3
Most read
4
Most read
6
Most read
Common malware and countermeasures
MALWARE
(Malicious-Software)
Ask yourself this. This power point presentation is named malware.
Did you run a scan on it before opening.?
 A Malware is a specific set of codes or an
application , specifically designed to harm
and/or to gain access to a targeted computer
, or spread across multiple computers ; over
the use of a network or a data storage device.
Malware is a Malicious
Software
As old as the Software itself
Any harmful piece of program.
 Virus
 Worm
 Trojan horse
 Spyware
 Phishing
The first malware was a Virus
It Appeared in the realms of
computer were ELK Cloner and
Brain virus.
The “ELK Cloner” virus
appeared on Apple MAC in
1982 , and was created by Rich
Skrenta from
Pennsylvania, United States.
FIRST MALWARE OF THE WORLD
The Brain virus was programmed by two
brothers ; Amjad Farooq Alvi and Basit Farooq
Alvi , from Lahore Pakistan in 1986.
 1990 focused targeting on colleges and
universities
 Mid 20th century started targeting businesses
 After the year 2000 target was The Internet !
 To attack or takedown websites
• Destroying the online presence and credibility.
• Financial Theft.
BRIEF HISTORY OF MALWARES.
BRIEF HISTORY OF MALWARES.
The “Worn Outbreak ERA”
From 2000-2003
The “WEB THREAT ERA”
From 2004-2008
 Current Era of Malwares as termed by
experts:
BRIEF HISTORY OF MALWARES.
Common malware and countermeasures
 Evolution of Malware over (2003-2010):
Common malware and countermeasures
 Virus replicates into the network by creating copies
of itself in the computer files.
◦ Need a file to survive, infect and replicate
 Virus is designed to damage or read data on
computers or cause interruptions in work
 Melissa virus is a top known virus.
• Self duplicating malware that spreads out independentl
• Eats the Network
• Famous of all time and first Worm– Morris Worm
• Stuxtnet Worm !
 The Trojan Horse by the Greeks
 Hides in a legitimate software
 Tricks users to install it
 Gains privileged access to the OS
 Makes a botnet
 Non self replicating
 NetBus is a well known trojan from 1988
 As the name suggests SPYware!
 Steals information
 Hard to detect
 SpyAnytime, CASE, GATOR are spywares
 Pretend Play!
 Get financial or personal information
 Corporate espionage
 Fake calls and emails
 Common target today is social networking sites
Malwares will always be Chasing you!
Adopt layers of security for defense
◦ Anti Virus and Scans
◦ Install software from trusted vendors
◦ Avoid opening unknown attachments
◦ Do not insert media on known infected computer
◦ Clean out old files
Keep up your security shields
◦ Always re confirm source
◦ Monitor network traffic
◦ Audit logs
◦ Keep OS updated
◦ All other common security measures
KEEP YOUR GUARD UP
Malwares are now not
restricted to
computers only ,
these have made their
way into the world of
cell phones and
tablets.
Major affecting the
mobiles containing
the Android and IOS
operating system.
STATISTICS ; MALWARE , Type.
Malware Distribution by type:
In order to countermeasure the threats of
malware , the user should:
• Installing Anti-Malware
Applications.
• Often Get the data drive
Scan and analyzed.
• Gaining basic knowledge
about the way malwares
work.
• Installing Basic internet
Security Applications.

More Related Content

PPTX
How Hashing Algorithms Work
PPTX
Operating system security
PDF
Network Security Presentation
PPTX
Cryptography
PPTX
Operating system security
PPTX
Steganography
PPTX
Cryptography and network security
PPTX
Public Key Cryptosystem
How Hashing Algorithms Work
Operating system security
Network Security Presentation
Cryptography
Operating system security
Steganography
Cryptography and network security
Public Key Cryptosystem

What's hot (20)

PDF
PPTX
Cryptography.ppt
PDF
Introduction to Cryptography
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
PPT
Information Security
PPT
Block Cipher and its Design Principles
PPTX
Protection and security
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPTX
Cia security model
PPTX
Public Key Cryptography
PPTX
Cyber attack
PPTX
Network security
PPTX
Cryptography
PPTX
Cryptography and Network Security
PPT
Introduction to Cyber Security
PPT
12 symmetric key cryptography
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Hash Function
PDF
Presentation On Steganography
Cryptography.ppt
Introduction to Cryptography
Cryptography - Block cipher & stream cipher
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security
Block Cipher and its Design Principles
Protection and security
Virus and its CounterMeasures -- Pruthvi Monarch
Cia security model
Public Key Cryptography
Cyber attack
Network security
Cryptography
Cryptography and Network Security
Introduction to Cyber Security
12 symmetric key cryptography
Block Ciphers and the Data Encryption Standard
Hash Function
Presentation On Steganography
Ad

