SlideShare a Scribd company logo
MALWARES
• 'Malware' is in general used to refer to a variety
  of forms of hostile or intrusive software.
• Malware is used or created to disrupt computer
  operation, gather sensitive information, or gain
  access to private computer systems.
• Malwares appear in form of code, scripts, active
  content, and other software.
• Malware harm a computer’s system, data &
  performance.
• Malware is often used against individuals to gain
  personal information such as social security
  numbers, bank or credit card numbers.
• The majority of widespread malware have been
  designed to take control of user’s computers.
• Infected “Zombie Computers" are used to
  send email spam, or to engage in Distributed
  Denial Of Service Attacks [DDOS].
• Nature of Malware : Infectious, Concealment.
Types of Malware-
• Viruses
• Worms
• Trojan Horses
• Spyware
• Adware
• Rootkits
• Backdoors
VIRUSES
• The term ‘computer virus’ is used for a program
  that has infected some executable software
  and, when run, causes the virus to spread to
  other executables.
• Any virus will by definition make unauthorized
  changes to a computer, which is undesirable
  even if no damage is done or intended.
• A virus requires user intervention to spread.
• Infections are transmitted by email or Microsoft
  Word documents, which rely on the recipient
  opening a file or email to infect the system.
• Many viruses attach themselves to executable files
  that may be part of legitimate program.
• If a user attempts to launch an infected program, the
  virus code may be executed simultaneously.
• For example, an executable may be created named
  "picture.png.exe", in which the user sees only
  "picture.png" and therefore assumes that this file is
  an image and most likely is safe, yet when opened
  runs the executable on the client machine.
A Few Types Of Viruses-

•   Boot Sector Virus
•   Macro Virus
•   Polymorphic Virus
•   Logic Bombs/Time Bombs.
WORMS
• A worm is a program that makes and facilitates the
  distribution of copies of itself; for example, from one
  disk drive to another, or by copying itself using email
  or another transport mechanism.
• It actively transmits itself over a network to infect
  other computers.
• It may arrive via exploitation of a system
  vulnerability or by clicking on an infected e-mail.
• A worm can exploit security vulnerabilities to spread
  itself automatically to other computers through
  networks without any human intervention.
NEXT SESSION

•   Trojan Horses
•   Spyware
•   Adware
•   Rootkits
•   Backdoors

    And…….
• How computer viruses are spread
• Ways to safeguard our system & prevent
  computer viruses…..
THANK YOU

More Related Content

What's hot

Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
How To Remove Flooders?-Get Help
How To Remove Flooders?-Get HelpHow To Remove Flooders?-Get Help
How To Remove Flooders?-Get Help
starrdstanley
 
How To Remove Flooders?-Get Help
How To Remove Flooders?-Get HelpHow To Remove Flooders?-Get Help
How To Remove Flooders?-Get Help
starrdstanley
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyRizwan Razman
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
chinmay kelkar
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
UK Defence Cyber School
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
Security Innovation
 
Computer virus
Computer virusComputer virus
Computer virus
Sarhad Baez
 
Virus part2
Virus part2Virus part2
Virus part2
Ajay Banyal
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
information about virus
information about virusinformation about virus
information about virus
toshan badiye
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
ShouaQureshi
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
gpioa
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
Kriti kohli
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
Bipulok
 

What's hot (20)

Types of malware
Types of malwareTypes of malware
Types of malware
 
How To Remove Flooders?-Get Help
How To Remove Flooders?-Get HelpHow To Remove Flooders?-Get Help
How To Remove Flooders?-Get Help
 
How To Remove Flooders?-Get Help
How To Remove Flooders?-Get HelpHow To Remove Flooders?-Get Help
How To Remove Flooders?-Get Help
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus part2
Virus part2Virus part2
Virus part2
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
information about virus
information about virusinformation about virus
information about virus
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 

Viewers also liked

1. comunicazione e mercati
1. comunicazione e mercati1. comunicazione e mercati
1. comunicazione e mercatiloredanaxxx
 
