SlideShare a Scribd company logo
Ashish Chavan 
Abhijeet Karve 
Tejas Wadke 
Omkar Shelar 
Snehal Patel
# Malware 
# Antivirus 
# FireWall
What are Malware's ? 
What are its types ? 
What Malware can do ? 
How to prevent Malwares ?
What are Malwares ? 
 "Malware" is short for malicious software and used as a 
single term to refer to virus, spy ware, worm etc. Malware is 
designed to cause damage to a stand alone computer or a 
networked pc. So wherever a malware term is used it means 
a program which is designed to damage your computer it 
may be a virus, worm or Trojan.
What are its types ? 
Virus 
Worms 
Trojans 
Adware 
Spywares
Virus: 
A virus is a piece of code(malicious code) that is 
usually made to harm software or the OS(operating 
system). 
 They can infect a computer and can 
spread through the network. 
Some are so powerful that they can even 
damage the hardware of the system!!!!!
Worms 
 Require any host to spread the can 
multiply themselves, infect files, attach 
themselves to mails, the can spread in a 
Network . 
 They are big problem to an open 
network.
Trojans 
 The most common of all malware's. 
 Main intention is control victims PC them. 
 Ones infected the attacker have full control of your PC. 
 Intended to steal confidential data.
Adwares 
 Used for advertising a product. 
 They might contain harmful virus or spying software. 
 Can automatically get downloaded to your system while and 
can be viewed through pop-up windows. 
 Adwares are used by companies for marketing purpose.
Spyware 
 Collect information about users, their computer or 
browsing habits tracks each and everything that victim does. 
 Can download other malicious programs and install them. 
 Spy’s the host computer.
What Malware can do ? 
 A malware can steal your credentials. 
 They can steal your credit card details. 
 They can control your PC. 
 They can look through your webcams. 
 They can harm your hardware and software.
How to prevent Malware ?
Keep Your Windows updated :
Use a good Firewall : 
What firewall basically do is that is monitor's the 
traffic that is coming to your system and blocks 
the malicious traffic and allows the clean. There 
are basically two type's of firewall Software 
Firewall and Hardware Firewall. But for home 
use it is better to stick with software.
Use Antivirus : 
Antivirus are the software which are responsible 
to protect your PC's from viruses and all other 
threads. Antivirus software is used to prevent, 
detect, and remove malware and other 
Computer viruses.
Run suspicious files in Sandbox 
Sandbox is an isolated environment in your 
system in which you can run and install 
programs without making any changes in your 
system. Here is a image that explain 's it well.
Common Sense : 
This is what you can't find on any website or any 
file-hosting server nither at any shop. Think you find 
a videao on youtube that about let's say Bitcoin 
hacker with comment disabled or enable or 
whatever. You downloaded it runed it and got 
infected. Don't you have thought that this is impossible. 
People infect themselves by using Facebook hacker, G 
mail hacker, etc without thinking for a minute. I the can 
hack Facebook , G-mail password means that they have 
access to the database these high security website.
Antivirus 
What is an Antivirus ? 
What Antivirus do ? 
What are its types and how do 
they works ? 
Antivirus Rating System.
What is an Antivirus ? 
Antivirus software identifies, prevents, and 
removes malware from a computer system. 
Malware is any number of viruses and software 
bits that intend to harm the computer or steal 
information, such as viruses, adware, rootkits, 
backdoors, hijackers, keyloggers, spyware, 
trojans, and worms.
What Antivirus do ?
What are its types and how do 
they work ? 
 Signature Based Detection 
 Heuristics 
 Rootkit Detection 
 Real Time Protection
Signature Based Detection : 
Nearly all antivirus software uses signature-based 
detection as part of its virus detection process. Each virus 
has a digital signature; a code that causes the virus to 
perform the functions it was designed to perform. On a 
regular schedule, or at the user’s instruction, antivirus 
software downloads an updated database of known virus 
signatures. The antivirus software can then scan each file 
on the computer’s hardware and memory and compare 
the entire file, as well as small sections of each file, 
against the virus signature database
Heuristics : 
To help protect computers against new and 
unknown malware, heuristic detection algorithms 
