SlideShare une entreprise Scribd logo
1  sur  27
Online course offering
Malware
© KloudLearn www.kloudlearn.com
Learning
Objectives
© KloudLearn www.kloudlearn.com 2
What is Malware?
Types of Malware
Virus
Types of Virus
Worms
How do Computer Worms Work?
Spyware
Trojans
Rootkits
How to Prevent Malware
Key Takeaways
Malware
© KloudLearn www.kloudlearn.com 3
Malware is the collective name for a number of malicious software variants, including viruses,
ransomware and spyware. Shorthand for malicious software, malware typically consists of code
developed by cyber attackers, designed to cause extensive damage to data and systems or to gain
unauthorized access to a network.
A wide variety of malware types exist,
including computer viruses, worms, Trojan
horses, ransomware, spyware, adware, rogue
software, wiper and scareware.
Malware is typically delivered in the form of a
link or file over email and requires the user to
click on the link or open the file to execute the
malware.
Programs are also considered malware if they secretly act against the interests of the computer user.
● There are a number of different ways of
categorizing malware; the first is by
how the malicious software spreads.
● Virus
● Worm
● Spyware
● Trojans
● Rootkits
Types of Malware
© KloudLearn www.kloudlearn.com 4
Types of Malware
Virus
● A computer virus is malicious code that replicates by copying itself to another program, computer
boot sector or document and changes how a computer works.
● A virus spreads between systems after some type of human intervention.
● Viruses replicate by creating their own files on an infected system, attaching themselves to a
legitimate program, infecting a computer's boot process or infecting user documents,
● A virus can be spread when a user opens an email attachment, runs an executable file, visits an
infected website or views an infected website advertisement, known as malvertising.
● It can also be spread through infected removable storage devices, such as Universal Serial Bus
(USB) drives.
● Some viruses begin replicating as soon as they infect the host, while other viruses will lie dormant
until a specific trigger causes malicious code to be executed by the device or system.
● Many viruses also include evasion or obfuscation capabilities designed to bypass modern antivirus
and antimalware software and other security defenses.
● The rise of polymorphic malware development, which can dynamically change its code as it spreads,
has made viruses more difficult to detect and identify.
© KloudLearn www.kloudlearn.com 5
Types of Virus
© KloudLearn www.kloudlearn.com 6
● Boot Sector Virus - It is a type of virus that infects the boot sector of floppy disks or the Master Boot
Record (MBR) of hard disks. The Boot sector comprises all the files which are required to start the
Operating system of the computer. The virus either overwrites the existing program or copies itself to
another part of the disk.
● Direct Action Virus - When a virus attaches itself directly to a .exe or .com file and enters the device
while its execution is called a Direct Action Virus. If it gets installed in the memory, it keeps itself
hidden. It is also known as Non-Resident Virus.
● Resident Virus - A virus which saves itself in the memory of the computer and then infects other
files and programs when its originating program is no longer working. This virus can easily infect
other files because it is hidden in the memory and is hard to be removed from the system.
● Multipartite Virus - A virus which can attack both, the boot sector and the executable files of an
already infected computer is called a multipartite virus. If a multipartite virus attacks your system,
you are at risk of cyber threat.
Types of Virus
● Overwrite Virus - One of the most harmful viruses, the overwrite virus can completely remove the
existing program and replace it with the malicious code by overwriting it. Gradually it can completely
replace the host’s programming code with the harmful code.
● Polymorphic Virus - Spread through spam and infected websites, the polymorphic virus are file
infectors which are complex and are tough to detect. They create a modified or morphed version of
the existing program and infect the system and retain the original code.
© KloudLearn www.kloudlearn.com 7
● File Infector Virus - As the name suggests, it first infects a
single file and then later spreads itself to other executable
files and programs. The main source of this virus are