Viewers also liked (20)

PDF
MR201504 Web Defacing Attacks Targeting WordPress
PDF
Anti-Virus Evasion techniques and Countermeasures
PDF
PPT
Dos threats and countermeasures
PPTX
Spyware and key loggers
PPT
Counter Measures Of Virus
PPTX
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
PPT
Keyloggers and Spywares
PPT
Threats, Vulnerabilities & Security measures in Linux
PPTX
Secure Hash Algorithm (SHA-512)
PPS
introduction to malwares,virus,trojan horse
PDF
Processing tech malicioussoftware_ecommerce
PPTX
Caesar cipher
PDF
Big Data For Flight Delay Report
PPTX
Pgp pretty good privacy
PPT
Secure hashing algorithm
PDF
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
PPT
PPT
Network Attacks
MR201504 Web Defacing Attacks Targeting WordPress
Anti-Virus Evasion techniques and Countermeasures
Dos threats and countermeasures
Spyware and key loggers
Counter Measures Of Virus
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Keyloggers and Spywares
Threats, Vulnerabilities & Security measures in Linux
Secure Hash Algorithm (SHA-512)
introduction to malwares,virus,trojan horse
Processing tech malicioussoftware_ecommerce
Caesar cipher
Big Data For Flight Delay Report
Pgp pretty good privacy
Secure hashing algorithm
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
Network Attacks
Ad

Similar to Common malware and countermeasures (20)

PPTX
Module_09_Malware_Presentation_for_IT500.pptx
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PPT
Malware by Ms. Allwood
PPTX
MALWARE AND ITS TYPES
PPTX
PPTX
Malware ppt final.pptx
PPTX
Malware: To The Realm of Malicious Code (Training)
PPTX
SECURITY THREATS AND SAFETY MEASURES
PPTX
What is Malware (Virus), Types of Malware
PPTX
What is Malware (Antivirus)
PPTX
Lecture_11_Malware_information_Security.pptx
PPTX
MALWARE
PPT
10-malware.ppt
PPT
10-malware.ppt
PPTX
Introduction to Malwares
PPTX
Computer Viruses
PPT
list of Deception as well as detection techniques for maleware
PDF
Online Safety - Malwares
PPTX
computer virus ppt.pptx
Module_09_Malware_Presentation_for_IT500.pptx
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Malware by Ms. Allwood
MALWARE AND ITS TYPES
Malware ppt final.pptx
Malware: To The Realm of Malicious Code (Training)
SECURITY THREATS AND SAFETY MEASURES
What is Malware (Virus), Types of Malware
What is Malware (Antivirus)
Lecture_11_Malware_information_Security.pptx
MALWARE
10-malware.ppt
10-malware.ppt
Introduction to Malwares
Computer Viruses
list of Deception as well as detection techniques for maleware
Online Safety - Malwares
computer virus ppt.pptx

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
A comparative study of natural language inference in Swahili using monolingua...
DOCX
search engine optimization ppt fir known well about this
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Five Habits of High-Impact Board Members
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
The various Industrial Revolutions .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Abstractive summarization using multilingual text-to-text transfer transforme...
A comparative study of natural language inference in Swahili using monolingua...
search engine optimization ppt fir known well about this
Hindi spoken digit analysis for native and non-native speakers
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Consumable AI The What, Why & How for Small Teams.pdf
A proposed approach for plagiarism detection in Myanmar Unicode text
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Microsoft Excel 365/2024 Beginner's training
OpenACC and Open Hackathons Monthly Highlights July 2025
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Five Habits of High-Impact Board Members
Getting started with AI Agents and Multi-Agent Systems
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
UiPath Agentic Automation session 1: RPA to Agents
The various Industrial Revolutions .pptx

