This document discusses computer ethics and malware. It outlines 10 computer ethics rules including not using computers to harm others or steal. It defines malware as malicious software designed to damage systems. Several types of malware are described like viruses, ransomware, spyware and Trojan horses. Statistics on malware infection rates and top developing countries are provided. Symptoms of malware and prevention/removal methods like using anti-malware software and updating systems are outlined.
12. MALWARE
Malicious Software
A code or software that is
specifically designed to damage,
disrupt, steal, or in general, inflict
some other “bad” or illegitimate
action on data, hosts, or
networks.
13. MALWARE
Malicious Software
Malware cannot damage the
physical components of
computer systems and network
equipment, but it can damage
the data and software residing on
the equipment.
14. TYPES OF MALWARE
ADWARE
(Advertising-supported Software)
A software or program that
automatically delivers
advertisements, such as pop-up ads
on websites, and some serves as
revenue generating tool.
15. TYPES OF MALWARE
BOT or BOTNET
A software or program created to
automatically perform specific
operations. Some are created for
relatively harmless purpose, while
most are used for DoS attacks.
16. TYPES OF MALWARE
RANSOMWARE
A software or program that
essentially holds a computer
system captive, such as
restricting user access to the
computer, while demanding a
ransom.
17. TYPES OF MALWARE
ROOTKIT
A software or program designed
to remotely access or control a
computer without being detected
by users or security programs.
18. TYPES OF MALWARE
SPYWARE
A software or program that
functions by spying on user
activity without their knowledge,
such as activity monitoring,
collecting keystrokes, data
harvesting, and the like.
19. TYPES OF MALWARE
TROJAN HORSE
A software or program that
disguises itself as a normal file or
program to trick users into
copying, downloading, and
installing malware.
20. TYPES OF MALWARE
VIRUS
A software or program that is
capable of copying itself and
spreading to other computers by
attaching themselves to various
programs and executable files.
21. TYPES OF MALWARE
COMPUTER WORM
A software or program that spreads
over computer networks by
exploiting computer system
vulnerabilities, and have the ability
to self-replicate and spread
independently.
22. TYPES OF MALWARE
KEYLOGGER
A software or program that
records keystrokes to steal
information, such as a password.
23. TYPES OF MALWARE
LOGIC BOMB
A software or program that sits
dormant on a computer until it is
triggered by a specific event,
such as specific date or time.
24. TOP DEVELOPERS OF MALWARE
United States of America
China
Germany
7th to 10th Rank: Philippines
26. SYMPTOMS OF MALWARE
Increase CPU usage.
Slow computer or web browser speeds.
Problems connecting to networks.
Freezing or crashing.
Modified or deleted files.
27. SYMPTOMS OF MALWARE
Appearance of strange files, programs, or
icons.
Programs running, turning off, or
reconfiguring themselves.
Emails being sent automatically.
Strange computer behaviors.
28. PREVENTION AND REMOVAL
Install and run anti-malware and
firewall software. Choose a program
that offers tools for detecting,
quarantining, and removing multiple
types of malware. A combination of an
anti-malware software and a firewall
will ensure safety.
29. PREVENTION AND REMOVAL
Keep software and operating systems up
to date with current vulnerability patches
for bugs and security flaws that could be
exploited by attackers.
30. PREVENTION AND REMOVAL
“HIGHLY IMPORTANT”
Be vigilant when copying and
downloading files, programs,
attachments, and the like.