games and word processors.
● Space-filler Virus - It is a rare type of virus which fills in the
empty spaces of a file with viruses. It is known as cavity
virus. It will neither affect the size of the file nor can be
detected easily.
● Macro Virus - A virus written in the same macro language
as used in the software program and infects the computer if
a word processor file is opened. Mainly the source of such
viruses is via emails.
● Worms start to infect machine, by network, connecting
to consecutive machines in order to continue the
spread of infection.
● A computer worm is a self-replicating computer
program.
● It uses a network to send copies of itself to other nodes
(computers on the network) and it may do so without
any user intervention.
● Worms use recursive methods to copy themselves
without host programs and distribute themselves based
on the law of exponential growth, thus controlling and
infecting more and more computers in a short time.
Worms
© KloudLearn www.kloudlearn.com 8
● Independence
● Exploit attack
● Complexity
● Contagiousne
ss
Source: //techsalsa.com/tag/worms/
● Worms can be transmitted via software vulnerabilities or it
can arrive as attachments in spam emails or instant
messages.
● Once opened, these files could provide a link to a
malicious website or automatically download the
computer worm. Once it’s installed, the worm silently
goes to work and infects the machine without the user’s
knowledge.
● Worms can modify and delete files, and they can even
inject additional malicious software onto a computer.
● Sometimes a computer worm’s purpose is only to make
copies of itself over and over — depleting system
resources, such as hard drive space or bandwidth, by
overloading a shared network.
● In addition to wreaking havoc on a computer’s resources,
worms can also steal data, install a backdoor, and allow a
hacker to gain control over a computer and its system
How Do Computer Worms Work?
© KloudLearn www.kloudlearn.com 9
● A Trojan horse or Trojan is a type of malware
that is often disguised as legitimate software.
● Trojans can be employed by cyber-thieves and
hackers trying to gain access to users' systems.
● Users are typically tricked by some form of
social engineering into loading and executing
Trojans on their systems.
Trojans
© KloudLearn www.kloudlearn.com 10
� Deleting data
� Blocking data
� Modifying data
� Copying data
� Disrupting the performance of
computers or computer networks
● Once activated, Trojans
can enable cyber-
criminals to spy on you,
steal your sensitive
data, and gain backdoor
access to your system.
These actions can
include:
● Here’s a Trojan malware example to show
how it works.
● You might think you’ve received an email
from someone you know and click on what
looks like a legitimate attachment. But you’ve
been fooled. The email is from a
cybercriminal, and the file you clicked on —
and downloaded and opened — has gone on
to install malware on your device.
● When you execute the program, the malware
can spread to other files and damage your
computer.
● How? It varies. Trojans are designed to do
different things. But you’ll probably wish they
weren’t doing any of them on your device
How Trojans can Impact You
© KloudLearn www.kloudlearn.com 11
● Common types
● Backdoor trojans
● Downloader
Trojans
● Fake AV trojan
● Game-thief Trojan
● Ransom Trojan
● SMS Trojan
Spyware
● Spyware is unwanted software that
infiltrates your computing device,
stealing your internet usage data and
sensitive information.
● Spyware is classified as a type of malware
— malicious software designed to gain
access to or damage your computer, often
without your knowledge. Spyware gathers
your personal information and relays it to
advertisers, data firms, or external users.
● Spyware monitors your internet activity,
tracking your login and password
information, and spying on your sensitive
information.
● Some types of spyware can install additional
software and change the settings on your
device, so it’s important to use secure
passwords and keep your devices updated.
© KloudLearn www.kloudlearn.com 12
● Spyware can affect PCs, Macs, and iOS or
Android devices. Although Windows
operating systems may be more susceptible
to attacks, attackers are becoming better at
infiltrating Apple’s operating systems as well.
● Some of the most common ways your
computer can become infected with spyware
include these:
■ Accepting a prompt or pop-up without
reading it first
■ Downloading software from an
unreliable source