were created. Heuristic methods allow antivirus 
software to detect variants of existing malware and 
new, never before seen malware. Heuristics use 
virus signature databases to find viruses, but do not 
require an exact match to identify a virus. Heuristic 
detection algorithms scan files for random 
combinations of signatures to detect malware.
Rootkit Detection : 
Rootkits can alter the operating system of a 
computer to change how it works and even alter 
antivirus software itself to make it inoperable. In 
some extreme cases, rootkits can destroy an 
operating system, making it completely 
unrecoverable.
Real Time Protection : 
Most antivirus software provides real-time 
protection, often under any number of clever 
synonyms such as resident shield, background 
guard, auto-pilot, and so on. In this method 
the antivirus software detects malwares by their 
behaviour.
Antivirus Rating System.
Firewall
Firewall 
 What is Firewall ? 
 Why should I use Firewall ? 
 What are its types ? 
 How do they work ?
What is Firewall ? 
A firewall is a system designed to prevent 
unauthorized access to or from a private 
network. Firewalls can be implemented in both 
hardware and software, or a combination of 
both. Firewalls are frequently used to prevent 
unauthorized Internet users from accessing 
private networks connected to the Internet, 
especially intranets.
Why should I use Firewall ? 
Firewall allows the user to monitor the inbound 
and outbound traffic in the network. I stops 
intruders form accessing your system or 
network. It also have a set of rules to prevent 
the attacks on the system. All messages entering 
or leaving the intranet pass through the firewall, 
which examines each message and blocks those 
that do not meet the specified security criteria.
What are its types : 
 Hardware Firewall 
 Software Firewall
Hardware Firewall 
Hardware firewall are a stand-alone product 
which are available as a whole but in the recent 
years they are integrated in Routers. Hardware 
firewall are very effective and easy to setup. And 
they are not dependent on the system resources 
for their functionality.
Software Firewall : 
Software Firewall are most suited for personal use. They can 
be easily downloaded and install. They come for both 
advanced and basic users. Software Firewall are usually 
cheap and mostly free. The main drawback is that the 
consume system resources for their functionality and slow 
down the host system.
How do they work ? 
There are many ways in which Firewall works 
namely : 
 Packet Filter 
 Application Layer 
 Circuit-level Gateway 
 Proxy Server
Packet Filter Firewall 
These firewalls are the simplest of firewalls, and 
only allow information packets to pass through 
the firewall if the packet matches a specific set 
of rules. A user can define his or her own rules, 
but these software packages often come with a 
list of default rules already provided. Within this 
type of firewall, there are stateless firewalls and 
stateful firewalls.
Application Layer Firewall 
Application layer firewalls are the most powerful 
firewalls, but add delay to network traffic. These 
firewalls inspect all packets for specific 
protocols, such as FTP and browser traffic. Each 
packet is deeply inspected for content that does 
not match the header information. Because of this, 
application layer firewalls are often effective at 
restricting or completely blocking the spread of 
worms and trojans.
Circuit-level Gateway 
Circuit level gateways are deployed at the 
session layer of the OSI model and they monitor 
sessions like TCP 3 way handshake to see 
whether a requested connection is legitimate or 
not. Major Screening happens before the 
Connection is Established.
Proxy Server 
Proxy servers act as a firewall in that they 
inspect incoming packets for specific 
applications and block all other requests. They 
act as gateway monitors between the computer 
and the Internet connection and makes 
connection decisions for the user. This type of 
firewall can make accessing a computer more 
difficult from an external network, such as the 
Internet.
Next Generation Firewall (NGFW) 
A class of firewalls designed to filter network 
and Internet traffic based upon the applications 
or traffic types using specific ports. The 
application-specific granular security policies 
provided by Next Generation Firewalls help 
them detect application-specific attacks, giving 
them the potential to catch more malicious 
activity than more traditional firewalls.
Thank You 
Created by : 
Abhijeet Karve 
Designed by : 
Tejas Wadke

