SlideShare une entreprise Scribd logo
1  sur  27
MALWARESpreading Awareness of Harmful Software . . .
ICT – 7 Presentation
WHAT IS MALWARE ?
 Any harmful software
 Steals information, ruins computers
 Different types of malware spread differently
The Types of Malware
At a glance . . . .
TYPES OF
MALWARE
Malware
Computer
Viruses
Worms
Trojan
Horses
Spyware
Ransomware
Adware
Rootkits
Spam
Computer Viruses
 Ability to replicate
 Attach to programs
Can Can’t
Infect executable files Infect Hardware
Infect disks and boot
records
Infect write – protected
disks (CD – ROM)
Infect E – Mail
attachments
-----
Types of Computer Viruses
SEND IN THE CLONER!
 Richard Skrenta, 1981
 Grade 9 Student
Richard Skrenta
Worms
 Consume memory and overload servers
 Steal data, delete files, create botnets
 Self – replicate and spread independently
Trojan Horses
 Useful or normal appearing programs
 Offers remote access to malicious parties
 Access information, steal data, modify etc…
Spyware
 Spies on user activity
 Monitors, harvests data and keystrokes
 Modifies security software and browsers
 Consume memory and can slow down computers
Ransomware
 Restrict Computer Access
 Encrypts files on hard disk or computer system
 Demands ransom for access regain
Ransomware
Adware
 Displays excessive advertisements
 Pop up advertisements, software advertisements
Rootkits
 Remotely access computer systems
 Control party can freely access files, configurations, software
 Hard to detect, remove or prevent
Spam
 Source for spreading malware
 Unsolicited, unwanted messages
 E – Mail, mobile message, blogs, internet forums
Detecting, Removing and
Preventing Malware
Antivirus software and prevention methods for malware at a
glance
Preventing Malware Infections
 Restricting computer access
 Vigilance while installing programs
 Refusing malicious requests while browsing
 Allowing only trustworthy users
 Using trusted removable storage media
Preventing Malware Infections
 Keep files and programs on separate disks
 Open E – Mail attachments from trusted sources
 Using Antivirus Software, Anti – Spyware and free Firewall
program
Symptoms of a Malware Infection
 Increased CPU Usage
 Slow Response and Browser Speed
 Frequently Freezing, Irresponsive, Crashing
 Unable to connect to networks
Symptoms of a Malware Infection
Modified or deleted files
Extra, unknown, unwanted
files
Programs turning on and off,
reconfiguring themselves
No Fear …. ANTIVIRUS Is Here!
 Detect and remove viruses and malware
 Able to scan downloaded, data and system files
 Should be kept updated for efficiency
Kaspersky Antivirus
Norton Antivirus
McAfee Antivirus
ANTISPYWARE
 For defense against and removal of spyware
 Should be kept updated
 Ad Aware SE and Windows Defender
Firewalls
 Defends against malware over the internet
 Prevents unauthorized access
 Available as hardware and software
STOP MALWARE!
 Spreading awareness and discouraging malware development
 Malware developer be given heavier punishments and fines
 Development of new, advanced protection software
 Encouraging the use of better protective software
“Conflicker” caused a loss of up to
$9.1 billion
“Love Letter” or “ILOVEYOU”
caused a loss of over $37.1 billion
MALWARE SPREADS WORLDWIDE CAUSE HUGE
LOSSES OF MONEY
MyDoom E – Mail worm caused a loss
of upto $38.5 billion
13.3 people in the U.S. become victims of
identity theft every minute
15% of spyware sends potentially confidential
info inputted by users collected via keyloggers
or other devices
PEOPLE LOSE PRIVACY
THANK YOU!
Spread The Message ...
Stop Malware!

