SlideShare a Scribd company logo
PRESENTED BY :
SANGISHETTY. DIKSHITHA
CONTENT :
• INTRODUCTION
01.
• COMMON TYPES OF MALWARE
02.
• PROTECTION AGAINST MALWARE
03.
• CASE STUDY
04.
INTRODUCTION :
 What is malware ?
• An invasive software or computer code designed to infect, damage,
or gain access to computer systems.
• Designed to compromise the security and privacy of computer
systems.
• The general goal of malware is to disrupt the normal operations of a
device.
 PURPOSE :
• Malware is created for various purposes, including stealing
sensitive information, disrupting operations, gaining
unauthorized access, or causing damage to computer systems.
CHARACTERISTICS :
• Stealthy behavior, attempting to avoid detection and
removal.
• It can be destructive, causing damage to files, hardware,
or the overall system.
• Malware may grant unauthorized access to attackers,
compromising the security of the affected system.
COMMON TYPES OF MALWARE :
Malware
Virus
Worms
Trojans
Ransomware
Spyware
Adware
1. VIRUS :
• Most common type of malware.
• Executes itself and spread by infecting other
programs or files.
2. Worms :
• Standalone malicious programs, replicates itself without any
interaction from the malware authors.
• Some worms act as delivery agents to install additional
malware.
3. TROJANS :
4. RANSOMWARE :
• Ransomware encrypts files on a victim's system and
demands payment for their release.
• It Targets both individuals and organizations.
• Payments are often requested in cryptocurrency.
• It appear as a legitimate software program to gain access to
a system.
• Spreads by some form of social engineering.
• It hides a malicious code within legitimate software to try
and gain users' system access with their software.
5. SPYWARE :
6. ADWARE :
• Also known as advertisement-supported software.
• Displays unwanted (and sometimes irritating) pop-up adverts
which can appear on your computer or mobile device.
• It can slow down system performance and compromise user
privacy.
• Designed to monitor and collect user information
without their knowledge.
• Tracks keystrokes, browsing habits, and sensitive
information.
• Can lead to identity theft and privacy breaches.
PROTECTION AGAINST MALWARE :
 We can prevent malware with a variety of techniques. They are ;
• Install anti-malware software on your devices like (McAfee, Avast
Antivirus, Windows Defender, etc.
• Regularly back up important data to an external and secure location.
• Consider enabling features like "Safe Browsing" for additional protection.
• Keep Operating Systems Updated and use Strong Passwords.
• Keep yourself informed about the latest cybersecurity threats and best
practices.
CASE STUDY :
WANNACRY ???
• WannaCry is a type of malicious software called ransomware.
• It spread very quickly through the internet and affected computers running an old version of
Windows.
• It locked up the files, making them unusable and then asked for money (ransom) to unlock
the files.
• Hospitals, businesses, and regular people were affected. It caused a lot of trouble because
important files became inaccessible.
• Cybersecurity experts worked hard to find a way to stop WannaCry. They created a "kill
switch" that slowed it down.
• WannaCry highlighted the importance of timely software updates and the risks associated
with hoarding cybersecurity vulnerabilities.
IOT without SECURITY = INTERNET OF “THREATS”
-STEPHANE NAPPO

More Related Content

Similar to Malware and different types of malwares.

Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
SHUBHA CHATURVEDI
 
COMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxCOMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptx
T Tanujha
 
information about virus
information about virusinformation about virus
information about virus
toshan badiye
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
ReshmaBV2
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
UmairFirdous
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
WajdiElhamzi3
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 

Similar to Malware and different types of malwares. (20)

Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
COMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxCOMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptx
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Malwares
MalwaresMalwares
Malwares
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 

Recently uploaded

Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 

Recently uploaded (20)

Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 

Malware and different types of malwares.

  • 2. CONTENT : • INTRODUCTION 01. • COMMON TYPES OF MALWARE 02. • PROTECTION AGAINST MALWARE 03. • CASE STUDY 04.
  • 3. INTRODUCTION :  What is malware ? • An invasive software or computer code designed to infect, damage, or gain access to computer systems. • Designed to compromise the security and privacy of computer systems. • The general goal of malware is to disrupt the normal operations of a device.
  • 4.  PURPOSE : • Malware is created for various purposes, including stealing sensitive information, disrupting operations, gaining unauthorized access, or causing damage to computer systems. CHARACTERISTICS : • Stealthy behavior, attempting to avoid detection and removal. • It can be destructive, causing damage to files, hardware, or the overall system. • Malware may grant unauthorized access to attackers, compromising the security of the affected system.
  • 5. COMMON TYPES OF MALWARE : Malware Virus Worms Trojans Ransomware Spyware Adware
  • 6. 1. VIRUS : • Most common type of malware. • Executes itself and spread by infecting other programs or files. 2. Worms : • Standalone malicious programs, replicates itself without any interaction from the malware authors. • Some worms act as delivery agents to install additional malware.
  • 7. 3. TROJANS : 4. RANSOMWARE : • Ransomware encrypts files on a victim's system and demands payment for their release. • It Targets both individuals and organizations. • Payments are often requested in cryptocurrency. • It appear as a legitimate software program to gain access to a system. • Spreads by some form of social engineering. • It hides a malicious code within legitimate software to try and gain users' system access with their software.
  • 8. 5. SPYWARE : 6. ADWARE : • Also known as advertisement-supported software. • Displays unwanted (and sometimes irritating) pop-up adverts which can appear on your computer or mobile device. • It can slow down system performance and compromise user privacy. • Designed to monitor and collect user information without their knowledge. • Tracks keystrokes, browsing habits, and sensitive information. • Can lead to identity theft and privacy breaches.
  • 9. PROTECTION AGAINST MALWARE :  We can prevent malware with a variety of techniques. They are ; • Install anti-malware software on your devices like (McAfee, Avast Antivirus, Windows Defender, etc. • Regularly back up important data to an external and secure location. • Consider enabling features like "Safe Browsing" for additional protection. • Keep Operating Systems Updated and use Strong Passwords. • Keep yourself informed about the latest cybersecurity threats and best practices.
  • 10. CASE STUDY : WANNACRY ??? • WannaCry is a type of malicious software called ransomware. • It spread very quickly through the internet and affected computers running an old version of Windows. • It locked up the files, making them unusable and then asked for money (ransom) to unlock the files. • Hospitals, businesses, and regular people were affected. It caused a lot of trouble because important files became inaccessible. • Cybersecurity experts worked hard to find a way to stop WannaCry. They created a "kill switch" that slowed it down. • WannaCry highlighted the importance of timely software updates and the risks associated with hoarding cybersecurity vulnerabilities.
  • 11. IOT without SECURITY = INTERNET OF “THREATS” -STEPHANE NAPPO