SlideShare a Scribd company logo
Types, differences & prevention
Malware, short for Malicious Software is any
software used to
 Disrupt computer operation
 Gather sensitive information
 Gain access to private computer systems
 Spyware
 Adware
 Keyboard logger
 Ransom ware
 Rogue software & scare ware
 Viruses
 Trojan horses
 Worms
A software program that monitors your
computer usage without your knowledge and
can
 Eat up system resources
 Affect performance
 Steal confidential data
 Keep track of what websites you visit
A program that delivers targeted advertising
content to users often by gathering information
from a user’s computer about what the user
does online and which websites are visited.
Adware can
 Change your homepage
 Flood your screen with multiple pop-up ads
 Install tool bars in your browser
 Read cookies installed on your computer
 A program that keeps track of every
keystroke that you type at your computer.
 Can gain access to your passwords, account
numbers, credit card numbers and other
personal data.
Applications that use unethical marketing
practices to trick users into paying for and
downloading worthless or malicious software
pretending as computer security software.
 They display a bogus message announcing
that your computer has been infected with
spyware
 Message is formatted to display as if it was
coming from your own security software
A form of malware in which user’s files are
encrypted or the system is disabled if the
ransom is not paid.
“Ransom” consists of
 Sending a premium SMS text message
 A wired transfer
 Online payment voucher services
 The digital currency ‘bitcoin’
Ransomware can:
 Encrypt text files, Word documents, PDF’s,
JPG picture files
 Display false notices in the name of law
enforcement agencies that your system had
been used in illegal activities
 Imitate Windows product activation notices
 Could be an empty threat
 Is a malware program that installs without
user’s consent
 Is attached to an executable file
 Replicates by inserting copies of itself into
other programs, data files etc.
A virus can
 Steal hard disk space or CPU time
 Access private information
 Corrupt data
 A non-self-replicating type of malware
 Looks legitimate (in the form of a music/
movie/game file)
 Act as a backdoor, contacting a controller
which can have unauthorized access to the
affected computer
 Standalone malware computer program
 Does not need to attach itself to an existing
program
 Replicates itself to spread to other computers
over a network
 Using genuine operating system and keeping
it up to date
 Regularly update everything installed on your
computer
 Use a good anti-virus and anti-spyware
software
 Use a built-in or third party firewall
 Uninstall toolbars, plug-ins and other
software that you don’t use
 Don’t open email attachments or downloaded
files without verifying their source
 Be wary of clicking links in emails and while
browsing
 Be alert to fake virus warnings, often within
web browser windows, that encourage you to
download, install or purchase unfamiliar
software
 Heed warnings from web browsers, search
engines and security products
Thank You

More Related Content

What's hot

Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 
Ppt123
Ppt123Ppt123
Ppt123
Faiz Khan
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
missstevenson01
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
Kriti kohli
 
Harmful software
Harmful softwareHarmful software
Harmful software
BijoKG2
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Ch 3 computer malware ppt
Ch 3 computer malware pptCh 3 computer malware ppt
Ch 3 computer malware ppt
FaMulan2
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
Ajay Jassi
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
Firewall
FirewallFirewall
Firewall
sajeena81
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your ComputerDom Cole
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
IT viruses
 IT viruses IT viruses
IT viruses
Hekmat Asefi
 

What's hot (20)

Computer Security
Computer SecurityComputer Security
Computer Security
 
Ppt123
Ppt123Ppt123
Ppt123
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
spyware
spywarespyware
spyware
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Spyware
SpywareSpyware
Spyware
 
Ch 3 computer malware ppt
Ch 3 computer malware pptCh 3 computer malware ppt
Ch 3 computer malware ppt
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Firewall
FirewallFirewall
Firewall
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
 
Malware
MalwareMalware
Malware
 
Spyware
SpywareSpyware
Spyware
 
IT viruses
 IT viruses IT viruses
IT viruses
 

Viewers also liked

Vm i falun 2
Vm i falun 2Vm i falun 2
Vm i falun 2
karinmurberg
 
Internet of things
Internet of thingsInternet of things
Internet of things
Rahul Sharma
 
