MALWARE
1. Malware
2. Usage of Malware
3. Types of Malware
4. How Malware Spreads?
5. How Can You Protect Computer?
6. Symptoms
7. Anti-Malware Program
MALWARE
Short for malicious software.
A is software used or created to disrupt computer
operation, gather sensitive information, or gain
access to private computer systems.
• It can appear in the form of code, scripts, active
content, and other software.
• Malware' is a general term used to refer to a variety
of forms of hostile, intrusive, or annoying software.
Usage of Malware
• Many early infectious programs, including the first
Internet Worm, were written as experiments or pranks.
• Today, malware is used primarily to steal sensitive
personal, financial, or business information for the
benefit of others.
• Malware is sometimes used broadly against
government or corporate websites to gather guarded
information, or to disrupt their operation in general.
• However, malware is often used against individuals to
gain personal information such as social security
numbers, bank or credit card numbers, and so on
Types of Malware
• Viruses
• Trojan horses
• Worms
• Spyware
• Zombie
• Phishing
• Spam
• Adware
• Ransomware
Types of Malware
Viruses
A program or piece of code that is loaded
onto your computer without your
knowledge and runs against your wishes
.
Viruses can also replicate themselves
All computer viruses are manmade
Viruses
Examples of computer viruses are:
Macro virus
Boot virus
Logic Bomb virus
Directory virus
Resident virus
Trojan Horses
A Trojan Horse program has the appearance of
having a useful and desired function.
A Trojan Horse neither replicates nor copies itself,
but causes damage or compromises the security of
the computer.
A Trojan Horse must be sent by someone or carried
by another program and may arrive in the form of a
joke program or software of some sort.
These are often used to capture your logins and
passwords
Types of Malware
• Types of Malware
Example of Trojan Horse
• Remote access Trojans
• Backdoor Trojans (back
• IRC Trojans (IRCbots)
• Keylogging Trojans
Types of Malware
• Worms
• A computer worm is a self-replicating computer
program.
• It uses a network to send copies of itself to
other
nodes (computers on the network) and it may do
so without any user intervention.
• It does not need to attach itself to an existing
program.
Spyware
•Spyware is a type of malware installed on
computers that collects information about users
without their knowledge.
• The presence of spyware is typically hidden from
the user and can be difficult to detect.
• Spyware programs lurk on your computer to steal
important information, like your passwords and
logins and other personal identification information
and then send it off to someone else.
Types of Malware
Zombie
• Zombie programs take
control of your computer
and use it and its Internet
connection to attack other
computers or networks or
to perform other criminal
activities
Phishing
• Phishing (pronounced like the word 'fishing') is a
message that tries to trick you into providing
information like your social security number or
bank account information or logon and password
for a web site.
• The message may claim that if you do not click on
the link in the message and log onto a financial
web site that your account will be blocked, or some
other disaster
Phishing
SPAM
• Spam is email that you did not request and do
not want.
• One person's spam is another's useful
newsletter or sale ad.
• Spam is a common way to spread viruses,
trojans, and the like.
SPAM
ADWARE
• Adware (short for advertising-supported software)
is a type of malware that automatically delivers
advertisements.
• Common examples of adware include pop-up ads
on websites and advertisements that are displayed
by software.
• Often times software and applications offer “free”
versions that come bundled with adware.
ADWARE
RANSOMWARE
• Ransomware is a form of malware that essentially
holds a computer system captive while demanding
a ransom.
• The malware restricts user access to the
computer either by encrypting files on the hard
drive or locking down the system and displaying
messages that are intended to force the user to pay
the malware creator to remove the restrictions and
regain access to their computer.

More Related Content

PDF
How To Protect From Malware
PPT
Owasp Top 10 And Security Flaw Root Causes
PPTX
Web security
PPTX
Dos attack
PPT
Trojan Horse Presentation
PPTX
Network Attacks - (Information Assurance and Security)BS in Information Techn...
PPTX
Cyber Security Awareness Program.pptx
PPTX
Ppt123
How To Protect From Malware
Owasp Top 10 And Security Flaw Root Causes
Web security
Dos attack
Trojan Horse Presentation
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Cyber Security Awareness Program.pptx
Ppt123

What's hot (20)

PPTX
PPT
virus,worms & analysis
PDF
Cybersecurity Awareness Presentation.pdf
PPTX
Social engineering
PPTX
Malware and different types of malwares.
PPTX
Phishing technology
PPTX
Cyber security
PPTX
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
PDF
Malware analysis _ Threat Intelligence Morocco
PDF
Employee Security Awareness Program
PPTX
PPTX
Social engineering
PPTX
Cyber security
PPT
Module 8 System Hacking
PPT
Viruses, Worms And Trojan Horses
PPTX
Ddos attacks
PPT
Web security ppt sniper corporation
PDF
Information Security Awareness Deck and Training
PDF
Open Source IDS Tools: A Beginner's Guide
virus,worms & analysis
Cybersecurity Awareness Presentation.pdf
Social engineering
Malware and different types of malwares.
Phishing technology
Cyber security
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
Malware analysis _ Threat Intelligence Morocco
Employee Security Awareness Program
Social engineering
Cyber security
Module 8 System Hacking
Viruses, Worms And Trojan Horses
Ddos attacks
Web security ppt sniper corporation
Information Security Awareness Deck and Training
Open Source IDS Tools: A Beginner's Guide
Ad

Similar to Malware part 1 (20)

