPYWARE
Tracking cookies
System monitors
Commercial Cell
Phone Spyware
keylogger
ADWARE
 Software where advertising banners are displayed while any program is running.
It automatically downloads to your device while browsing any website.
 It is used by companies for marketing purposes.
SCAREWARE
Scareware is a type of malware designed to trick victims into purchasing
and downloading useless and potentially dangerous software.
Scareware, which generates pop-ups that resemble Windows system
messages, usually purports to be antivirus or antispyware software, a firewall
application or a registry cleaner. The messages typically say that a large
number of problems -- such as infected files -- have been found on the
computer and the user is prompted to purchase software to fix the problems.
ROOTKIT
It is a computer program designed to provide continued privileged access to a
computer while actively hiding its presence.
Originally, a rootkit was a collection of tools that enabled administrator-level
access to a computer or network.
 Once a rootkit has been installed, the controller of the rootkit has the
ability to remotely execute files and change system configurations on
the host machine.
 A rootkit on an infected computer can also access log files and
spy on the legitimate computer owner’s usage.
The two most effective ways to fight against malware are: Personal vigilance and protective
tools.
Malware security protection provides that second vital layer of protection for your
computer or network.
 A robust antivirus software package is the primary component of technological
defenses that every personal and business computer system should have.
No protection is absolute. But a combination of personal awareness and
well-designed protective tools will make your computer as safe as it can be.
PROTECTION AGAINST MALWARE
THANK YOU

More Related Content

What's hot

What's hot (20)

Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Ransomware
RansomwareRansomware
Ransomware
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer security
Computer securityComputer security
Computer security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Ransomware
RansomwareRansomware
Ransomware
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 

Similar to MALWARE

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfKakai Catalan
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docxSarahReese14
 
athira m s.pptx
athira m s.pptxathira m s.pptx
athira m s.pptxATHIRAMS25
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)Paras Intotech
 

Similar to MALWARE (20)

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Information security
Information securityInformation security
Information security
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
virus
virusvirus
virus
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
athira m s.pptx
athira m s.pptxathira m s.pptx
athira m s.pptx
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 

Recently uploaded

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

MALWARE

  • 1.
  • 2.
  • 4. MALWARE  The word MALWARE comes form the combination of Malicious and Software.  In Spanish, ‘MAL’ is a prefix that means, ‘BAD’ , making the term ‘bad ware’.  This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner.  Mainly designed to transmit information about your web browsing habits to the third party.
  • 5. PURPOSE  To hurt others and make money, usually by affecting important information adversely.  Stealing, encrypting or deleting sensitive data.  Altering or hijacking core computing functions.  Monitoring users’ computer activity without their permission.  To steal personal, financial, or business information from individuals & govs.
  • 6. HISTORY  People first started writing malware in the 1970s and early 1980s. They were written as experiments or pranks for fun.  ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage - but did foretell the future of malware with its quick spread through systems. ‘Reaper’ was created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’ program.  Term ‘malware’ coined in 1990.  Use of malware increased in the early 2000s.  Experts believe that 31.5% of the world's computers have some type of malware installed today.
  • 7. HOW DOES MALWARE WORK ? Delivered physically to a system through a USB flash drives or external hard drives.  Drive-by-Downloads via the Internet.  Spam E-mails and Phishing Attacks.  Bundled with other software. Accessing hacked or compromised webpages.
  • 8. 5 STAGE OF MALWARE ATTACK ENTRY DISTRIBUTION EXPLOIT INFECTION EXECUTION
  • 9. TYPES OF MALWARE 1.Viruses 2.Worms 3.Trojan Horse 4.Ransomware 5.Spyware 6.Adware 7.Scareware 8.Rootkit
  • 10.
  • 11. VIRUSES A computer virus is a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, or some combination of these actions.  May do nothing on your machine or destroy all your files.  Seek to use your machine as launching point to infect other machine.  VIRUS enters your device via attached images ,greeting ,Audio /video file etc.
  • 12. VIRUS Logic bomb virus Time bomb virus Boot sector virus Macro virus TYPES OF VIRUSES
  • 13.
  • 14.
  • 15. WORMS  Like a virus but they are self-contained programs (they don’t need a host).  Copy themselves from machine-to-machine. Scan for other vulnerable machines. Can cause slowness or even block network transmissions. They attack the weakened points in a network.
  • 17.  In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer. WHAT IS TROJAN HORSE ??  A Trojan horse may also be referred to as a Trojan horse virus, but that is technically incorrect. Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without an end user's assistance. This is why attackers must use social engineering tactics to trick the end user into executing the Trojan. Typically, the malware programming is hidden in an innocent- looking email attachment or free download. When the user clicks on the email attachment or downloads the free program, the malware that is hidden inside is transferred to the user's computing device. Once inside, the malicious code can execute whatever task the attacker designed it to carry out.
  • 18. TYPES OF TROJAN Remote Access Trojans TROJAN Data Sending Trojans FTP Trojans Security software disabler Trojans Denial-of-service attack (DoS) Trojans Proxy Trojans Destructive Trojans
  • 19.
  • 20. RANSOMWARE RANSOMWARE is a type of malware which is widely classified as a Trojan. It restricts access to or damages the computer for the purpose of extorting money from the victim.  It also has the capability to encrypt a user’s files , display different threat messages , and force the user to pay ransom via an online payment system.  Originated in Russia,2005-06. Crypto-ransomware in 2013.
  • 21.
  • 22.
  • 24. WHAT IS SPYWARE Spyware is a program that get installed without the user’s permission.  It’s monitors the user’s activities on the internet and transmit the information to the third party
  • 25. TYPES OF SPYWARE SPYWARE Tracking cookies System monitors Commercial Cell Phone Spyware keylogger
  • 26.
  • 27.
  • 28.
  • 29. ADWARE  Software where advertising banners are displayed while any program is running. It automatically downloads to your device while browsing any website.  It is used by companies for marketing purposes.
  • 30.
  • 31.
  • 32. SCAREWARE Scareware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software. Scareware, which generates pop-ups that resemble Windows system messages, usually purports to be antivirus or antispyware software, a firewall application or a registry cleaner. The messages typically say that a large number of problems -- such as infected files -- have been found on the computer and the user is prompted to purchase software to fix the problems.
  • 33.
  • 34.
  • 35. ROOTKIT It is a computer program designed to provide continued privileged access to a computer while actively hiding its presence. Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network.  Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine.  A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.
  • 36.
  • 37. The two most effective ways to fight against malware are: Personal vigilance and protective tools. Malware security protection provides that second vital layer of protection for your computer or network.  A robust antivirus software package is the primary component of technological defenses that every personal and business computer system should have. No protection is absolute. But a combination of personal awareness and well-designed protective tools will make your computer as safe as it can be. PROTECTION AGAINST MALWARE