■ Opening email attachments from
unknown senders
■ Pirating media such as movies, music,
or games
Rootkit
● A rootkit is a malicious software that allows an unauthorized user to have privileged access to a
computer and to restricted areas of its software.
● A rootkit may contain a number of malicious tools such as keyloggers, banking credential stealers,
password stealers, antivirus disablers, and bots for DDoS attacks.
● This software remain hidden in the computer and allow the attacker remote access to the computer.
● The threat actor tries to obtain root/administrator access by exploiting known vulnerabilities, or by
stealing administrator privilege credentials.
● Root access allows installation of rootkits or any other malware.
● Installation of the rootkit enables the threat actor to access the computer from remote to install other
malware, steal data, observe activities and even control the computer.
● Stealth capabilities - Modern rootkits add stealth capabilities to malicious software payloads (such as
keyloggers and viruses) to make them undetectable.
● Backdoor access - Rootkits permit unauthorized access through backdoor malware. The rootkit
subverts the login mechanism to also accept a secret login access for the attacker. Standard
authentication and authorization mechanisms are bypassed to provide admin privileges to the
attacker.
© KloudLearn www.kloudlearn.com 13
How to Prevent Malware?
● Keep your computer and software updated
● Use a non-administrator accounts whenever possible
● Think twice before clicking links or downloading anything
● Be careful about opening email attachment or images
● Don’t trust pop-up windows that ask you to download software
● Limit your file-sharing
● Use antivirus software
© KloudLearn www.kloudlearn.com 14
Source:
https://www.slideshare.net/ComputerSec
urityPGP/how-to-prevent-malware
A Mitra
Security Researcher
Key Takeaways
● Malware is a malicious software
● Malware will be annoying or harmful to your own computer: destroy files, modify, change
settings, slow your computer
● It gets information from your computer
● Redirects your home page or searches or changes security settings
● Malware gets into your system through email, web pages etc.
● Run antivirus software
● avoid installing external pendrive, hard-disk etc
© KloudLearn www.kloudlearn.com 15
Test your knowledge!
Quiz
Quiz
© KloudLearn www.kloudlearn.com
Which of the following
are objectives of
Malware?
17
Provide remote control for an attacker to use
an infected machine
Investigate the infected user’s local network
Steal sensitive data
All the above
a. Malicious hardware
b. Malicious software
c. Both A and B
d. None of the above
© KloudLearn www.kloudlearn.com
Malware is short form
of?
18
© KloudLearn www.kloudlearn.com
Which of the following
is a program that copy
themselves throughout
a computer or
network?
19
Worms
Trojans
Viruses
Rootkits
Self replicating viruses
Worms on existing programs
Worms vary and hide themselves in the
operating system
All the above
© KloudLearn www.kloudlearn.com
Which is true about
worms?
20
© KloudLearn www.kloudlearn.com
Which of the following
malware do not
replicate or reproduce
through infection?
21
Worms
Trojans
Viruses
Rootkits
Trojan
Worm
Virus
Spyware
© KloudLearn www.kloudlearn.com
Which of the following
is not a stand-alone
program?
22
© KloudLearn www.kloudlearn.com
What are the examples
of malware spread
23
Social network
Pirated software
Removable media
All the above
Backdoors
Key-logger
Malware
Bots
© KloudLearn www.kloudlearn.com
What is the software
called that’s designed
to exploit a computer
user and is a broad
term covering
computer viruses,
worms, trojans etc.?
24
Denial of service
Exploits
Scams
Payload
© KloudLearn www.kloudlearn.com
__________ is the part
of malware such as
worms or viruses
which performs the
malicious action,
deleting data, sending
spam or encryption
data.
25
A bigger and more dangerous virus
Software used to duplicate viruses
Software used to prevent detect and remove
malicious software
All the above
© KloudLearn www.kloudlearn.com
What is antivirus?
26
Thank You
© KloudLearn www.kloudlearn.com 27
KloudLearn, Inc. is headquartered in Silicon Valley, California. Our mission is to
help enterprises provide an engaging and impactful learning experience that
improves business performance. We provide the industry’s most modern LMS
(Learning Management System). For more information visit us at
www.kloudlearn.com or reach out to us at info@kloudlearn.com