Contenu connexe

Tendances

Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 

Tendances (20)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ransomware
RansomwareRansomware
Ransomware
 
Malware
MalwareMalware
Malware
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 

En vedette

Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Scueto77
 
Keylogger
KeyloggerKeylogger
Keyloggerfrank
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 

En vedette (20)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Malicious Code
Malicious  CodeMalicious  Code
Malicious Code
 
Malware
MalwareMalware
Malware
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 

Similaire à Malicious Software

Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750bhagatsigh
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 

Similaire à Malicious Software (20)

Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
viruses
virusesviruses
viruses
 
Computer security
Computer securityComputer security
Computer security
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Viruses
VirusesViruses
Viruses
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Malicious Software

  • 1. MALWARESpreading Awareness of Harmful Software . . . ICT – 7 Presentation
  • 2. WHAT IS MALWARE ?  Any harmful software  Steals information, ruins computers  Different types of malware spread differently
  • 3. The Types of Malware At a glance . . . .
  • 5. Computer Viruses  Ability to replicate  Attach to programs Can Can’t Infect executable files Infect Hardware Infect disks and boot records Infect write – protected disks (CD – ROM) Infect E – Mail attachments -----
  • 7. SEND IN THE CLONER!  Richard Skrenta, 1981  Grade 9 Student Richard Skrenta
  • 8. Worms  Consume memory and overload servers  Steal data, delete files, create botnets  Self – replicate and spread independently
  • 9. Trojan Horses  Useful or normal appearing programs  Offers remote access to malicious parties  Access information, steal data, modify etc…
  • 10. Spyware  Spies on user activity  Monitors, harvests data and keystrokes  Modifies security software and browsers  Consume memory and can slow down computers
  • 11. Ransomware  Restrict Computer Access  Encrypts files on hard disk or computer system  Demands ransom for access regain
  • 13. Adware  Displays excessive advertisements  Pop up advertisements, software advertisements
  • 14. Rootkits  Remotely access computer systems  Control party can freely access files, configurations, software  Hard to detect, remove or prevent
  • 15. Spam  Source for spreading malware  Unsolicited, unwanted messages  E – Mail, mobile message, blogs, internet forums
  • 16. Detecting, Removing and Preventing Malware Antivirus software and prevention methods for malware at a glance
  • 17. Preventing Malware Infections  Restricting computer access  Vigilance while installing programs  Refusing malicious requests while browsing  Allowing only trustworthy users  Using trusted removable storage media
  • 18. Preventing Malware Infections  Keep files and programs on separate disks  Open E – Mail attachments from trusted sources  Using Antivirus Software, Anti – Spyware and free Firewall program
  • 19. Symptoms of a Malware Infection  Increased CPU Usage  Slow Response and Browser Speed  Frequently Freezing, Irresponsive, Crashing  Unable to connect to networks
  • 20. Symptoms of a Malware Infection Modified or deleted files Extra, unknown, unwanted files Programs turning on and off, reconfiguring themselves
  • 21. No Fear …. ANTIVIRUS Is Here!  Detect and remove viruses and malware  Able to scan downloaded, data and system files  Should be kept updated for efficiency Kaspersky Antivirus Norton Antivirus McAfee Antivirus
  • 22. ANTISPYWARE  For defense against and removal of spyware  Should be kept updated  Ad Aware SE and Windows Defender
  • 23. Firewalls  Defends against malware over the internet  Prevents unauthorized access  Available as hardware and software
  • 24. STOP MALWARE!  Spreading awareness and discouraging malware development  Malware developer be given heavier punishments and fines  Development of new, advanced protection software  Encouraging the use of better protective software
  • 25. “Conflicker” caused a loss of up to $9.1 billion “Love Letter” or “ILOVEYOU” caused a loss of over $37.1 billion MALWARE SPREADS WORLDWIDE CAUSE HUGE LOSSES OF MONEY MyDoom E – Mail worm caused a loss of upto $38.5 billion
  • 26. 13.3 people in the U.S. become victims of identity theft every minute 15% of spyware sends potentially confidential info inputted by users collected via keyloggers or other devices PEOPLE LOSE PRIVACY
  • 27. THANK YOU! Spread The Message ... Stop Malware!