SlideShare a Scribd company logo
Related to Banking Sector
Any software that the user did not authorize to be
loaded.
or
Software that collects data about a user without
their permission.
Various types of malicious software:
1.Spyware 2.Virus 3.Worm
4.Logic Bomb 5.Trapdoor 6. Trojan
7.RATs 8. Malware 9.Mobile malicious code
10. Malicious Font 11. Rootkits
 Technology that aids in gathering information
about a person or organization without their
knowledge.
 On the Internet (where it is sometimes called
a Spybot or tracking software), Spyware is
programming that is put in someone's
computer to secretly gather information
about the user and relay it to advertisers or
other interested parties.
 Spyware can get in a computer as a software
virus or as the result of installing a new
program.
 A program or programming code that
replicates by being copied or initiating its
copying to another program, computer boot
sector or document.
 Viruses can be transmitted as attachments to
an e-mail note or in a downloaded file, or be
present on a diskette or CD
 Method 1: Scanning
 Scan your PC with Safe Mode reboot.
 Use different Virus removal software for it.
 Safe Mode booting disables most of the viruses.
 Method 2: Rescue Disks
 This method applies even before windows starts up.
 Use offline virus scanner or pre boot scanner.
 Download an iso image file from an anti virus company
 Burn it on a disk
 Boot your machine to this disk.
 Run that anti virus software on that disk.
 Method 3: Clean install
 This process involves deleting everything on computer.
 Before performing this, copy your data to another disk.
 It is one the best method to get rid of Spywares, Viruses etc.
 It is a self-replicating virus that does not alter
files but duplicates itself.
 It is common for worms to be noticed only
when their uncontrolled replication consumes
system resources, slowing or halting other
tasks.
 Keep your system up to date with security patches.
 Avoid unknown e-mails.
 Refrain from opening attachments from unknown
sources.
 Removal:
◦ Check that all antivirus signatures are up-to-date.
◦ Scan the computer with antivirus software.
◦ If the scan detects a computer worm or other malware, use the
software to remove malware and clean or delete infected files. A
scan that detects no malware is usually indicative that
symptoms are being caused by hardware or software problems.
◦ Check that the computer’s operating system is up-to-date and
all software and applications have current patches installed.
◦ If a worm is difficult to remove, check online for specific
computer worm removal utilities
 Logic bomb is programming code, inserted
surreptitiously or intentionally, that is designed
to execute (or "explode") under circumstances
such as the lapse of a certain amount of time or
the failure of a program user to respond to a
program command.
 It is in effect a delayed-action computer virus or
Trojan horse.
 A logic bomb, when "exploded," may be
designed to display or print a spurious message,
delete or corrupt data, or have other undesirable
effects.
 Do not download pirated software
 Be careful with installing shareware/freeware applications -
- Ensure you acquire these applications from a reputable
source.
 Be cautious when opening email attachments -- Email
attachments may contain malware such as logic bombs. Use
extreme caution when handling emails and attachments.
 Do not click on suspicious web links
 Always update your -- Most antivirus
applications can detect malware such as Trojan
horses (which may contain logic bombs).
 Install the latest operating system patches -- Not keeping
up with operating system updates will make your PC
vulnerable to the latest malware threats.
 Apply patches to other software installed on your
computer -- Ensure that you have the latest patches
installed on all of your software applications, such
as Microsoft Office software, Adobe products, and Java.
 It is a method of gaining access to some part of a
system other than by the normal procedure (e.g.
gaining access without having to supply a
password).
 Hackers who successfully penetrate a system