Contenu connexe

Tendances

Tendances (20)

Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Cyber security
Cyber securityCyber security
Cyber security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ransomware
RansomwareRansomware
Ransomware
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Phishing
PhishingPhishing
Phishing
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing
PhishingPhishing
Phishing
 

Similaire à What is a Malware - Kloudlearn

Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Dasun Hegoda
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virusKennethMorales26
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 

Similaire à What is a Malware - Kloudlearn (20)

Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious
MaliciousMalicious
Malicious
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Malwares
MalwaresMalwares
Malwares
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 

Plus de KloudLearn

Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - KloudlearnKloudLearn
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnKloudLearn
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnKloudLearn
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - KloudlearnKloudLearn
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnKloudLearn
 
KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform KloudLearn
 

Plus de KloudLearn (7)

Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - Kloudlearn
 
KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform
 

Dernier

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 

Dernier (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 

What is a Malware - Kloudlearn

  • 1. Online course offering Malware © KloudLearn www.kloudlearn.com
  • 2. Learning Objectives © KloudLearn www.kloudlearn.com 2 What is Malware? Types of Malware Virus Types of Virus Worms How do Computer Worms Work? Spyware Trojans Rootkits How to Prevent Malware Key Takeaways
  • 3. Malware © KloudLearn www.kloudlearn.com 3 Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware. Malware is typically delivered in the form of a link or file over email and requires the user to click on the link or open the file to execute the malware. Programs are also considered malware if they secretly act against the interests of the computer user.
  • 4. ● There are a number of different ways of categorizing malware; the first is by how the malicious software spreads. ● Virus ● Worm ● Spyware ● Trojans ● Rootkits Types of Malware © KloudLearn www.kloudlearn.com 4 Types of Malware
  • 5. Virus ● A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works. ● A virus spreads between systems after some type of human intervention. ● Viruses replicate by creating their own files on an infected system, attaching themselves to a legitimate program, infecting a computer's boot process or infecting user documents, ● A virus can be spread when a user opens an email attachment, runs an executable file, visits an infected website or views an infected website advertisement, known as malvertising. ● It can also be spread through infected removable storage devices, such as Universal Serial Bus (USB) drives. ● Some viruses begin replicating as soon as they infect the host, while other viruses will lie dormant until a specific trigger causes malicious code to be executed by the device or system. ● Many viruses also include evasion or obfuscation capabilities designed to bypass modern antivirus and antimalware software and other security defenses. ● The rise of polymorphic malware development, which can dynamically change its code as it spreads, has made viruses more difficult to detect and identify. © KloudLearn www.kloudlearn.com 5
  • 6. Types of Virus © KloudLearn www.kloudlearn.com 6 ● Boot Sector Virus - It is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files which are required to start the Operating system of the computer. The virus either overwrites the existing program or copies itself to another part of the disk. ● Direct Action Virus - When a virus attaches itself directly to a .exe or .com file and enters the device while its execution is called a Direct Action Virus. If it gets installed in the memory, it keeps itself hidden. It is also known as Non-Resident Virus. ● Resident Virus - A virus which saves itself in the memory of the computer and then infects other files and programs when its originating program is no longer working. This virus can easily infect other files because it is hidden in the memory and is hard to be removed from the system. ● Multipartite Virus - A virus which can attack both, the boot sector and the executable files of an already infected computer is called a multipartite virus. If a multipartite virus attacks your system, you are at risk of cyber threat.
  • 7. Types of Virus ● Overwrite Virus - One of the most harmful viruses, the overwrite virus can completely remove the existing program and replace it with the malicious code by overwriting it. Gradually it can completely replace the host’s programming code with the harmful code. ● Polymorphic Virus - Spread through spam and infected websites, the polymorphic virus are file infectors which are complex and are tough to detect. They create a modified or morphed version of the existing program and infect the system and retain the original code. © KloudLearn www.kloudlearn.com 7 ● File Infector Virus - As the name suggests, it first infects a single file and then later spreads itself to other executable files and programs. The main source of this virus are games and word processors. ● Space-filler Virus - It is a rare type of virus which fills in the empty spaces of a file with viruses. It is known as cavity virus. It will neither affect the size of the file nor can be detected easily. ● Macro Virus - A virus written in the same macro language as used in the software program and infects the computer if a word processor file is opened. Mainly the source of such viruses is via emails.
  • 8. ● Worms start to infect machine, by network, connecting to consecutive machines in order to continue the spread of infection. ● A computer worm is a self-replicating computer program. ● It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. ● Worms use recursive methods to copy themselves without host programs and distribute themselves based on the law of exponential growth, thus controlling and infecting more and more computers in a short time. Worms © KloudLearn www.kloudlearn.com 8 ● Independence ● Exploit attack ● Complexity ● Contagiousne ss
  • 9. Source: //techsalsa.com/tag/worms/ ● Worms can be transmitted via software vulnerabilities or it can arrive as attachments in spam emails or instant messages. ● Once opened, these files could provide a link to a malicious website or automatically download the computer worm. Once it’s installed, the worm silently goes to work and infects the machine without the user’s knowledge. ● Worms can modify and delete files, and they can even inject additional malicious software onto a computer. ● Sometimes a computer worm’s purpose is only to make copies of itself over and over — depleting system resources, such as hard drive space or bandwidth, by overloading a shared network. ● In addition to wreaking havoc on a computer’s resources, worms can also steal data, install a backdoor, and allow a hacker to gain control over a computer and its system How Do Computer Worms Work? © KloudLearn www.kloudlearn.com 9