Solfã¶rmã¶rkelse gotd
Solfã¶rmã¶rkelse gotdSolfã¶rmã¶rkelse gotd
Solfã¶rmã¶rkelse gotd
karinmurberg
 
Skuggpinne i tiden
Skuggpinne i tidenSkuggpinne i tiden
Skuggpinne i tiden
karinmurberg
 
Fã¤rgglad byggsten lego - utan bilder
Fã¤rgglad byggsten   lego - utan bilderFã¤rgglad byggsten   lego - utan bilder
Fã¤rgglad byggsten lego - utan bilder
karinmurberg
 
Rocka sockorna
Rocka sockornaRocka sockorna
Rocka sockorna
karinmurberg
 
Retno dwi ganda
Retno dwi gandaRetno dwi ganda
Retno dwi gandaRetnoaja
 
Minecraft
MinecraftMinecraft
Minecraft
karinmurberg
 
Connecting Youth for Change (CYC)
Connecting Youth for Change (CYC)Connecting Youth for Change (CYC)
Connecting Youth for Change (CYC)
Masrur Rahman
 
Cristmas carts alejandro
Cristmas carts alejandroCristmas carts alejandro
Cristmas carts alejandro
Alejandr003
 
Majblomman gotd5
Majblomman gotd5Majblomman gotd5
Majblomman gotd5
karinmurberg
 
mazlee_mamat Resume 14082015
mazlee_mamat Resume 14082015mazlee_mamat Resume 14082015
mazlee_mamat Resume 14082015mazlee mamat
 
eng. Amr Mousa CV full
eng. Amr Mousa  CV fulleng. Amr Mousa  CV full
eng. Amr Mousa CV fullAmr Moussa
 
Les nouveaux métiers du web (Formathèque 2014)
Les nouveaux métiers du web (Formathèque 2014)Les nouveaux métiers du web (Formathèque 2014)
Les nouveaux métiers du web (Formathèque 2014)
Jérôme CANNAFERINA
 
Hetvägg
HetväggHetvägg
Hetvägg
karinmurberg
 
project_portfolio_20130912
project_portfolio_20130912project_portfolio_20130912
project_portfolio_20130912Joey Dobias
 

Viewers also liked (20)

Execution plan
Execution planExecution plan
Execution plan
 
Vm i falun 2
Vm i falun 2Vm i falun 2
Vm i falun 2
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Solfã¶rmã¶rkelse gotd
Solfã¶rmã¶rkelse gotdSolfã¶rmã¶rkelse gotd
Solfã¶rmã¶rkelse gotd
 
Skuggpinne i tiden
Skuggpinne i tidenSkuggpinne i tiden
Skuggpinne i tiden
 
Fã¤rgglad byggsten lego - utan bilder
Fã¤rgglad byggsten   lego - utan bilderFã¤rgglad byggsten   lego - utan bilder
Fã¤rgglad byggsten lego - utan bilder
 
Rocka sockorna
Rocka sockornaRocka sockorna
Rocka sockorna
 
Retno dwi ganda
Retno dwi gandaRetno dwi ganda
Retno dwi ganda
 
Loren
LorenLoren
Loren
 
Academic records
Academic recordsAcademic records
Academic records
 
Minecraft
MinecraftMinecraft
Minecraft
 
Connecting Youth for Change (CYC)
Connecting Youth for Change (CYC)Connecting Youth for Change (CYC)
Connecting Youth for Change (CYC)
 
Cristmas carts alejandro
Cristmas carts alejandroCristmas carts alejandro
Cristmas carts alejandro
 
Majblomman gotd5
Majblomman gotd5Majblomman gotd5
Majblomman gotd5
 
mazlee_mamat Resume 14082015
mazlee_mamat Resume 14082015mazlee_mamat Resume 14082015
mazlee_mamat Resume 14082015
 
eng. Amr Mousa CV full
eng. Amr Mousa  CV fulleng. Amr Mousa  CV full
eng. Amr Mousa CV full
 