may insert trapdoors to allow them entry at a
later date, even if the vulnerability that they
originally exploited is closed.
 There have also been instances of system
developers leaving debug trapdoors in software,
which are then discovered and exploited by
hackers.
 Trojan horse is a program in which malicious
or harmful code is contained inside
apparently harmless programming or data in
such a way that it can get control and do its
chosen form of damage, such as ruining the
certain area on your hard disk.
 A Trojan horse may be widely redistributed
as part of a computer virus.
 Disable System Restore.
 Install an anti-malware program, if you
haven’t already.
 Reboot into Safe Mode.
 Uninstall any unfamiliar programs.
 Start a scan with your anti-malware program
 A special form of Trojan Horse that allows
remote control over a machine.
 These programs are used to steal passwords
and other sensitive information.
 Although they are "invisible", symptoms such
as a slow moving system, CD ports opening
and closing and unexplained restarting of
your computer may manifest.
 Remedy for RATs is same as that for Trojan
Horses.
 Malware (for "malicious software") is any
program or file that is harmful to a computer
user.
 Malware includes computer viruses, worms,
Trojan horses, and also Spyware,
programming that gathers information about
a computer user without permission.
 Web documents often have server-supplied
code associated with them which executes
inside the web browser.
 This active content allows information servers
to customize the presentation of their
information, but also provides a mechanism
to attack systems running a client browser.
 Mobile malicious code may arrive at a site
through active content such as JavaScript,
Java Applets and ActiveX controls or through
Plug-ins.
 Webpage text that exploits the default method
used to de-compress Embedded Open Type
Fonts in Windows based programs including
Internet Explorer and Outlook.
 These malicious fonts are designed to trigger a
buffer overflow which will disable the security on
Windows-based PCs.
 This allows an intruder to take complete control
of the affected computer and remotely execute
destructive activities including installing
unauthorized programs and manipulating data.
 Rootkits are a set of software tools used by an
intruder to gain and maintain access to a
computer system without the user's knowledge.
 These tools conceal covert running processes,
files and system data making them difficult to
detect.
 There are rootkits to penetrate a wide variety of
operating systems including Linux, Solaris and
versions of Microsoft Windows. A computer with
rootkits on it is called a rooted computer.
Rootkits
Kernel
Rootkit
Library
Rootkit
Application
Rootkit
 Hide a backdoor on a computer system by
using modified code to add or replace a
portion of the system's existing kernel code.
 Usually the new code is added to the kernel
via a device driver or loadable module.
 Kernel rootkits can be especially dangerous
because they can be difficult to detect
without appropriate software.
 Library rootkits commonly patch, hook or replace
system calls with versions that hide information
about the attacker.
 These instances may modify how a legitimate
program behaves by making it perform
additional functions that it is not authorized to
do, such as opening up a new connection and
transmitting confidential data using the access
permissions of the legitimate program.
 Application level rootkits replace binary files
from legitimate applications with malicious
files.
 They can also hijack legitimate programs and
perform malicious acts on their behalf.
 This type of rootkit patches a legitimate
program so that it can perform additional,
mostly illegitimate operations.
 Rootkits must be proactively combated,
before they can actually infiltrate the system,
otherwise removing them is much harder.
 Common precautionary measures to prevent
rootkit infection include the use of fully
updated anti-virus and anti-spyware
software, the application of the latest
'patches', and a properly configured software
firewall.