  • 10. ● A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. ● Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. ● Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Trojans © KloudLearn www.kloudlearn.com 10 � Deleting data � Blocking data � Modifying data � Copying data � Disrupting the performance of computers or computer networks ● Once activated, Trojans can enable cyber- criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include:
  • 11. ● Here’s a Trojan malware example to show how it works. ● You might think you’ve received an email from someone you know and click on what looks like a legitimate attachment. But you’ve been fooled. The email is from a cybercriminal, and the file you clicked on — and downloaded and opened — has gone on to install malware on your device. ● When you execute the program, the malware can spread to other files and damage your computer. ● How? It varies. Trojans are designed to do different things. But you’ll probably wish they weren’t doing any of them on your device How Trojans can Impact You © KloudLearn www.kloudlearn.com 11 ● Common types ● Backdoor trojans ● Downloader Trojans ● Fake AV trojan ● Game-thief Trojan ● Ransom Trojan ● SMS Trojan
  • 12. Spyware ● Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. ● Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware gathers your personal information and relays it to advertisers, data firms, or external users. ● Spyware monitors your internet activity, tracking your login and password information, and spying on your sensitive information. ● Some types of spyware can install additional software and change the settings on your device, so it’s important to use secure passwords and keep your devices updated. © KloudLearn www.kloudlearn.com 12 ● Spyware can affect PCs, Macs, and iOS or Android devices. Although Windows operating systems may be more susceptible to attacks, attackers are becoming better at infiltrating Apple’s operating systems as well. ● Some of the most common ways your computer can become infected with spyware include these: ■ Accepting a prompt or pop-up without reading it first ■ Downloading software from an unreliable source ■ Opening email attachments from unknown senders ■ Pirating media such as movies, music, or games
  • 13. Rootkit ● A rootkit is a malicious software that allows an unauthorized user to have privileged access to a computer and to restricted areas of its software. ● A rootkit may contain a number of malicious tools such as keyloggers, banking credential stealers, password stealers, antivirus disablers, and bots for DDoS attacks. ● This software remain hidden in the computer and allow the attacker remote access to the computer. ● The threat actor tries to obtain root/administrator access by exploiting known vulnerabilities, or by stealing administrator privilege credentials. ● Root access allows installation of rootkits or any other malware. ● Installation of the rootkit enables the threat actor to access the computer from remote to install other malware, steal data, observe activities and even control the computer. ● Stealth capabilities - Modern rootkits add stealth capabilities to malicious software payloads (such as keyloggers and viruses) to make them undetectable. ● Backdoor access - Rootkits permit unauthorized access through backdoor malware. The rootkit subverts the login mechanism to also accept a secret login access for the attacker. Standard authentication and authorization mechanisms are bypassed to provide admin privileges to the attacker. © KloudLearn www.kloudlearn.com 13
  • 14. How to Prevent Malware? ● Keep your computer and software updated ● Use a non-administrator accounts whenever possible ● Think twice before clicking links or downloading anything ● Be careful about opening email attachment or images ● Don’t trust pop-up windows that ask you to download software ● Limit your file-sharing ● Use antivirus software © KloudLearn www.kloudlearn.com 14 Source: https://www.slideshare.net/ComputerSec urityPGP/how-to-prevent-malware A Mitra Security Researcher
  • 15. Key Takeaways ● Malware is a malicious software ● Malware will be annoying or harmful to your own computer: destroy files, modify, change settings, slow your computer ● It gets information from your computer ● Redirects your home page or searches or changes security settings ● Malware gets into your system through email, web pages etc. ● Run antivirus software ● avoid installing external pendrive, hard-disk etc © KloudLearn www.kloudlearn.com 15
  • 17. © KloudLearn www.kloudlearn.com Which of the following are objectives of Malware? 17 Provide remote control for an attacker to use an infected machine Investigate the infected user’s local network Steal sensitive data All the above
  • 18. a. Malicious hardware b. Malicious software c. Both A and B d. None of the above © KloudLearn www.kloudlearn.com Malware is short form of? 18
  • 19. © KloudLearn www.kloudlearn.com Which of the following is a program that copy themselves throughout a computer or network? 19 Worms Trojans Viruses Rootkits
  • 20. Self replicating viruses Worms on existing programs Worms vary and hide themselves in the operating system All the above © KloudLearn www.kloudlearn.com Which is true about worms? 20
  • 21. © KloudLearn www.kloudlearn.com Which of the following malware do not replicate or reproduce through infection? 21 Worms Trojans Viruses Rootkits
  • 22. Trojan Worm Virus Spyware © KloudLearn www.kloudlearn.com Which of the following is not a stand-alone program? 22
  • 23. © KloudLearn www.kloudlearn.com What are the examples of malware spread 23 Social network Pirated software Removable media All the above
  • 24. Backdoors Key-logger Malware Bots © KloudLearn www.kloudlearn.com What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, trojans etc.? 24
  • 25. Denial of service Exploits Scams Payload © KloudLearn www.kloudlearn.com __________ is the part of malware such as worms or viruses which performs the malicious action, deleting data, sending spam or encryption data. 25
  • 26. A bigger and more dangerous virus Software used to duplicate viruses Software used to prevent detect and remove malicious software All the above © KloudLearn www.kloudlearn.com What is antivirus? 26
  • 27. Thank You © KloudLearn www.kloudlearn.com 27 KloudLearn, Inc. is headquartered in Silicon Valley, California. Our mission is to help enterprises provide an engaging and impactful learning experience that improves business performance. We provide the industry’s most modern LMS (Learning Management System). For more information visit us at www.kloudlearn.com or reach out to us at info@kloudlearn.com