ReSuMe-IGMM5
ReSuMe-IGMM5ReSuMe-IGMM5
ReSuMe-IGMM5
 
Les nouveaux métiers du web (Formathèque 2014)
Les nouveaux métiers du web (Formathèque 2014)Les nouveaux métiers du web (Formathèque 2014)
Les nouveaux métiers du web (Formathèque 2014)
 
Hetvägg
HetväggHetvägg
Hetvägg
 
project_portfolio_20130912
project_portfolio_20130912project_portfolio_20130912
project_portfolio_20130912
 

Similar to Malware used in cybercrime

How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
aaberra
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
Richard Homa
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
AkshayIngole17
 
Internet security
Internet securityInternet security
Internet securityat1211
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Malware
MalwareMalware
Malware
Jason Quinlan
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
zed_o07
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp205
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
Computer Explorers
 
Computer virus
Computer virusComputer virus
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
JohnRebenRequinto1
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
ShashankRoy11
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 

Similar to Malware used in cybercrime (20)

How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Computer security
Computer securityComputer security
Computer security
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
Internet security
Internet securityInternet security
Internet security
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 

Malware used in cybercrime

  • 1. Types, differences & prevention
  • 2. Malware, short for Malicious Software is any software used to  Disrupt computer operation  Gather sensitive information  Gain access to private computer systems
  • 3.  Spyware  Adware  Keyboard logger  Ransom ware  Rogue software & scare ware  Viruses  Trojan horses  Worms
  • 4. A software program that monitors your computer usage without your knowledge and can  Eat up system resources  Affect performance  Steal confidential data  Keep track of what websites you visit
  • 5. A program that delivers targeted advertising content to users often by gathering information from a user’s computer about what the user does online and which websites are visited.
  • 6. Adware can  Change your homepage  Flood your screen with multiple pop-up ads  Install tool bars in your browser  Read cookies installed on your computer
  • 7.  A program that keeps track of every keystroke that you type at your computer.  Can gain access to your passwords, account numbers, credit card numbers and other personal data.
  • 8. Applications that use unethical marketing practices to trick users into paying for and downloading worthless or malicious software pretending as computer security software.  They display a bogus message announcing that your computer has been infected with spyware  Message is formatted to display as if it was coming from your own security software
  • 9.
  • 10. A form of malware in which user’s files are encrypted or the system is disabled if the ransom is not paid. “Ransom” consists of  Sending a premium SMS text message  A wired transfer  Online payment voucher services  The digital currency ‘bitcoin’
  • 11. Ransomware can:  Encrypt text files, Word documents, PDF’s, JPG picture files  Display false notices in the name of law enforcement agencies that your system had been used in illegal activities  Imitate Windows product activation notices  Could be an empty threat
  • 12.
  • 13.  Is a malware program that installs without user’s consent  Is attached to an executable file  Replicates by inserting copies of itself into other programs, data files etc. A virus can  Steal hard disk space or CPU time  Access private information  Corrupt data
  • 14.  A non-self-replicating type of malware  Looks legitimate (in the form of a music/ movie/game file)  Act as a backdoor, contacting a controller which can have unauthorized access to the affected computer
  • 15.  Standalone malware computer program  Does not need to attach itself to an existing program  Replicates itself to spread to other computers over a network
  • 16.  Using genuine operating system and keeping it up to date  Regularly update everything installed on your computer  Use a good anti-virus and anti-spyware software  Use a built-in or third party firewall  Uninstall toolbars, plug-ins and other software that you don’t use
  • 17.  Don’t open email attachments or downloaded files without verifying their source  Be wary of clicking links in emails and while browsing  Be alert to fake virus warnings, often within web browser windows, that encourage you to download, install or purchase unfamiliar software  Heed warnings from web browsers, search engines and security products