SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Types, differences & prevention
Malware, short for Malicious Software is any
software used to
 Disrupt computer operation
 Gather sensitive information
 Gain access to private computer systems
 Spyware
 Adware
 Keyboard logger
 Ransom ware
 Rogue software & scare ware
 Viruses
 Trojan horses
 Worms
A software program that monitors your
computer usage without your knowledge and
can
 Eat up system resources
 Affect performance
 Steal confidential data
 Keep track of what websites you visit
A program that delivers targeted advertising
content to users often by gathering information
from a user’s computer about what the user
does online and which websites are visited.
Adware can
 Change your homepage
 Flood your screen with multiple pop-up ads
 Install tool bars in your browser
 Read cookies installed on your computer
 A program that keeps track of every
keystroke that you type at your computer.
 Can gain access to your passwords, account
numbers, credit card numbers and other
personal data.
Applications that use unethical marketing
practices to trick users into paying for and
downloading worthless or malicious software
pretending as computer security software.
 They display a bogus message announcing
that your computer has been infected with
spyware
 Message is formatted to display as if it was
coming from your own security software
A form of malware in which user’s files are
encrypted or the system is disabled if the
ransom is not paid.
“Ransom” consists of
 Sending a premium SMS text message
 A wired transfer
 Online payment voucher services
 The digital currency ‘bitcoin’
Ransomware can:
 Encrypt text files, Word documents, PDF’s,
JPG picture files
 Display false notices in the name of law
enforcement agencies that your system had
been used in illegal activities
 Imitate Windows product activation notices
 Could be an empty threat
 Is a malware program that installs without
user’s consent
 Is attached to an executable file
 Replicates by inserting copies of itself into
other programs, data files etc.
A virus can
 Steal hard disk space or CPU time
 Access private information
 Corrupt data
 A non-self-replicating type of malware
 Looks legitimate (in the form of a music/
movie/game file)
 Act as a backdoor, contacting a controller
which can have unauthorized access to the
affected computer
 Standalone malware computer program
 Does not need to attach itself to an existing
program
 Replicates itself to spread to other computers
over a network
 Using genuine operating system and keeping
it up to date
 Regularly update everything installed on your
computer
 Use a good anti-virus and anti-spyware
software
 Use a built-in or third party firewall
 Uninstall toolbars, plug-ins and other
software that you don’t use
 Don’t open email attachments or downloaded
files without verifying their source
 Be wary of clicking links in emails and while
browsing
 Be alert to fake virus warnings, often within
web browser windows, that encourage you to
download, install or purchase unfamiliar
software
 Heed warnings from web browsers, search
engines and security products
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Computer Security
Computer SecurityComputer Security
Computer Security
 
Ppt123
Ppt123Ppt123
Ppt123
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
spyware
spywarespyware
spyware
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Spyware
SpywareSpyware
Spyware
 
Ch 3 computer malware ppt
Ch 3 computer malware pptCh 3 computer malware ppt
Ch 3 computer malware ppt
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Firewall
FirewallFirewall
Firewall
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
 
Malware
MalwareMalware
Malware
 
Spyware
SpywareSpyware
Spyware
 
IT viruses
 IT viruses IT viruses
IT viruses
 

Andere mochten auch

Internet of things
Internet of thingsInternet of things
Internet of thingsRahul Sharma
 
Solfã¶rmã¶rkelse gotd
Solfã¶rmã¶rkelse gotdSolfã¶rmã¶rkelse gotd
Solfã¶rmã¶rkelse gotdkarinmurberg
 
Skuggpinne i tiden
Skuggpinne i tidenSkuggpinne i tiden
Skuggpinne i tidenkarinmurberg
 
Fã¤rgglad byggsten lego - utan bilder
Fã¤rgglad byggsten   lego - utan bilderFã¤rgglad byggsten   lego - utan bilder
Fã¤rgglad byggsten lego - utan bilderkarinmurberg
 
Retno dwi ganda
Retno dwi gandaRetno dwi ganda
Retno dwi gandaRetnoaja
 
Connecting Youth for Change (CYC)
Connecting Youth for Change (CYC)Connecting Youth for Change (CYC)
Connecting Youth for Change (CYC)Masrur Rahman
 
Cristmas carts alejandro
Cristmas carts alejandroCristmas carts alejandro
Cristmas carts alejandroAlejandr003
 
mazlee_mamat Resume 14082015
mazlee_mamat Resume 14082015mazlee_mamat Resume 14082015
mazlee_mamat Resume 14082015mazlee mamat
 
eng. Amr Mousa CV full
eng. Amr Mousa  CV fulleng. Amr Mousa  CV full
eng. Amr Mousa CV fullAmr Moussa
 
Les nouveaux métiers du web (Formathèque 2014)
Les nouveaux métiers du web (Formathèque 2014)Les nouveaux métiers du web (Formathèque 2014)
Les nouveaux métiers du web (Formathèque 2014)Jérôme CANNAFERINA
 
project_portfolio_20130912
project_portfolio_20130912project_portfolio_20130912
project_portfolio_20130912Joey Dobias
 

Andere mochten auch (20)