More Related Content

What's hot

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
Anti virus
Anti virusAnti virus
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
ManjuA8
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
Somanath Kavalase
 
Antivirus
AntivirusAntivirus
Antivirus
Meti Liona
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
Dedi Dwianto
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
Anuj Khandelwal
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Malware
MalwareMalware
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
Hamza Muhammad
 

What's hot (20)

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Antivirus
AntivirusAntivirus
Antivirus
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Mitppt
MitpptMitppt
Mitppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Malware
MalwareMalware
Malware
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 

Similar to Security threats explained

Module 5.Malware
Module 5.MalwareModule 5.Malware
Firewall
FirewallFirewall
Firewall
sajeena81
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
AthiraKrishnan57
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
UmairFirdous
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
Ghazanfar Latif (Gabe)
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
Shyam Kumar Singh
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
John Steensen, MBA/TM, CISA, CRISC
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
sandipslides
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
sandipslides
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 

Similar to Security threats explained (20)

Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Firewall
FirewallFirewall
Firewall
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Security Software
Security SoftwareSecurity Software
Security Software
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Security threats explained

  • 1.
  • 2. Ashish Chavan Abhijeet Karve Tejas Wadke Omkar Shelar Snehal Patel
  • 3. # Malware # Antivirus # FireWall
  • 4.
  • 5. What are Malware's ? What are its types ? What Malware can do ? How to prevent Malwares ?
  • 6. What are Malwares ?  "Malware" is short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.
  • 7. What are its types ? Virus Worms Trojans Adware Spywares
  • 8. Virus: A virus is a piece of code(malicious code) that is usually made to harm software or the OS(operating system).  They can infect a computer and can spread through the network. Some are so powerful that they can even damage the hardware of the system!!!!!
  • 9. Worms  Require any host to spread the can multiply themselves, infect files, attach themselves to mails, the can spread in a Network .  They are big problem to an open network.
  • 10. Trojans  The most common of all malware's.  Main intention is control victims PC them.  Ones infected the attacker have full control of your PC.  Intended to steal confidential data.
  • 11. Adwares  Used for advertising a product.  They might contain harmful virus or spying software.  Can automatically get downloaded to your system while and can be viewed through pop-up windows.  Adwares are used by companies for marketing purpose.
  • 12. Spyware  Collect information about users, their computer or browsing habits tracks each and everything that victim does.  Can download other malicious programs and install them.  Spy’s the host computer.
  • 13. What Malware can do ?  A malware can steal your credentials.  They can steal your credit card details.  They can control your PC.  They can look through your webcams.  They can harm your hardware and software.
  • 14. How to prevent Malware ?
  • 15. Keep Your Windows updated :
  • 16. Use a good Firewall : What firewall basically do is that is monitor's the traffic that is coming to your system and blocks the malicious traffic and allows the clean. There are basically two type's of firewall Software Firewall and Hardware Firewall. But for home use it is better to stick with software.
  • 17. Use Antivirus : Antivirus are the software which are responsible to protect your PC's from viruses and all other threads. Antivirus software is used to prevent, detect, and remove malware and other Computer viruses.
  • 18. Run suspicious files in Sandbox Sandbox is an isolated environment in your system in which you can run and install programs without making any changes in your system. Here is a image that explain 's it well.
  • 19. Common Sense : This is what you can't find on any website or any file-hosting server nither at any shop. Think you find a videao on youtube that about let's say Bitcoin hacker with comment disabled or enable or whatever. You downloaded it runed it and got infected. Don't you have thought that this is impossible. People infect themselves by using Facebook hacker, G mail hacker, etc without thinking for a minute. I the can hack Facebook , G-mail password means that they have access to the database these high security website.
  • 20.
  • 21. Antivirus What is an Antivirus ? What Antivirus do ? What are its types and how do they works ? Antivirus Rating System.
