SlideShare a Scribd company logo
FUNDAMENTALS OF CYBERSECURITY
PRESENTATION
TOPIC –MALWARE
GROUP MEMBERS
SREELAKSHMI SUNEESH-21BCAR0331
RAKSHIT SETHI-21BCAR0322
RUBY SAHA-21BCAR0323
SHRAVAN DUBEY-21BCAR0338
WHAT IS MALWARE?
• Malware is intrusive software that is designed to damage and destroy
computers and computer systems.
• Malware is a contraction for “malicious software”.
• Malware gets installed in your device and performs
unwanted tasks.
• Mainly designed to transmit information about your web
browsing habits to the third party
TYPES OF MALWARES
• Virus
• Worms
• Spyware
• Adware
• Trojan Horse
• Fileless Malware
• Ransomware
• keylogger
• Bot/Botnets
VIRUS
• Virus is a program written to enter to your computer and damage/alter your
files/data.
• A virus might corrupt or delete data on your computer. Viruses can also
replicate themselves.
• A computer Virus is more dangerous than a computer worm as it makes
changes or deletes your files while worms only replicates itself with out making
changes to your files/data.
• . Once downloaded, the virus will lay dormant until the file is opened and in use.
• Viruses are designed to disrupt a system’s ability to operate. As a result,
viruses can cause significant operational issues and data loss
WORMS
• Worms are a malicious software that rapidly
replicates and spreads to any device within the
network.
• Unlike viruses, worms do not need host
programs to disseminate.
• A worm infects a device via a downloaded file
or a network connection before it multiplies
and disperses at an exponential rate.
• It doesn’t harm any data/file on the computer.
• Unlike a virus, it does not need to attach itself
to an existing program.
• Worms spread by exploiting vulnerabilities in
operating systems
• worms can be used by malicious actors to
launch DDoS attacks
• Eg- Stuxnet
SPYWARE • Spyware is installed with or without your permission on
your personal computers to collect information about
users, their computer or browsing habits tracks each and
everything that you do without your knowledge and send
it to remote user.
• Rather than simply disrupting a device’s operations,
spyware targets sensitive information and can grant
remote access to predators.
• Spyware is often used to steal financial or personal
information.
• It also can download other malicious programs from
internet and install it on the computer.
• Spyware works like adware but is usually a separate
program that is installed unknowingly when you install
another freeware type program or application.
• A specific type of spyware is a keylogger, which records
your keystrokes to reveal passwords and personal
information.
• Eg- DarkHotel
ADWARE
• Adware is malicious software used to
collect data on your computer usage
and provide appropriate advertisements
to you.
• While adware is not always dangerous,
in some cases adware can cause
issues for your system.
• Adware can redirect your browser to
unsafe sites, and it can even contain
Trojan horses and spyware.
• Additionally, significant levels of
adware can slow down your system
noticeably.
• Because not all adware is malicious, it
is important to have protection that
constantly and intelligently scans these
programs.
• Eg- Fireball
TROJAN HORSE • A Trojan horse is not a virus. It is a
destructive program that looks as a
genuine application.
• Unlike viruses, Trojan horses do not
replicate themselves but they can be
just as destructive.
• Trojans also open a backdoor entry to
your computer which gives malicious
users/programs access to your system,
allowing confidential and personal
information to be theft.
• Once the user downloads it, the Trojan
virus can gain access to sensitive data
and then modify, block, or delete the
data.
• Eg- Emotet
RANSOMWARE
• Ransomware is malicious software
that gains access to sensitive
information within a system, encrypts
that information so that the user
cannot access it, and then demands a
financial payout for the data to be
released.
• Ransomware is commonly part of a
phishing scam.
• By clicking a disguised link, the user
downloads the ransomware.
• The attacker proceeds to encrypt
specific information that can only be
opened by a mathematical key they
know. When the attacker receives
payment, the data is unlocked.
• Eg- RobbinHood
FILELESS MALWARE
• Fileless malware is a type of
memory-resident malware.
• As the term suggests, it is
malware that operates from a
victim’s computer’s memory,
not from files on the hard drive.
• Because there are no files to
scan, it is harder to detect than
traditional malware.
• It also makes forensics more
difficult because the malware
disappears when the victim
computer is rebooted.