PPTX
NS 2.pptx
PPTX
lecture-11-30052022-103626am.pptx
PPTX
Computer virus
PPT
Computers Diseases
PPTX
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
PPT
CyberSecurity presentation for basic knowledge about this topic
PPTX
PPTX
Introduction To Malware
PPT
Malicious
PPTX
Ppt on cyber security
PPTX
Cyber security
PPTX
Security threats and safety measures
PPTX
Computer Security Presentation
PPTX
Dos and Don'ts of Internet Security
PPT
Malwares
PPTX
NETWORK SECURITY THREATS - POWERPOINT PRESENTATION
PPTX
Cyber crime & security
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
Computer-vIRUS-malicious software and worm.pptx
NS 2.pptx
lecture-11-30052022-103626am.pptx
Computer virus
Computers Diseases
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
CyberSecurity presentation for basic knowledge about this topic
Introduction To Malware
Malicious
Ppt on cyber security
Cyber security
Security threats and safety measures
Computer Security Presentation
Dos and Don'ts of Internet Security
Malwares
NETWORK SECURITY THREATS - POWERPOINT PRESENTATION
Cyber crime & security
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Computer-vIRUS-malicious software and worm.pptx
Ad

More from ShouaQureshi (18)

PPTX
touchscreens
PPTX
3D Priinters
PPTX
2D and 3D Cutter
PPTX
scanners touchscreen bar code readers
PPTX
impact and non impact printers
PPTX
Chapter 1
PPTX
2d and 3d cutters
PPTX
Key,ID Field and Tables Relationship
PPTX
Input and output devices
PPTX
Malware part 2
DOCX
Multiple choice questions chapter 1
PDF
Hacker cracker cybercrime-computer security
PPTX
Malware and its types
PPTX
Class ix ms word part 1
PPTX
Word processing part 2 lecture and assignment updated
PPTX
Spreadsheet new
PPTX
Manupulating and formatting data
PPTX
Protect computer from malware
touchscreens
3D Priinters
2D and 3D Cutter
scanners touchscreen bar code readers
impact and non impact printers
Chapter 1
2d and 3d cutters
Key,ID Field and Tables Relationship
Input and output devices
Malware part 2
Multiple choice questions chapter 1
Hacker cracker cybercrime-computer security
Malware and its types
Class ix ms word part 1
Word processing part 2 lecture and assignment updated
Spreadsheet new
Manupulating and formatting data
Protect computer from malware

Recently uploaded (20)

PDF
Journal of Dental Science - UDMY (2022).pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
semiconductor packaging in vlsi design fab
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Farming Based Livelihood Systems English Notes
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Journal of Dental Science - UDMY (2021).pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
Compact First Student's Book Cambridge Official
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
Journal of Dental Science - UDMY (2022).pdf
UNIT_2-__LIPIDS[1].pptx.................
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
semiconductor packaging in vlsi design fab
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Literature_Review_methods_ BRACU_MKT426 course material
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
My India Quiz Book_20210205121199924.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Farming Based Livelihood Systems English Notes
AI-driven educational solutions for real-life interventions in the Philippine...
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Journal of Dental Science - UDMY (2021).pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
Compact First Student's Book Cambridge Official
Everyday Spelling and Grammar by Kathi Wyldeck

Malware part 1

  • 1. MALWARE 1. Malware 2. Usage of Malware 3. Types of Malware 4. How Malware Spreads? 5. How Can You Protect Computer? 6. Symptoms 7. Anti-Malware Program
  • 2. MALWARE Short for malicious software. A is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. • It can appear in the form of code, scripts, active content, and other software. • Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.
  • 3. Usage of Malware • Many early infectious programs, including the first Internet Worm, were written as experiments or pranks. • Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others. • Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. • However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on
  • 4. Types of Malware • Viruses • Trojan horses • Worms • Spyware • Zombie • Phishing • Spam • Adware • Ransomware
  • 5. Types of Malware Viruses A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes . Viruses can also replicate themselves All computer viruses are manmade
  • 6. Viruses Examples of computer viruses are: Macro virus Boot virus Logic Bomb virus Directory virus Resident virus
  • 7. Trojan Horses A Trojan Horse program has the appearance of having a useful and desired function. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. These are often used to capture your logins and passwords Types of Malware
  • 8. • Types of Malware Example of Trojan Horse • Remote access Trojans • Backdoor Trojans (back • IRC Trojans (IRCbots) • Keylogging Trojans
  • 9. Types of Malware • Worms • A computer worm is a self-replicating computer program. • It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. • It does not need to attach itself to an existing program.
  • 10. Spyware •Spyware is a type of malware installed on computers that collects information about users without their knowledge. • The presence of spyware is typically hidden from the user and can be difficult to detect. • Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else.
  • 11. Types of Malware Zombie • Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities
  • 12. Phishing • Phishing (pronounced like the word 'fishing') is a message that tries to trick you into providing information like your social security number or bank account information or logon and password for a web site. • The message may claim that if you do not click on the link in the message and log onto a financial web site that your account will be blocked, or some other disaster
  • 14. SPAM • Spam is email that you did not request and do not want. • One person's spam is another's useful newsletter or sale ad. • Spam is a common way to spread viruses, trojans, and the like.
  • 15. SPAM
  • 16. ADWARE • Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. • Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. • Often times software and applications offer “free” versions that come bundled with adware.
  • 18. RANSOMWARE • Ransomware is a form of malware that essentially holds a computer system captive while demanding a ransom. • The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer.