SlideShare a Scribd company logo
1 of 38
WHAT IS MALWARE???
MALWARE
 The word MALWARE comes form the combination of Malicious and Software.
 In Spanish, ‘MAL’ is a prefix that means, ‘BAD’ , making the term ‘bad ware’.
 This is software that is specifically designed to gain access or damage a
computer without the knowledge of the owner.
 Mainly designed to transmit information about your web browsing
habits to the third party.
PURPOSE
 To hurt others and make money, usually by affecting important information adversely.
 Stealing, encrypting or deleting sensitive data.
 Altering or hijacking core computing functions.
 Monitoring users’ computer activity without their permission.
 To steal personal, financial, or business information from individuals &
govs.
HISTORY
 People first started writing malware in the 1970s and early 1980s. They were written as
experiments or pranks for fun.
 ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage -
but did foretell the future of malware with its quick spread through systems. ‘Reaper’ was
created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’ program.
 Term ‘malware’ coined in 1990.
 Use of malware increased in the early 2000s.
 Experts believe that 31.5% of the world's computers have some type of
malware installed today.
HOW DOES MALWARE WORK ?
Delivered physically to a system through a USB flash drives or external hard
drives.
 Drive-by-Downloads via the Internet.
 Spam E-mails and Phishing Attacks.
 Bundled with other software.
Accessing hacked or compromised webpages.
5 STAGE OF MALWARE ATTACK
ENTRY
DISTRIBUTION
EXPLOIT
INFECTION
EXECUTION
TYPES OF MALWARE
1.Viruses
2.Worms
3.Trojan Horse
4.Ransomware
5.Spyware
6.Adware
7.Scareware
8.Rootkit
VIRUSES
A computer virus is a program, script, or macro designed to cause damage, steal
personal information, modify data, send e-mail, display messages, or some combination
of these actions.
 May do nothing on your machine or destroy all your files.
 Seek to use your machine as launching point to infect other machine.
 VIRUS enters your device via attached images ,greeting ,Audio /video file etc.
VIRUS
Logic bomb virus
Time bomb virus
Boot sector virus
Macro virus
TYPES OF VIRUSES
WORMS
 Like a virus but they are self-contained programs (they don’t need a host).
 Copy themselves from machine-to-machine.
Scan for other vulnerable machines.
Can cause slowness or even block network transmissions.
They attack the weakened points in a network.
TROJAN HORSE
 In computing, a Trojan horse is a program that appears harmless, but is, in fact,
malicious. Unexpected changes to computer settings and unusual activity, even when
the computer should be idle, are strong indications that a Trojan is residing on a
computer.
WHAT IS TROJAN HORSE ??
 A Trojan horse may also be referred to as a Trojan horse virus, but that is technically incorrect.
Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without
an end user's assistance. This is why attackers must use social engineering tactics to trick the end
user into executing the Trojan. Typically, the malware programming is hidden in an innocent-
looking email attachment or free download. When the user clicks on the email attachment or
downloads the free program, the malware that is hidden inside is transferred to the user's
computing device. Once inside, the malicious code can execute whatever task the attacker
designed it to carry out.
TYPES OF TROJAN
Remote Access Trojans
TROJAN
Data Sending Trojans
FTP Trojans
Security software disabler Trojans
Denial-of-service attack (DoS) Trojans
Proxy Trojans
Destructive Trojans
RANSOMWARE
RANSOMWARE is a type of malware
which is widely classified as a Trojan.
It restricts access to or damages the
computer for the purpose of extorting
money from the victim.
 It also has the capability to encrypt a user’s files , display
different threat messages , and force the user to pay
ransom via an online payment system.
 Originated in Russia,2005-06. Crypto-ransomware in
2013.
SPYWARE
WHAT IS SPYWARE
Spyware is a program that get installed without the user’s permission.
 It’s monitors the user’s activities on the internet and transmit the
information to the third party
TYPES OF SPYWARE
SPYWARE
Tracking cookies
System monitors
Commercial Cell
Phone Spyware
keylogger
ADWARE
 Software where advertising banners are displayed while any program is running.
It automatically downloads to your device while browsing any website.
 It is used by companies for marketing purposes.
SCAREWARE
Scareware is a type of malware designed to trick victims into purchasing
and downloading useless and potentially dangerous software.
Scareware, which generates pop-ups that resemble Windows system
messages, usually purports to be antivirus or antispyware software, a firewall
application or a registry cleaner. The messages typically say that a large
number of problems -- such as infected files -- have been found on the
computer and the user is prompted to purchase software to fix the problems.
ROOTKIT
It is a computer program designed to provide continued privileged access to a
computer while actively hiding its presence.
Originally, a rootkit was a collection of tools that enabled administrator-level
access to a computer or network.
 Once a rootkit has been installed, the controller of the rootkit has the
ability to remotely execute files and change system configurations on
the host machine.
 A rootkit on an infected computer can also access log files and
spy on the legitimate computer owner’s usage.
The two most effective ways to fight against malware are: Personal vigilance and protective
tools.
Malware security protection provides that second vital layer of protection for your
computer or network.
 A robust antivirus software package is the primary component of technological
defenses that every personal and business computer system should have.
No protection is absolute. But a combination of personal awareness and
well-designed protective tools will make your computer as safe as it can be.
PROTECTION AGAINST MALWARE
THANK YOU