Common malware and countermeasures

  • 2. MALWARE (Malicious-Software) Ask yourself this. This power point presentation is named malware. Did you run a scan on it before opening.?
  • 3.  A Malware is a specific set of codes or an application , specifically designed to harm and/or to gain access to a targeted computer , or spread across multiple computers ; over the use of a network or a data storage device.
  • 4. Malware is a Malicious Software As old as the Software itself Any harmful piece of program.
  • 5.  Virus  Worm  Trojan horse  Spyware  Phishing
  • 6. The first malware was a Virus It Appeared in the realms of computer were ELK Cloner and Brain virus. The “ELK Cloner” virus appeared on Apple MAC in 1982 , and was created by Rich Skrenta from Pennsylvania, United States. FIRST MALWARE OF THE WORLD
  • 7. The Brain virus was programmed by two brothers ; Amjad Farooq Alvi and Basit Farooq Alvi , from Lahore Pakistan in 1986.
  • 8.  1990 focused targeting on colleges and universities  Mid 20th century started targeting businesses  After the year 2000 target was The Internet !  To attack or takedown websites • Destroying the online presence and credibility. • Financial Theft. BRIEF HISTORY OF MALWARES.
  • 9. BRIEF HISTORY OF MALWARES. The “Worn Outbreak ERA” From 2000-2003 The “WEB THREAT ERA” From 2004-2008
  • 10.  Current Era of Malwares as termed by experts: BRIEF HISTORY OF MALWARES.
  • 12.  Evolution of Malware over (2003-2010):
  • 14.  Virus replicates into the network by creating copies of itself in the computer files. ◦ Need a file to survive, infect and replicate  Virus is designed to damage or read data on computers or cause interruptions in work  Melissa virus is a top known virus.
  • 15. • Self duplicating malware that spreads out independentl • Eats the Network • Famous of all time and first Worm– Morris Worm • Stuxtnet Worm !
  • 16.  The Trojan Horse by the Greeks  Hides in a legitimate software  Tricks users to install it  Gains privileged access to the OS  Makes a botnet  Non self replicating  NetBus is a well known trojan from 1988
  • 17.  As the name suggests SPYware!  Steals information  Hard to detect  SpyAnytime, CASE, GATOR are spywares
  • 18.  Pretend Play!  Get financial or personal information  Corporate espionage  Fake calls and emails  Common target today is social networking sites
  • 19. Malwares will always be Chasing you! Adopt layers of security for defense ◦ Anti Virus and Scans ◦ Install software from trusted vendors ◦ Avoid opening unknown attachments ◦ Do not insert media on known infected computer ◦ Clean out old files
  • 20. Keep up your security shields ◦ Always re confirm source ◦ Monitor network traffic ◦ Audit logs ◦ Keep OS updated ◦ All other common security measures KEEP YOUR GUARD UP
  • 21. Malwares are now not restricted to computers only , these have made their way into the world of cell phones and tablets. Major affecting the mobiles containing the Android and IOS operating system.
  • 22. STATISTICS ; MALWARE , Type. Malware Distribution by type:
  • 23. In order to countermeasure the threats of malware , the user should: • Installing Anti-Malware Applications. • Often Get the data drive Scan and analyzed. • Gaining basic knowledge about the way malwares work. • Installing Basic internet Security Applications.