• In late 2017, the Cisco Talos
threat intelligence team posted
an example of fileless malware
that they called
DNSMessenger.
• Eg- Astaroth
ROOTKITS
• A rootkit is software that gives
malicious actors remote control
of a victim’s computer with full
administrative privileges.
• Rootkits can be injected into
applications, kernels,
hypervisors, or firmware.
• They spread through phishing,
malicious attachments,
malicious downloads, and
compromised shared drives.
• Rootkits can also be used to
conceal other malware, such as
keyloggers.
KEYLOGGER
• A keylogger is a type of spyware that
monitors user activity. Keyloggers
have legitimate uses; businesses can
use them to monitor employee activity
and families may use them to keep
track of children’s online behaviors.
• However, when installed for malicious
purposes, keyloggers can be used to
steal password data, banking
information and other sensitive
information.
• Keyloggers can be inserted into a
system through phishing, social
engineering or malicious downloads.
• Eg- Olympic Vision
BOT/BOTNETS
• A bot is a software application that
performs automated tasks on
command.
• They’re used for legitimate purposes,
such as indexing search engines, but
when used for malicious purposes,
they take the form of self-
propagating malware that can
connect back to a central server.
• Usually, bots are used in large
numbers to create a botnet, which is
a network of bots used to launch
broad remotely-controlled floods of
attacks, such as DDoS attacks.
Botnets can become quite expansive.
• For example, the Mirai IoT botnet
ranged from 800,000 to 2.5M
computers.
• Eg- Echobot
HOW TO DETECT AND RESPOND TO MALWARE?
• Malware will inevitably penetrate your network.
• You must have defences that provide significant visibility and breach
detection.
• In order to remove malware, you must be able to identify malicious actors
quickly. This requires constant network scanning.
• Once the threat is identified, you must remove the malware from your
network.
PROTECTING AGAINST MALWARE
• Malware security protection provides that second vital layer of protection for
your computer or network.
• A robust antivirus software package is the primary component of technological
defenses that every personal and business computer system should have.
• Well-designed antivirus protection has several characteristics. It checks any
newly downloaded program to ensure that it is malware-free.
• It periodically scans the computer to detect and defeat any malware that might
have slipped through.
• It is regularly updated to recognize the latest threats.
ANTIVIRUS / ANTI-MALWARE SOFTWARE
• For example, Microsoft Security Essentials (for Windows XP, Vista, and
Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides
real-time protection.
• The Windows Malicious Software Removal Tool removes malicious
software from the system.
• Additionally, several capable antivirus software programs are available for
free download from the Internet (usually restricted to non-commercial use).
ANTIVIRUS / ANTI-MALWARE SOFTWARE
• Real-time protection: They can provide real time protection against the
installation of malware software on a computer. This type of malware
protection works the same way as that of antivirus protection in that the
anti-malware software scans all incoming network data for malware and
blocks any threats it comes across.
• Sandboxing: Provide sandboxing of apps considered dangerous (such as
web browsers where most vulnerabilities are likely to be installed from)
ANTIVIRUS / ANTI-MALWARE SOFTWARE
• Removal: Anti-malware software programs can be used solely for detection
and removal of malware software that has already been installed onto a
computer. This type of anti-malware software scans the contents of the
Windows registry, operating system files, and installed programs on a
computer and will provide a list of any threats found, allowing the user to
choose which files to delete or keep, or to compare this list to a list of
known malware components, removing files that match.
MALWARE DETECTION TECHNIQUES
• Anomaly-based: Uses its knowledge of what constitutes
normal behaviour to decide the maliciousness of a program•
• Specification-based detection: leverage a rule set of what is
valid behaviour
• Signature-based: Uses its characterization of what is known
to be malicious to decide the maliciousness of a program
MALWARE DETECTION TECHNIQUES
• Specific approach is determined by how the technique gathers information
to detect malware
• Static analysis: Before the program under inspection executes i.e.
Sequence of bytes
• Dynamic analysis: During or after program execution i.e. Systems seen on
the runtime stack
Thankyou

