MALWARE
Karen O. Jao- Jao
MALWARE
• Or malicious software, is any
program or file that is harmful to a
computer user.
• Here are thw most common
offenders in the rogues’ gallery of
malware:
Adware
w
Ransomware
Trojan
Spyware
Virus and
Worms
1. ADWARE (Advertising
supported software)
Is unwanted software designed to
throw advertisements up on your
screen.
For example, pop-up ads and banner
ads.
2. SPYWARE
 Is malware that secretly observes the
computer user’s activities without
permission and reports it to the
software’s author.
Example: keylogger
3. VIRUS AND WORMS
 Are malwares that attach to another
program and, when executed-
unintentionally by the user-
replicates itself by modifying other
computer programs and infecting
them with its own bits of code.
4. TROJAN OR TROJAN HORSE
 Is one of the most dangerous
malware types.
 Once it’s on your system, the
attackers behind the Trojan gain
unauthorized access to the affected
computer.
5. RANSOMWARE
 Is a form of malware that locks you
out of your device and/or encrypts
your files, to get them back.

MALWARE.pptx

  • 1.
  • 2.
    MALWARE • Or malicioussoftware, is any program or file that is harmful to a computer user. • Here are thw most common offenders in the rogues’ gallery of malware:
  • 3.
  • 4.
    1. ADWARE (Advertising supportedsoftware) Is unwanted software designed to throw advertisements up on your screen. For example, pop-up ads and banner ads.
  • 5.
    2. SPYWARE  Ismalware that secretly observes the computer user’s activities without permission and reports it to the software’s author. Example: keylogger
  • 6.
    3. VIRUS ANDWORMS  Are malwares that attach to another program and, when executed- unintentionally by the user- replicates itself by modifying other computer programs and infecting them with its own bits of code.
  • 7.
    4. TROJAN ORTROJAN HORSE  Is one of the most dangerous malware types.  Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected computer.
  • 8.
    5. RANSOMWARE  Isa form of malware that locks you out of your device and/or encrypts your files, to get them back.