Types of malicious software and remedies

More Related Content

What's hot

Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Geevarghese Titus
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
Noushin Ahson
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 

What's hot (20)

Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Malware
MalwareMalware
Malware
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Types of malicious software and remedies

Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
JauwadSyed
 
TIC
TICTIC
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
Sanguine_Eva
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
JohnRebenRequinto1
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 

Similar to Types of malicious software and remedies (20)

Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Presentation2
Presentation2Presentation2
Presentation2
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
TIC
TICTIC
TIC
 
Mitppt
MitpptMitppt
Mitppt
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 

Recently uploaded

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 

Recently uploaded (20)

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 

Types of malicious software and remedies

  • 2. Any software that the user did not authorize to be loaded. or Software that collects data about a user without their permission. Various types of malicious software: 1.Spyware 2.Virus 3.Worm 4.Logic Bomb 5.Trapdoor 6. Trojan 7.RATs 8. Malware 9.Mobile malicious code 10. Malicious Font 11. Rootkits
  • 3.  Technology that aids in gathering information about a person or organization without their knowledge.  On the Internet (where it is sometimes called a Spybot or tracking software), Spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.  Spyware can get in a computer as a software virus or as the result of installing a new program.
  • 4.  A program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.  Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD
  • 5.  Method 1: Scanning  Scan your PC with Safe Mode reboot.  Use different Virus removal software for it.  Safe Mode booting disables most of the viruses.  Method 2: Rescue Disks  This method applies even before windows starts up.  Use offline virus scanner or pre boot scanner.  Download an iso image file from an anti virus company  Burn it on a disk  Boot your machine to this disk.  Run that anti virus software on that disk.  Method 3: Clean install  This process involves deleting everything on computer.  Before performing this, copy your data to another disk.  It is one the best method to get rid of Spywares, Viruses etc.
  • 6.  It is a self-replicating virus that does not alter files but duplicates itself.  It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.
  • 7.  Keep your system up to date with security patches.  Avoid unknown e-mails.  Refrain from opening attachments from unknown sources.  Removal: ◦ Check that all antivirus signatures are up-to-date. ◦ Scan the computer with antivirus software. ◦ If the scan detects a computer worm or other malware, use the software to remove malware and clean or delete infected files. A scan that detects no malware is usually indicative that symptoms are being caused by hardware or software problems. ◦ Check that the computer’s operating system is up-to-date and all software and applications have current patches installed. ◦ If a worm is difficult to remove, check online for specific computer worm removal utilities
  • 8.  Logic bomb is programming code, inserted surreptitiously or intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a program user to respond to a program command.  It is in effect a delayed-action computer virus or Trojan horse.  A logic bomb, when "exploded," may be designed to display or print a spurious message, delete or corrupt data, or have other undesirable effects.
  • 9.  Do not download pirated software  Be careful with installing shareware/freeware applications - - Ensure you acquire these applications from a reputable source.  Be cautious when opening email attachments -- Email attachments may contain malware such as logic bombs. Use extreme caution when handling emails and attachments.  Do not click on suspicious web links  Always update your -- Most antivirus applications can detect malware such as Trojan horses (which may contain logic bombs).  Install the latest operating system patches -- Not keeping up with operating system updates will make your PC vulnerable to the latest malware threats.  Apply patches to other software installed on your computer -- Ensure that you have the latest patches installed on all of your software applications, such as Microsoft Office software, Adobe products, and Java.
  • 10.  It is a method of gaining access to some part of a system other than by the normal procedure (e.g. gaining access without having to supply a password).  Hackers who successfully penetrate a system may insert trapdoors to allow them entry at a later date, even if the vulnerability that they originally exploited is closed.  There have also been instances of system developers leaving debug trapdoors in software, which are then discovered and exploited by hackers.
  • 11.  Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the certain area on your hard disk.  A Trojan horse may be widely redistributed as part of a computer virus.
  • 12.  Disable System Restore.  Install an anti-malware program, if you haven’t already.  Reboot into Safe Mode.  Uninstall any unfamiliar programs.  Start a scan with your anti-malware program
  • 13.  A special form of Trojan Horse that allows remote control over a machine.  These programs are used to steal passwords and other sensitive information.  Although they are "invisible", symptoms such as a slow moving system, CD ports opening and closing and unexplained restarting of your computer may manifest.
  • 14.  Remedy for RATs is same as that for Trojan Horses.
  • 15.  Malware (for "malicious software") is any program or file that is harmful to a computer user.  Malware includes computer viruses, worms, Trojan horses, and also Spyware, programming that gathers information about a computer user without permission.
  • 16.  Web documents often have server-supplied code associated with them which executes inside the web browser.  This active content allows information servers to customize the presentation of their information, but also provides a mechanism to attack systems running a client browser.  Mobile malicious code may arrive at a site through active content such as JavaScript, Java Applets and ActiveX controls or through Plug-ins.
  • 17.  Webpage text that exploits the default method used to de-compress Embedded Open Type Fonts in Windows based programs including Internet Explorer and Outlook.  These malicious fonts are designed to trigger a buffer overflow which will disable the security on Windows-based PCs.  This allows an intruder to take complete control of the affected computer and remotely execute destructive activities including installing unauthorized programs and manipulating data.
  • 18.  Rootkits are a set of software tools used by an intruder to gain and maintain access to a computer system without the user's knowledge.  These tools conceal covert running processes, files and system data making them difficult to detect.  There are rootkits to penetrate a wide variety of operating systems including Linux, Solaris and versions of Microsoft Windows. A computer with rootkits on it is called a rooted computer.
  • 20.  Hide a backdoor on a computer system by using modified code to add or replace a portion of the system's existing kernel code.  Usually the new code is added to the kernel via a device driver or loadable module.  Kernel rootkits can be especially dangerous because they can be difficult to detect without appropriate software.
  • 21.  Library rootkits commonly patch, hook or replace system calls with versions that hide information about the attacker.  These instances may modify how a legitimate program behaves by making it perform additional functions that it is not authorized to do, such as opening up a new connection and transmitting confidential data using the access permissions of the legitimate program.
  • 22.  Application level rootkits replace binary files from legitimate applications with malicious files.  They can also hijack legitimate programs and perform malicious acts on their behalf.  This type of rootkit patches a legitimate program so that it can perform additional, mostly illegitimate operations.
  • 23.  Rootkits must be proactively combated, before they can actually infiltrate the system, otherwise removing them is much harder.  Common precautionary measures to prevent rootkit infection include the use of fully updated anti-virus and anti-spyware software, the application of the latest 'patches', and a properly configured software firewall. 