SlideShare a Scribd company logo
1 of 25
Malwares and Types
1
Malware
2
1. Malware
2. Usage of Malware
3. Types of Malware
4. How Malware Spreads?
Malware
Malware
•Short for malicious software.
•A is software used or created to disrupt computer
operation, gather sensitive information, or gain
access to private computer systems.
•It can appear in the form of code, scripts, active
content, and other software.
•'Malware' is a general term used to refer to a variety of
forms of hostile, intrusive, or annoying software
3
Malware
4
Usage of Malware
•Many early infectious programs, including the first
Internet Worm, were written as experiments or pranks.
•T
oday, malware is used primarily to steal sensitive
personal, financial, or business information for the benefit
of others.
•Malware is sometimes used broadly against government
or corporate websites to gather guarded information, or
to disrupt their operation in general.
•However, malware is often used against individuals to
gain personal information such as social security
numbers, bank or credit card numbers, and so on.
Malware
Types of Malware
• Viruses
• Trojan horses
• Worms
• Spyware
• Zombie
• Phishing
• Spam
• Adware
• Ransomware
5
Malware
6
Types of Malware
Viruses
•A program or piece of code that is loaded onto your
computer without your knowledge and runs against
your wishes.
•Viruses can also replicate themselves.
•All computer viruses are manmade.
•Viruses copy themselves to other disks to spread to
other computers.
•They can be merely annoying or they can be vastly
destructive to your files.
First Virus by Pakistan
Brain Lahore
https://www.youtube.com/watch?v=lnedOWfPKT0
Malware
Types of Malware
Viruses
• Examples of computer viruses are:
– Macro virus
– Boot virus
– Logic Bomb virus
– Directory virus
– Resident virus
8
Malware
9
Types of Malware
Trojan Horses
•A Trojan Horse program has the appearance of having
a useful and desired function.
•A Trojan Horse neither replicates nor copies itself, but
causes damage or compromises the security of the
computer.
•A Trojan Horse must be sent by someone or carried by
another program and may arrive in the form of a joke
program or software of some sort.
•These are often used to capture your logins and passwords.
Malware
10
Types of Malware
Example of Trojan Horses
• Remote access Trojans (RATs)
• Backdoor Trojans (backdoors)
• IRC Trojans (Internet Relay Chats
bots)
• Keylogging Trojans.
Malware
10
Types of Malware
Worms
•A computer worm is a self-replicating computer
program.
•It uses a network to send copies of itself to other
nodes (computers on the network) and it may do so
without any user intervention.
•It does not need to attach itself to an existing
program.
Malware
12
Types of Malware
Spyware
•Spyware is a type of malware installed on computers
that collects information about users without their
knowledge.
•The presence of spyware is typically hidden from the
user and can be difficult to detect.
•Spyware programs lurk on your computer to steal
important information, like your passwords and logins
and other personal identification information and then
send it off to someone else.
Malware
Types of Malware
Zombie
•Zombie programs take
control of your computer and
use it and its Internet
connection to attack other
computers or networks or to
perform other criminal
activities.
13
Malware
14
Types of Malware
Phishing
•Phishing (pronounced like the word 'fishing') is a
message that tries to trick you into providing
information like your social security number or bank
account information or logon and password for a web
site.
•The message may claim that if you do not click on the
link in the message and log onto a financial web site
that your account will be blocked, or some other
disaster.
Malware
Types of Malware
Phishing
15
Malware
16
Types of Malware
Spam
•Spam is email that you did not request and do not
want.
•One person's spam is another's useful newsletter or
sale ad.
•Spam is a common way to spread viruses, trojans,
and the like.
Malware
Types of Malware
Spam
17
Malware
18
Types of Malware
Adware
•Adware (short for advertising-supported software) is a
type of malware that automatically delivers
advertisements.
•Common examples of adware include pop-up ads on
websites and advertisements that are displayed by
software.
•Often times software and applications offer “free”
versions that come bundled with adware.
Malware
Types of Malware
Adware
19
Malware
Types of Malware
Ransomware
•Ransomware is a form of malware that essentially
holds a computer system captive while demanding a
ransom.
•The malware restricts user access to the computer
either by encrypting files on the hard drive or locking
down the system and displaying messages that are
intended to force the user to pay the malware creator
to remove the restrictions and regain access to their
computer.
20
Malware
20
How Malware Spreads?
•Malware is a program that must be triggered or
somehow executed before it can infect your computer
system and spread to others.
•Here are some examples on how malware is
distributed:
a) Social network
b) Pirated software
c) Removable media
d) Emails
e) Websites
Malware
Damages
1. Data Loss
•Many viruses and Trojans will attempt to delete files
or wipe hard drives when activated, but even if you
catch the infection early, you may have to delete
infected files.
22
Malware
Damages
2. Account Theft
•Many types of malware include keylogger functions,
designed to steal accounts and passwords from their
targets.
•This can give the malware author access to any of the
user's online accounts, including email servers from
which the hacker can launch new attacks.
23
Malware
24
Damages
3. Botnets
•Many types of malware also subvert control over the
user's computer, turning it into a "bot" or "zombie."
•Hackers build networks of these commandeered
computers, using their combined processing power for
tasks like cracking password files or sending out bulk
emails.
•Given the popularity of online banking and bill payment
services, a hacker who manages to secrete a keylogger
on a user's system for a full month may gain access to
the user's entire financial portfolio, allowing him to do
as much damage as possible in a single attack.
Malware
25
Damages
4. Financial Losses
•If a hacker gains access to a credit card or bank
account via a keylogger, he can then use that
information to run up charges or drain the account.