More Related Content

What's hot

Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 

What's hot (20)

Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Ppt123
Ppt123Ppt123
Ppt123
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Mobile security
Mobile securityMobile security
Mobile security
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar to MALWARE

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfKakai Catalan
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docxSarahReese14
 
athira m s.pptx
athira m s.pptxathira m s.pptx
athira m s.pptxATHIRAMS25
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)Paras Intotech
 

Similar to MALWARE (20)

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Information security
Information securityInformation security
Information security
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
virus
virusvirus
virus
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
athira m s.pptx
athira m s.pptxathira m s.pptx
athira m s.pptx
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

MALWARE

  • 1.
  • 2.
  • 4. MALWARE  The word MALWARE comes form the combination of Malicious and Software.  In Spanish, ‘MAL’ is a prefix that means, ‘BAD’ , making the term ‘bad ware’.  This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner.  Mainly designed to transmit information about your web browsing habits to the third party.
  • 5. PURPOSE  To hurt others and make money, usually by affecting important information adversely.  Stealing, encrypting or deleting sensitive data.  Altering or hijacking core computing functions.  Monitoring users’ computer activity without their permission.  To steal personal, financial, or business information from individuals & govs.
  • 6. HISTORY  People first started writing malware in the 1970s and early 1980s. They were written as experiments or pranks for fun.  ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage - but did foretell the future of malware with its quick spread through systems. ‘Reaper’ was created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’ program.  Term ‘malware’ coined in 1990.  Use of malware increased in the early 2000s.  Experts believe that 31.5% of the world's computers have some type of malware installed today.
  • 7. HOW DOES MALWARE WORK ? Delivered physically to a system through a USB flash drives or external hard drives.  Drive-by-Downloads via the Internet.  Spam E-mails and Phishing Attacks.  Bundled with other software. Accessing hacked or compromised webpages.
  • 8. 5 STAGE OF MALWARE ATTACK ENTRY DISTRIBUTION EXPLOIT INFECTION EXECUTION
  • 9. TYPES OF MALWARE 1.Viruses 2.Worms 3.Trojan Horse 4.Ransomware 5.Spyware 6.Adware 7.Scareware 8.Rootkit
  • 10.
  • 11. VIRUSES A computer virus is a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, or some combination of these actions.  May do nothing on your machine or destroy all your files.  Seek to use your machine as launching point to infect other machine.  VIRUS enters your device via attached images ,greeting ,Audio /video file etc.
  • 12. VIRUS Logic bomb virus Time bomb virus Boot sector virus Macro virus TYPES OF VIRUSES
  • 13.
  • 14.
  • 15. WORMS  Like a virus but they are self-contained programs (they don’t need a host).  Copy themselves from machine-to-machine. Scan for other vulnerable machines. Can cause slowness or even block network transmissions. They attack the weakened points in a network.
  • 17.  In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer. WHAT IS TROJAN HORSE ??  A Trojan horse may also be referred to as a Trojan horse virus, but that is technically incorrect. Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without an end user's assistance. This is why attackers must use social engineering tactics to trick the end user into executing the Trojan. Typically, the malware programming is hidden in an innocent- looking email attachment or free download. When the user clicks on the email attachment or downloads the free program, the malware that is hidden inside is transferred to the user's computing device. Once inside, the malicious code can execute whatever task the attacker designed it to carry out.
  • 18. TYPES OF TROJAN Remote Access Trojans TROJAN Data Sending Trojans FTP Trojans Security software disabler Trojans Denial-of-service attack (DoS) Trojans Proxy Trojans Destructive Trojans
  • 19.
  • 20. RANSOMWARE RANSOMWARE is a type of malware which is widely classified as a Trojan. It restricts access to or damages the computer for the purpose of extorting money from the victim.  It also has the capability to encrypt a user’s files , display different threat messages , and force the user to pay ransom via an online payment system.  Originated in Russia,2005-06. Crypto-ransomware in 2013.
  • 21.
  • 22.
  • 24. WHAT IS SPYWARE Spyware is a program that get installed without the user’s permission.  It’s monitors the user’s activities on the internet and transmit the information to the third party
  • 25. TYPES OF SPYWARE SPYWARE Tracking cookies System monitors Commercial Cell Phone Spyware keylogger
  • 26.
  • 27.
  • 28.
  • 29. ADWARE  Software where advertising banners are displayed while any program is running. It automatically downloads to your device while browsing any website.  It is used by companies for marketing purposes.
  • 30.
  • 31.
  • 32. SCAREWARE Scareware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software. Scareware, which generates pop-ups that resemble Windows system messages, usually purports to be antivirus or antispyware software, a firewall application or a registry cleaner. The messages typically say that a large number of problems -- such as infected files -- have been found on the computer and the user is prompted to purchase software to fix the problems.
  • 33.
  • 34.
  • 35. ROOTKIT It is a computer program designed to provide continued privileged access to a computer while actively hiding its presence. Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network.  Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine.  A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.
  • 36.
  • 37. The two most effective ways to fight against malware are: Personal vigilance and protective tools. Malware security protection provides that second vital layer of protection for your computer or network.  A robust antivirus software package is the primary component of technological defenses that every personal and business computer system should have. No protection is absolute. But a combination of personal awareness and well-designed protective tools will make your computer as safe as it can be. PROTECTION AGAINST MALWARE