SlideShare a Scribd company logo
MALWARE
HOW MALWARE SPREADS ?
MALWARE
How Malware Spreads?
• Malware is a program that must be triggered or
somehow executed before it can infect your computer
system and spread to others.
• Here are some examples on how malware is
distributed:
a) Social network
b) Pirated software
c) Removable media
d) Emails
e) Websites
Damages
1. Data Loss
• Many viruses and Trojans will
attempt to delete files or wipe
hard drives when activated
but even if you catch the
infection early, you may have to
delete infected files.
Damages
2. Account Theft
• Many types of malware include key logger functions,
designed to steal accounts and passwords from their
targets.
• This can give the malware author access to any of
the user's online accounts, including email servers
from which the hacker can launch new attacks
Damages
•
Botnets
• Many types of malware also subvert control over
the user's computer, turning it into a "bot" or
"zombie."
• Hackers build networks of these commandeered
computers, using their combined processing power
for tasks like cracking password files or sending out
bulkemails.
Viruses
Examples of computer viruses are:
Macro virus
Boot virus
Logic Bomb virus
Directory virus
Resident virus
Trojan Horses
A Trojan Horse program has the appearance of
having a useful and desired function.
A Trojan Horse neither replicates nor copies itself,
but causes damage or compromises the security of
the computer.
A Trojan Horse must be sent by someone or carried
by another program and may arrive in the form of a
joke program or software of some sort.
These are often used to capture your logins and
passwords
Types of Malware
TYPES OF MALWARE
•
Example of Trojan Horse
• Remote access Trojans
• Backdoor Trojans (back
• IRC Trojans (IRC bots)
• Keylogging Trojans
Types of Malware
• Worms
• A computer worm is a self-replicating
computerprogram.
• It uses a network to send copies of itself to
other nodes (computers on the network) and
it may do so without any user intervention.
• It does not need to attach itself to an
existing
program.
• Damages
3. Botnets
• Many types of malware also subvert control over the
user's computer, turning it into a "bot" or "zombie."
• Hackers build networks of these commandeered
computers, using their combined processing power
for tasks like cracking password files or sending out
bulk emails.
4. Financial Losses
• If a hacker gains access to a credit card or bank
account via a keylogger, he can then use that
information to run up charges or drain the account.
• Given the popularity of online banking and bill
payment services, a hacker who manages to secrete
a keylogger on a user's system for a full month may
gain access to the user's entire financial portfolio,
allowing him to do as much damage as possible in a
single attack.
• How Can You Protect Your Computer?
• Install protection software.
• Practice caution when working with files from
unknown or questionable sources.
• Do not open e-mail if you do not recognize the
sender.
• Download files only from reputable Internet
sites.
• Install firewall.
• Scan your hard drive for viruses monthly.
SYMPTOMS
• Increased CPU usage
• Slow computer or web browser speeds
• Problems connecting to networks
• Freezing or crashing
• Modified or deleted files
• Appearance of strange files, programs, or desktop
icons
• Programs running, turning off, or reconfiguring
themselves (malware will often reconfigure or turn
off antivirus and firewall programs)
SYMPTOMS
•Strange computer behavior
• Emails/messages being sent automatically and
without user’s knowledge (a friend receives a
strange email from you that you did not send)
• There seems to be a lot of network activity when
you are not using the network
• The available memory on your computer is lower
than it should be
• Programs or files appear or disappear without your
knowledge
• File names are changed .

More Related Content

What's hot

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
Aashiq Ahamed N
 
Spyware
SpywareSpyware
Spyware
Avani Patel
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
shusrusha
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham_Indrawat
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Malwares
MalwaresMalwares
Malwares
Abolfazl Naderi
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
Computer virus
Computer virusComputer virus
Computer virus
SanthiNivas
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Malware
MalwareMalware
Malware
Avani Patel
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
Jithin James
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
S.M. Towhidul Islam
 

What's hot (20)

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
Spyware
SpywareSpyware
Spyware
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Network Security
Network SecurityNetwork Security
Network Security
 
Malwares
MalwaresMalwares
Malwares
 
Malwares
MalwaresMalwares
Malwares
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Malware
MalwareMalware
Malware
 
Spyware
SpywareSpyware
Spyware
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 

Similar to Malware part 2

Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
Mohd Harris Ahmad Jaal
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
MuhammadRehan856177
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
Quick Heal Technologies Ltd.
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
ChSheraz3
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
malikmuzammil2326
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
 

Similar to Malware part 2 (20)

Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Malicious
MaliciousMalicious
Malicious
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Computer virus
Computer virusComputer virus
Computer virus
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Saurav vishwaraj pro
Saurav vishwaraj proSaurav vishwaraj pro
Saurav vishwaraj pro
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 