More Related Content

Similar to NS 2.pptx

Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To MalwareMichael Carthy
 
Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDFChetanmalviya8
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against RansomwareKevo Meehan
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 

Similar to NS 2.pptx (20)

Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Malware
MalwareMalware
Malware
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDF
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Malwares
MalwaresMalwares
Malwares
 
Cyber security
Cyber securityCyber security
Cyber security
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Malware
MalwareMalware
Malware
 

More from ChSheraz3

Servers.pptx
Servers.pptxServers.pptx
Servers.pptxChSheraz3
 
Linux Servers.pptx
Linux Servers.pptxLinux Servers.pptx
Linux Servers.pptxChSheraz3
 
RAID & It’s Levels.pptx
RAID & It’s Levels.pptxRAID & It’s Levels.pptx
RAID & It’s Levels.pptxChSheraz3
 
Network Security.ppt
Network Security.pptNetwork Security.ppt
Network Security.pptChSheraz3
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.pptChSheraz3
 
Organizations and Team Structure
Organizations and Team StructureOrganizations and Team Structure
Organizations and Team StructureChSheraz3
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.pptChSheraz3
 

More from ChSheraz3 (8)

MISch04
MISch04MISch04
MISch04
 
Servers.pptx
Servers.pptxServers.pptx
Servers.pptx
 
Linux Servers.pptx
Linux Servers.pptxLinux Servers.pptx
Linux Servers.pptx
 
RAID & It’s Levels.pptx
RAID & It’s Levels.pptxRAID & It’s Levels.pptx
RAID & It’s Levels.pptx
 
Network Security.ppt
Network Security.pptNetwork Security.ppt
Network Security.ppt
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.ppt
 
Organizations and Team Structure
Organizations and Team StructureOrganizations and Team Structure
Organizations and Team Structure
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

NS 2.pptx

  • 2. Malware 2 1. Malware 2. Usage of Malware 3. Types of Malware 4. How Malware Spreads?
  • 3. Malware Malware •Short for malicious software. •A is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. •It can appear in the form of code, scripts, active content, and other software. •'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software 3
  • 4. Malware 4 Usage of Malware •Many early infectious programs, including the first Internet Worm, were written as experiments or pranks. •T oday, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others. •Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. •However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on.
  • 5. Malware Types of Malware • Viruses • Trojan horses • Worms • Spyware • Zombie • Phishing • Spam • Adware • Ransomware 5
  • 6. Malware 6 Types of Malware Viruses •A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. •Viruses can also replicate themselves. •All computer viruses are manmade. •Viruses copy themselves to other disks to spread to other computers. •They can be merely annoying or they can be vastly destructive to your files.
  • 7. First Virus by Pakistan Brain Lahore https://www.youtube.com/watch?v=lnedOWfPKT0
  • 8. Malware Types of Malware Viruses • Examples of computer viruses are: – Macro virus – Boot virus – Logic Bomb virus – Directory virus – Resident virus 8
  • 9. Malware 9 Types of Malware Trojan Horses •A Trojan Horse program has the appearance of having a useful and desired function. •A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. •A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. •These are often used to capture your logins and passwords.
  • 10. Malware 10 Types of Malware Example of Trojan Horses • Remote access Trojans (RATs) • Backdoor Trojans (backdoors) • IRC Trojans (Internet Relay Chats bots) • Keylogging Trojans.
  • 11. Malware 10 Types of Malware Worms •A computer worm is a self-replicating computer program. •It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. •It does not need to attach itself to an existing program.
  • 12. Malware 12 Types of Malware Spyware •Spyware is a type of malware installed on computers that collects information about users without their knowledge. •The presence of spyware is typically hidden from the user and can be difficult to detect. •Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else.
  • 13. Malware Types of Malware Zombie •Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities. 13
  • 14. Malware 14 Types of Malware Phishing •Phishing (pronounced like the word 'fishing') is a message that tries to trick you into providing information like your social security number or bank account information or logon and password for a web site. •The message may claim that if you do not click on the link in the message and log onto a financial web site that your account will be blocked, or some other disaster.
  • 16. Malware 16 Types of Malware Spam •Spam is email that you did not request and do not want. •One person's spam is another's useful newsletter or sale ad. •Spam is a common way to spread viruses, trojans, and the like.
  • 18. Malware 18 Types of Malware Adware •Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. •Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. •Often times software and applications offer “free” versions that come bundled with adware.
  • 20. Malware Types of Malware Ransomware •Ransomware is a form of malware that essentially holds a computer system captive while demanding a ransom. •The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer. 20
  • 21. Malware 20 How Malware Spreads? •Malware is a program that must be triggered or somehow executed before it can infect your computer system and spread to others. •Here are some examples on how malware is distributed: a) Social network b) Pirated software c) Removable media d) Emails e) Websites
  • 22. Malware Damages 1. Data Loss •Many viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if you catch the infection early, you may have to delete infected files. 22
  • 23. Malware Damages 2. Account Theft •Many types of malware include keylogger functions, designed to steal accounts and passwords from their targets. •This can give the malware author access to any of the user's online accounts, including email servers from which the hacker can launch new attacks. 23
  • 24. Malware 24 Damages 3. Botnets •Many types of malware also subvert control over the user's computer, turning it into a "bot" or "zombie." •Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails.
  • 25. •Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user's system for a full month may gain access to the user's entire financial portfolio, allowing him to do as much damage as possible in a single attack. Malware 25 Damages 4. Financial Losses •If a hacker gains access to a credit card or bank account via a keylogger, he can then use that information to run up charges or drain the account.