Editor's Notes

  • #3: MALWARE is basically a merge of two words. Malicious and Software.
  • #4: Initially the term “Malware was used in the sense of computers” but as technology progressed , malwares made their way into the realms of cell phones and any other computing device , with a standard OS running into it . For example an interesting fact is that certain devices like a GPS mapping device , or a house security devices are also prone to specialized malware attacks , but are less common than the standard computer counterparts.
  • #5: Malware is a broad term used for a Malicious Software and is as old as the Software itself. Without any technical details, any harmful piece of program is a malware. The way that particular malicious software / malware is designed to cause damage and spread into the system or network defines the type of malware. Much in same way as we define a Software as desktop based application, web application, web service, code executable etc. Similarly, malwares; based on their nature and affects, are defined into
  • #6: VirusWormTrojan horseSpywarePhishingApart from the difference in these types, all malwares cause harm in one way or another.
  • #7: Although the functionalities that a virus has were discovered way before ELK Cloner , these were never meant to harm data on a device , and were either appeared by an accident or were by-products of experimentations.An interesting fact about the ELK Cloner is that it was not actually intended to harm any computer , rather it was termed to be prank among students.
  • #8: The main intention of the malware was to replace the booting label of a floppy disk , to replace by a message of their own.Just like Vandalism , they set the tracks for electronic vandalism. The brothers now run a legal and fruitful internet Service provider business , ironically called the “BRAIN TELECOMMUNICATION LIMITED”.Their message that they replaced with the booting message of a floppy device was “Welcome to the Dungeon (c) 1986 Basit & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us today - Thanks GOODNESS!! BEWARE OF THE er..VIRUS : this program is catching program follows after these messages....$#@%$@!!”
  • #9: As time progressed , the aggressiveness of these malwares increased. Up until 1990s the malwares were restricted to college and university as pranks and jokes.The middle of the twentieth century , the malwares started affecting businesses and even damaged the hardware of the devices.After the millennium , Many websites were also attacked , hindering damage on the users of these webpages.Fraud and online hacking using malware for the purpose of financial theft boomed in the decade.Online Bank Hacking and Social engineering also increased.
  • #10: Most experts termed the timeline as ERAs of Malware Evolutions.From 2000 till 2003 is termed as the era of the “WORM OUTBREAK” Focusing mostly on spreading Malwares.From 2004 till 2008 is termed as the era of the “WEB THREAT”. Focusing mostly on online financial thefts and frauds.Currently in 2013 , this era is considered to be the “SOCIAL ATTACKS ERA”
  • #11: This era is based on the platform based malware attacks , as the social networks have provided the option of go-ready sensitive information of an unexperienced user online .
  • #12: Simba.B : Root virus Responsible for gathering users financial Information and sabotaging data.Fake Alert.D. Trojan Malware responsible for data theft and data destruction.Ranson.BE78: Virus responsible for giving illegal access to a users database , to a hacker.Zbot.ANQ: Deadly virus responsible for corrupting important OS related registry files. This virus is specifically hard to detect.
  • #13: Depicting the exponential increase in the evolution in malware from the years 2008 to 2010.<add some stats for 2013 OR just add a line here to state what is the %age increase of malware from 2010 to 2013 >
  • #14: Without the proper knowledge , internet is not actually a safe place for a casual surfer.
  • #15: The distinguishing feature of Virus is that it is programmed to replicate itself and spread in the computer and network by copying itself into neighboring files. It is not a standalone malware and needs to reside in computer files to replicateVirus usually affects the CPU cycles, corrupts the infected files, logs keystrokes , display error / spam messages on the computer screens or when you open a file and most harmful of all, it resides in the boot sector (called root kit virus) and never goes away unless a fresh copy of OS is installed. The Melissa virus, written by David L Smith in homage to a Florida stripper, was the first successful email-aware virus and inserted a quote from The Simpsons in to Word documents. Smith was later sentenced to jail for causing over $80 million worth of damage
  • #16: Distinguishing feature of worm is that it is self replicating and does not need to reside in files to spread out. Usually it affects mostly Network services like bandwith by generating extra traffic or exploiting vulnerability of the networkMorris worm was the world’s first big time damaging worm that spread over the internet back in 1988One of the most recent worms is the Stuxtnet worm that started in 2012 to destroy the Iran’s nuclear system and is still to date active. Iran is trying to over come it
  • #17: The concept of a trojan malware is stolen from the Trojan horse that was used to gain access into the city of Troy that was otherwise too strong to get into. Same concept applies. Malware is hidden in a ligit software piece or a file with a back door for the virus to attack. Users think it is a valid file and install it. Its main purpose is to gain a privileged access to the OS and then elicit the access into the systems and makes it its slave to do damages to other systems. Netbus was introduced in 1988 and makes windows machines its slaveZues steals information by keystroke logging and was introduced in 2007
  • #18: Spyware is a malware program that gets installed on the computer through a file downloaded, game installed, email opened or installed on the computer by an attackerMainly it steals information: It logs all keystrokes, sends activity reports back to the hacker, monitors all traffic, copies data onto a remote computerVery hard to get rid of as they are hidden just like its hard to spot a spy amongst a friendly group of peopleSpyAnytime, CASE, GATOR are spywares that are readilyavaialble
  • #19: Phishing is when some one wants to get credit card information or user ID passwords or other such information to gain access into a system, the person will pretend to be a legitimate receiver of that information by faking its identity. E.g a fake call made to the support team to say that “this is Mr smith’ and my password is expired and email is not working so please tell me my new password over phone” Fake emails are also common to trick users into clicking links and supplying user Ids which are cachted by the hackerA Common target today is social networking sites. In 2006 , a phishing emails tricked users of myspace to give out their user IDs and passwords
  • #20: The best way to protect from Viruses is to ensure:Install and keep updated a good anti virus like Symmetric, nortronAlways scan USBs, DVDs before, preferably scan on another machine before plugging into your PCNever open emails or attachments that are not from a trusted sourceScan the emails and attachments specially if graphic filesAlways install software from their vendor’s original URLsWhen installing a new software, always scan it for virusesIf you know a usb is infected, or has been repeatedly plugged into a public network like a net cafe, never plug it inRemove unwanted files from computer as dormant files are trojansAlways re confirm source of an email and call asking for information
  • #21: Always re confirm source of an email and call asking for informationFor worms affecting networks, have network monitoring and scanning enabledHave system logging enabled to track keyloggers. Although sometimes they delete logs as wellAlways have patched systems as few worms explout known vulerabilities in OSHave good security practices
  • #22: As technology has progressed , we receive the ease of managing our finances online , on the go and mobile ; using our cell phones , which have also come under attack of a number of different malwares , specifically designed to spy on the user as he lives his life.
  • #23: Trojan horses rank as the most number of malware attacks overall.<remove the date from the pic>
  • #24: Install certified anti-virus and anti-spyware software in fresh copies of their OS.Do not accept random files from untrusted sources over the internet.Get the data drive Scan and analyzed by appropriate malware detecting soft-wares.Gaining basic knowledge , about how to operate several portable devices securely. (#Major reason of Malware Spread)Installing Basic internet Security Applications.