  • 22. What is an Antivirus ? Antivirus software identifies, prevents, and removes malware from a computer system. Malware is any number of viruses and software bits that intend to harm the computer or steal information, such as viruses, adware, rootkits, backdoors, hijackers, keyloggers, spyware, trojans, and worms.
  • 24. What are its types and how do they work ?  Signature Based Detection  Heuristics  Rootkit Detection  Real Time Protection
  • 25. Signature Based Detection : Nearly all antivirus software uses signature-based detection as part of its virus detection process. Each virus has a digital signature; a code that causes the virus to perform the functions it was designed to perform. On a regular schedule, or at the user’s instruction, antivirus software downloads an updated database of known virus signatures. The antivirus software can then scan each file on the computer’s hardware and memory and compare the entire file, as well as small sections of each file, against the virus signature database
  • 26. Heuristics : To help protect computers against new and unknown malware, heuristic detection algorithms were created. Heuristic methods allow antivirus software to detect variants of existing malware and new, never before seen malware. Heuristics use virus signature databases to find viruses, but do not require an exact match to identify a virus. Heuristic detection algorithms scan files for random combinations of signatures to detect malware.
  • 27. Rootkit Detection : Rootkits can alter the operating system of a computer to change how it works and even alter antivirus software itself to make it inoperable. In some extreme cases, rootkits can destroy an operating system, making it completely unrecoverable.
  • 28. Real Time Protection : Most antivirus software provides real-time protection, often under any number of clever synonyms such as resident shield, background guard, auto-pilot, and so on. In this method the antivirus software detects malwares by their behaviour.
  • 30.
  • 32. Firewall  What is Firewall ?  Why should I use Firewall ?  What are its types ?  How do they work ?
  • 33. What is Firewall ? A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
  • 34. Why should I use Firewall ? Firewall allows the user to monitor the inbound and outbound traffic in the network. I stops intruders form accessing your system or network. It also have a set of rules to prevent the attacks on the system. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  • 35. What are its types :  Hardware Firewall  Software Firewall
  • 36. Hardware Firewall Hardware firewall are a stand-alone product which are available as a whole but in the recent years they are integrated in Routers. Hardware firewall are very effective and easy to setup. And they are not dependent on the system resources for their functionality.
  • 37. Software Firewall : Software Firewall are most suited for personal use. They can be easily downloaded and install. They come for both advanced and basic users. Software Firewall are usually cheap and mostly free. The main drawback is that the consume system resources for their functionality and slow down the host system.
  • 38. How do they work ? There are many ways in which Firewall works namely :  Packet Filter  Application Layer  Circuit-level Gateway  Proxy Server
  • 39. Packet Filter Firewall These firewalls are the simplest of firewalls, and only allow information packets to pass through the firewall if the packet matches a specific set of rules. A user can define his or her own rules, but these software packages often come with a list of default rules already provided. Within this type of firewall, there are stateless firewalls and stateful firewalls.
  • 40. Application Layer Firewall Application layer firewalls are the most powerful firewalls, but add delay to network traffic. These firewalls inspect all packets for specific protocols, such as FTP and browser traffic. Each packet is deeply inspected for content that does not match the header information. Because of this, application layer firewalls are often effective at restricting or completely blocking the spread of worms and trojans.
  • 41. Circuit-level Gateway Circuit level gateways are deployed at the session layer of the OSI model and they monitor sessions like TCP 3 way handshake to see whether a requested connection is legitimate or not. Major Screening happens before the Connection is Established.
  • 42. Proxy Server Proxy servers act as a firewall in that they inspect incoming packets for specific applications and block all other requests. They act as gateway monitors between the computer and the Internet connection and makes connection decisions for the user. This type of firewall can make accessing a computer more difficult from an external network, such as the Internet.
  • 43. Next Generation Firewall (NGFW) A class of firewalls designed to filter network and Internet traffic based upon the applications or traffic types using specific ports. The application-specific granular security policies provided by Next Generation Firewalls help them detect application-specific attacks, giving them the potential to catch more malicious activity than more traditional firewalls.
  • 44. Thank You Created by : Abhijeet Karve Designed by : Tejas Wadke