More from ShouaQureshi

touchscreens
touchscreenstouchscreens
touchscreens
ShouaQureshi
 
3D Priinters
3D Priinters 3D Priinters
3D Priinters
ShouaQureshi
 
2D and 3D Cutter
2D and 3D Cutter 2D and 3D Cutter
2D and 3D Cutter
ShouaQureshi
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
ShouaQureshi
 
impact and non impact printers
impact and non impact printers impact and non impact printers
impact and non impact printers
ShouaQureshi
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
ShouaQureshi
 
2d and 3d cutters
2d and 3d cutters2d and 3d cutters
2d and 3d cutters
ShouaQureshi
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
ShouaQureshi
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
ShouaQureshi
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Multiple choice questions chapter 1
Multiple choice questions  chapter 1Multiple choice questions  chapter 1
Multiple choice questions chapter 1
ShouaQureshi
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
ShouaQureshi
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
ShouaQureshi
 
Class ix ms word part 1
Class ix ms word part 1Class ix ms word part 1
Class ix ms word part 1
ShouaQureshi
 
Word processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updatedWord processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updated
ShouaQureshi
 
Spreadsheet new
Spreadsheet newSpreadsheet new
Spreadsheet new
ShouaQureshi
 
Manupulating and formatting data
Manupulating and formatting dataManupulating and formatting data
Manupulating and formatting data
ShouaQureshi
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malware
ShouaQureshi
 

More from ShouaQureshi (18)

touchscreens
touchscreenstouchscreens
touchscreens
 
3D Priinters
3D Priinters 3D Priinters
3D Priinters
 
2D and 3D Cutter
2D and 3D Cutter 2D and 3D Cutter
2D and 3D Cutter
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
 
impact and non impact printers
impact and non impact printers impact and non impact printers
impact and non impact printers
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
2d and 3d cutters
2d and 3d cutters2d and 3d cutters
2d and 3d cutters
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Multiple choice questions chapter 1
Multiple choice questions  chapter 1Multiple choice questions  chapter 1
Multiple choice questions chapter 1
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Class ix ms word part 1
Class ix ms word part 1Class ix ms word part 1
Class ix ms word part 1
 
Word processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updatedWord processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updated
 
Spreadsheet new
Spreadsheet newSpreadsheet new
Spreadsheet new
 
Manupulating and formatting data
Manupulating and formatting dataManupulating and formatting data
Manupulating and formatting data
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malware
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Malware part 2

  • 2. MALWARE How Malware Spreads? • Malware is a program that must be triggered or somehow executed before it can infect your computer system and spread to others. • Here are some examples on how malware is distributed: a) Social network b) Pirated software c) Removable media d) Emails e) Websites
  • 3. Damages 1. Data Loss • Many viruses and Trojans will attempt to delete files or wipe hard drives when activated but even if you catch the infection early, you may have to delete infected files.
  • 4. Damages 2. Account Theft • Many types of malware include key logger functions, designed to steal accounts and passwords from their targets. • This can give the malware author access to any of the user's online accounts, including email servers from which the hacker can launch new attacks
  • 5. Damages • Botnets • Many types of malware also subvert control over the user's computer, turning it into a "bot" or "zombie." • Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulkemails.
  • 6. Viruses Examples of computer viruses are: Macro virus Boot virus Logic Bomb virus Directory virus Resident virus
  • 7. Trojan Horses A Trojan Horse program has the appearance of having a useful and desired function. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. These are often used to capture your logins and passwords Types of Malware
  • 8. TYPES OF MALWARE • Example of Trojan Horse • Remote access Trojans • Backdoor Trojans (back • IRC Trojans (IRC bots) • Keylogging Trojans
  • 9. Types of Malware • Worms • A computer worm is a self-replicating computerprogram. • It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. • It does not need to attach itself to an existing program.
  • 10. • Damages 3. Botnets • Many types of malware also subvert control over the user's computer, turning it into a "bot" or "zombie." • Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails.
  • 11. 4. Financial Losses • If a hacker gains access to a credit card or bank account via a keylogger, he can then use that information to run up charges or drain the account. • Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user's system for a full month may gain access to the user's entire financial portfolio, allowing him to do as much damage as possible in a single attack.
  • 12. • How Can You Protect Your Computer? • Install protection software. • Practice caution when working with files from unknown or questionable sources. • Do not open e-mail if you do not recognize the sender. • Download files only from reputable Internet sites. • Install firewall. • Scan your hard drive for viruses monthly.
  • 13. SYMPTOMS • Increased CPU usage • Slow computer or web browser speeds • Problems connecting to networks • Freezing or crashing • Modified or deleted files • Appearance of strange files, programs, or desktop icons • Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs)
  • 14. SYMPTOMS •Strange computer behavior • Emails/messages being sent automatically and without user’s knowledge (a friend receives a strange email from you that you did not send) • There seems to be a lot of network activity when you are not using the network • The available memory on your computer is lower than it should be • Programs or files appear or disappear without your knowledge • File names are changed .