More Related Content

What's hot

Malware
MalwareMalware
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
Rob Ragan
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Dos attack
Dos attackDos attack
Dos attack
Manjushree Mashal
 
Internet Security
Internet SecurityInternet Security
Internet Security
Mitesh Gupta
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
Velocity Network Solutions
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 

What's hot (20)

Malware
MalwareMalware
Malware
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
MALWARE
MALWAREMALWARE
MALWARE
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Network security
Network securityNetwork security
Network security
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Dos attack
Dos attackDos attack
Dos attack
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 

Similar to Malware ppt final.pptx

Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
SangishettyDikshitha
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
KennethMorales26
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
SHUBHA CHATURVEDI
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
WajdiElhamzi3
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 

Similar to Malware ppt final.pptx (20)

Malicious
MaliciousMalicious
Malicious
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Malware ppt final.pptx

  • 1. FUNDAMENTALS OF CYBERSECURITY PRESENTATION TOPIC –MALWARE GROUP MEMBERS SREELAKSHMI SUNEESH-21BCAR0331 RAKSHIT SETHI-21BCAR0322 RUBY SAHA-21BCAR0323 SHRAVAN DUBEY-21BCAR0338
  • 2. WHAT IS MALWARE? • Malware is intrusive software that is designed to damage and destroy computers and computer systems. • Malware is a contraction for “malicious software”. • Malware gets installed in your device and performs unwanted tasks. • Mainly designed to transmit information about your web browsing habits to the third party
  • 3. TYPES OF MALWARES • Virus • Worms • Spyware • Adware • Trojan Horse • Fileless Malware • Ransomware • keylogger • Bot/Botnets
  • 4. VIRUS • Virus is a program written to enter to your computer and damage/alter your files/data. • A virus might corrupt or delete data on your computer. Viruses can also replicate themselves. • A computer Virus is more dangerous than a computer worm as it makes changes or deletes your files while worms only replicates itself with out making changes to your files/data. • . Once downloaded, the virus will lay dormant until the file is opened and in use. • Viruses are designed to disrupt a system’s ability to operate. As a result, viruses can cause significant operational issues and data loss
  • 5. WORMS • Worms are a malicious software that rapidly replicates and spreads to any device within the network. • Unlike viruses, worms do not need host programs to disseminate. • A worm infects a device via a downloaded file or a network connection before it multiplies and disperses at an exponential rate. • It doesn’t harm any data/file on the computer. • Unlike a virus, it does not need to attach itself to an existing program. • Worms spread by exploiting vulnerabilities in operating systems • worms can be used by malicious actors to launch DDoS attacks • Eg- Stuxnet
  • 6. SPYWARE • Spyware is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user. • Rather than simply disrupting a device’s operations, spyware targets sensitive information and can grant remote access to predators. • Spyware is often used to steal financial or personal information. • It also can download other malicious programs from internet and install it on the computer. • Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application. • A specific type of spyware is a keylogger, which records your keystrokes to reveal passwords and personal information. • Eg- DarkHotel
  • 7. ADWARE • Adware is malicious software used to collect data on your computer usage and provide appropriate advertisements to you. • While adware is not always dangerous, in some cases adware can cause issues for your system. • Adware can redirect your browser to unsafe sites, and it can even contain Trojan horses and spyware. • Additionally, significant levels of adware can slow down your system noticeably. • Because not all adware is malicious, it is important to have protection that constantly and intelligently scans these programs. • Eg- Fireball
  • 8. TROJAN HORSE • A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. • Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. • Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft. • Once the user downloads it, the Trojan virus can gain access to sensitive data and then modify, block, or delete the data. • Eg- Emotet