Fear of failure
Fear of failureFear of failure
Fear of failure
Ishaq Ticklye
 
Powerpoint student-music (1)
Powerpoint student-music (1)Powerpoint student-music (1)
Powerpoint student-music (1)bren-ies
 
Distributed Refactoring with Gradle Lint
Distributed Refactoring with Gradle LintDistributed Refactoring with Gradle Lint
Distributed Refactoring with Gradle Lint
Jon Schneider
 
Benefits of being a domain expert
Benefits of being a domain expertBenefits of being a domain expert
Benefits of being a domain expert
Ishaq Ticklye
 
James NImmons on Matt Mills
James NImmons on Matt MillsJames NImmons on Matt Mills
James NImmons on Matt Mills
JamesNImmons
 
Internet of things
Internet of thingsInternet of things
Internet of things
Ishaq Ticklye
 
Push notifications
Push notificationsPush notifications
Push notifications
Ishaq Ticklye
 

Viewers also liked (9)

Fear of failure
Fear of failureFear of failure
Fear of failure
 
1. comunicazione e mercati
1. comunicazione e mercati1. comunicazione e mercati
1. comunicazione e mercati
 
Fear of failure
Fear of failureFear of failure
Fear of failure
 
Powerpoint student-music (1)
Powerpoint student-music (1)Powerpoint student-music (1)
Powerpoint student-music (1)
 
Distributed Refactoring with Gradle Lint
Distributed Refactoring with Gradle LintDistributed Refactoring with Gradle Lint
Distributed Refactoring with Gradle Lint
 
Benefits of being a domain expert
Benefits of being a domain expertBenefits of being a domain expert
Benefits of being a domain expert
 
James NImmons on Matt Mills
James NImmons on Matt MillsJames NImmons on Matt Mills
James NImmons on Matt Mills
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Push notifications
Push notificationsPush notifications
Push notifications
 

Similar to Malwares

Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
KennethMorales26
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
diarfirstdiarfirst
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
KloudLearn
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
Neha Kurale
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
ShouaQureshi
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Computer virus
Computer virusComputer virus
Computer virus
Dikshyanta Dhungana
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
Apoorva812677
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Pranjal Vyas
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 

Similar to Malwares (20)

Malicious
MaliciousMalicious
Malicious
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Malwares

  • 2. • 'Malware' is in general used to refer to a variety of forms of hostile or intrusive software. • Malware is used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. • Malwares appear in form of code, scripts, active content, and other software. • Malware harm a computer’s system, data & performance.
  • 3. • Malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers. • The majority of widespread malware have been designed to take control of user’s computers. • Infected “Zombie Computers" are used to send email spam, or to engage in Distributed Denial Of Service Attacks [DDOS]. • Nature of Malware : Infectious, Concealment.
  • 4. Types of Malware- • Viruses • Worms • Trojan Horses • Spyware • Adware • Rootkits • Backdoors
  • 5. VIRUSES • The term ‘computer virus’ is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables. • Any virus will by definition make unauthorized changes to a computer, which is undesirable even if no damage is done or intended. • A virus requires user intervention to spread.
  • 6. • Infections are transmitted by email or Microsoft Word documents, which rely on the recipient opening a file or email to infect the system. • Many viruses attach themselves to executable files that may be part of legitimate program. • If a user attempts to launch an infected program, the virus code may be executed simultaneously. • For example, an executable may be created named "picture.png.exe", in which the user sees only "picture.png" and therefore assumes that this file is an image and most likely is safe, yet when opened runs the executable on the client machine.
  • 7. A Few Types Of Viruses- • Boot Sector Virus • Macro Virus • Polymorphic Virus • Logic Bombs/Time Bombs.
  • 8. WORMS • A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. • It actively transmits itself over a network to infect other computers. • It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail. • A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks without any human intervention.
  • 9. NEXT SESSION • Trojan Horses • Spyware • Adware • Rootkits • Backdoors And…….
  • 10. • How computer viruses are spread • Ways to safeguard our system & prevent computer viruses…..