Execution plan
Execution planExecution plan
Execution plan
 
Vm i falun 2
Vm i falun 2Vm i falun 2
Vm i falun 2
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Solfã¶rmã¶rkelse gotd
Solfã¶rmã¶rkelse gotdSolfã¶rmã¶rkelse gotd
Solfã¶rmã¶rkelse gotd
 
Skuggpinne i tiden
Skuggpinne i tidenSkuggpinne i tiden
Skuggpinne i tiden
 
Fã¤rgglad byggsten lego - utan bilder
Fã¤rgglad byggsten   lego - utan bilderFã¤rgglad byggsten   lego - utan bilder
Fã¤rgglad byggsten lego - utan bilder
 
Rocka sockorna
Rocka sockornaRocka sockorna
Rocka sockorna
 
Retno dwi ganda
Retno dwi gandaRetno dwi ganda
Retno dwi ganda
 
Loren
LorenLoren
Loren
 
Academic records
Academic recordsAcademic records
Academic records
 
Minecraft
MinecraftMinecraft
Minecraft
 
Connecting Youth for Change (CYC)
Connecting Youth for Change (CYC)Connecting Youth for Change (CYC)
Connecting Youth for Change (CYC)
 
Cristmas carts alejandro
Cristmas carts alejandroCristmas carts alejandro
Cristmas carts alejandro
 
Majblomman gotd5
Majblomman gotd5Majblomman gotd5
Majblomman gotd5
 
mazlee_mamat Resume 14082015
mazlee_mamat Resume 14082015mazlee_mamat Resume 14082015
mazlee_mamat Resume 14082015
 
eng. Amr Mousa CV full
eng. Amr Mousa  CV fulleng. Amr Mousa  CV full
eng. Amr Mousa CV full
 
ReSuMe-IGMM5
ReSuMe-IGMM5ReSuMe-IGMM5
ReSuMe-IGMM5
 
Les nouveaux métiers du web (Formathèque 2014)
Les nouveaux métiers du web (Formathèque 2014)Les nouveaux métiers du web (Formathèque 2014)
Les nouveaux métiers du web (Formathèque 2014)
 
Hetvägg
HetväggHetvägg
Hetvägg
 
project_portfolio_20130912
project_portfolio_20130912project_portfolio_20130912
project_portfolio_20130912
 

Ähnlich wie Malware used in cybercrime

How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayKevin Lim
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptxAkshayIngole17
 
Internet security
Internet securityInternet security
Internet securityat1211
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Showzed_o07
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virusShashankRoy11
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 

Ähnlich wie Malware used in cybercrime (20)

How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Computer security
Computer securityComputer security
Computer security
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
Internet security
Internet securityInternet security
Internet security
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 

Kürzlich hochgeladen

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 

Kürzlich hochgeladen (20)

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

Malware used in cybercrime

  • 1. Types, differences & prevention
  • 2. Malware, short for Malicious Software is any software used to  Disrupt computer operation  Gather sensitive information  Gain access to private computer systems
  • 3.  Spyware  Adware  Keyboard logger  Ransom ware  Rogue software & scare ware  Viruses  Trojan horses  Worms
  • 4. A software program that monitors your computer usage without your knowledge and can  Eat up system resources  Affect performance  Steal confidential data  Keep track of what websites you visit
  • 5. A program that delivers targeted advertising content to users often by gathering information from a user’s computer about what the user does online and which websites are visited.
  • 6. Adware can  Change your homepage  Flood your screen with multiple pop-up ads  Install tool bars in your browser  Read cookies installed on your computer
  • 7.  A program that keeps track of every keystroke that you type at your computer.  Can gain access to your passwords, account numbers, credit card numbers and other personal data.
  • 8. Applications that use unethical marketing practices to trick users into paying for and downloading worthless or malicious software pretending as computer security software.  They display a bogus message announcing that your computer has been infected with spyware  Message is formatted to display as if it was coming from your own security software
  • 9.
  • 10. A form of malware in which user’s files are encrypted or the system is disabled if the ransom is not paid. “Ransom” consists of  Sending a premium SMS text message  A wired transfer  Online payment voucher services  The digital currency ‘bitcoin’
  • 11. Ransomware can:  Encrypt text files, Word documents, PDF’s, JPG picture files  Display false notices in the name of law enforcement agencies that your system had been used in illegal activities  Imitate Windows product activation notices  Could be an empty threat
  • 12.
  • 13.  Is a malware program that installs without user’s consent  Is attached to an executable file  Replicates by inserting copies of itself into other programs, data files etc. A virus can  Steal hard disk space or CPU time  Access private information  Corrupt data
  • 14.  A non-self-replicating type of malware  Looks legitimate (in the form of a music/ movie/game file)  Act as a backdoor, contacting a controller which can have unauthorized access to the affected computer
  • 15.  Standalone malware computer program  Does not need to attach itself to an existing program  Replicates itself to spread to other computers over a network
  • 16.  Using genuine operating system and keeping it up to date  Regularly update everything installed on your computer  Use a good anti-virus and anti-spyware software  Use a built-in or third party firewall  Uninstall toolbars, plug-ins and other software that you don’t use
  • 17.  Don’t open email attachments or downloaded files without verifying their source  Be wary of clicking links in emails and while browsing  Be alert to fake virus warnings, often within web browser windows, that encourage you to download, install or purchase unfamiliar software  Heed warnings from web browsers, search engines and security products