  • 9. RANSOMWARE • Ransomware is malicious software that gains access to sensitive information within a system, encrypts that information so that the user cannot access it, and then demands a financial payout for the data to be released. • Ransomware is commonly part of a phishing scam. • By clicking a disguised link, the user downloads the ransomware. • The attacker proceeds to encrypt specific information that can only be opened by a mathematical key they know. When the attacker receives payment, the data is unlocked. • Eg- RobbinHood
  • 10. FILELESS MALWARE • Fileless malware is a type of memory-resident malware. • As the term suggests, it is malware that operates from a victim’s computer’s memory, not from files on the hard drive. • Because there are no files to scan, it is harder to detect than traditional malware. • It also makes forensics more difficult because the malware disappears when the victim computer is rebooted. • In late 2017, the Cisco Talos threat intelligence team posted an example of fileless malware that they called DNSMessenger. • Eg- Astaroth
  • 11. ROOTKITS • A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges. • Rootkits can be injected into applications, kernels, hypervisors, or firmware. • They spread through phishing, malicious attachments, malicious downloads, and compromised shared drives. • Rootkits can also be used to conceal other malware, such as keyloggers.
  • 12. KEYLOGGER • A keylogger is a type of spyware that monitors user activity. Keyloggers have legitimate uses; businesses can use them to monitor employee activity and families may use them to keep track of children’s online behaviors. • However, when installed for malicious purposes, keyloggers can be used to steal password data, banking information and other sensitive information. • Keyloggers can be inserted into a system through phishing, social engineering or malicious downloads. • Eg- Olympic Vision
  • 13. BOT/BOTNETS • A bot is a software application that performs automated tasks on command. • They’re used for legitimate purposes, such as indexing search engines, but when used for malicious purposes, they take the form of self- propagating malware that can connect back to a central server. • Usually, bots are used in large numbers to create a botnet, which is a network of bots used to launch broad remotely-controlled floods of attacks, such as DDoS attacks. Botnets can become quite expansive. • For example, the Mirai IoT botnet ranged from 800,000 to 2.5M computers. • Eg- Echobot
  • 14. HOW TO DETECT AND RESPOND TO MALWARE? • Malware will inevitably penetrate your network. • You must have defences that provide significant visibility and breach detection. • In order to remove malware, you must be able to identify malicious actors quickly. This requires constant network scanning. • Once the threat is identified, you must remove the malware from your network.
  • 15. PROTECTING AGAINST MALWARE • Malware security protection provides that second vital layer of protection for your computer or network. • A robust antivirus software package is the primary component of technological defenses that every personal and business computer system should have. • Well-designed antivirus protection has several characteristics. It checks any newly downloaded program to ensure that it is malware-free. • It periodically scans the computer to detect and defeat any malware that might have slipped through. • It is regularly updated to recognize the latest threats.
  • 16. ANTIVIRUS / ANTI-MALWARE SOFTWARE • For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. • The Windows Malicious Software Removal Tool removes malicious software from the system. • Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).
  • 17. ANTIVIRUS / ANTI-MALWARE SOFTWARE • Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across. • Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from)
  • 18. ANTIVIRUS / ANTI-MALWARE SOFTWARE • Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.
  • 19.
  • 20. MALWARE DETECTION TECHNIQUES • Anomaly-based: Uses its knowledge of what constitutes normal behaviour to decide the maliciousness of a program• • Specification-based detection: leverage a rule set of what is valid behaviour • Signature-based: Uses its characterization of what is known to be malicious to decide the maliciousness of a program
  • 21. MALWARE DETECTION TECHNIQUES • Specific approach is determined by how the technique gathers information to detect malware • Static analysis: Before the program under inspection executes i.e. Sequence of bytes • Dynamic analysis: During or after program execution i.e. Systems seen on the runtime stack