The term malware refers to software designed to intentionally damage a computer, a server, a client or a computer network. Alternatively, a software defect happens when a faulty component leads to unintentional harm.
4. MALWARE
The word MALWARE comes form the combination of Malicious and Software.
In Spanish, ‘MAL’ is a prefix that means, ‘BAD’ , making the term ‘bad ware’.
This is software that is specifically designed to gain access or damage a
computer without the knowledge of the owner.
Mainly designed to transmit information about your web browsing
habits to the third party.
5. PURPOSE
To hurt others and make money, usually by affecting important information adversely.
Stealing, encrypting or deleting sensitive data.
Altering or hijacking core computing functions.
Monitoring users’ computer activity without their permission.
To steal personal, financial, or business information from individuals &
govs.
6. HISTORY
People first started writing malware in the 1970s and early 1980s. They were written as
experiments or pranks for fun.
‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage -
but did foretell the future of malware with its quick spread through systems. ‘Reaper’ was
created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’ program.
Term ‘malware’ coined in 1990.
Use of malware increased in the early 2000s.
Experts believe that 31.5% of the world's computers have some type of
malware installed today.
7. HOW DOES MALWARE WORK ?
Delivered physically to a system through a USB flash drives or external hard
drives.
Drive-by-Downloads via the Internet.
Spam E-mails and Phishing Attacks.
Bundled with other software.
Accessing hacked or compromised webpages.
8. 5 STAGE OF MALWARE ATTACK
ENTRY
DISTRIBUTION
EXPLOIT
INFECTION
EXECUTION
11. VIRUSES
A computer virus is a program, script, or macro designed to cause damage, steal
personal information, modify data, send e-mail, display messages, or some combination
of these actions.
May do nothing on your machine or destroy all your files.
Seek to use your machine as launching point to infect other machine.
VIRUS enters your device via attached images ,greeting ,Audio /video file etc.
15. WORMS
Like a virus but they are self-contained programs (they don’t need a host).
Copy themselves from machine-to-machine.
Scan for other vulnerable machines.
Can cause slowness or even block network transmissions.
They attack the weakened points in a network.
17. In computing, a Trojan horse is a program that appears harmless, but is, in fact,
malicious. Unexpected changes to computer settings and unusual activity, even when
the computer should be idle, are strong indications that a Trojan is residing on a
computer.
WHAT IS TROJAN HORSE ??
A Trojan horse may also be referred to as a Trojan horse virus, but that is technically incorrect.
Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without
an end user's assistance. This is why attackers must use social engineering tactics to trick the end
user into executing the Trojan. Typically, the malware programming is hidden in an innocent-
looking email attachment or free download. When the user clicks on the email attachment or
downloads the free program, the malware that is hidden inside is transferred to the user's
computing device. Once inside, the malicious code can execute whatever task the attacker
designed it to carry out.
20. RANSOMWARE
RANSOMWARE is a type of malware
which is widely classified as a Trojan.
It restricts access to or damages the
computer for the purpose of extorting
money from the victim.
It also has the capability to encrypt a user’s files , display
different threat messages , and force the user to pay
ransom via an online payment system.
Originated in Russia,2005-06. Crypto-ransomware in
2013.
24. WHAT IS SPYWARE
Spyware is a program that get installed without the user’s permission.
It’s monitors the user’s activities on the internet and transmit the
information to the third party
29. ADWARE
Software where advertising banners are displayed while any program is running.
It automatically downloads to your device while browsing any website.
It is used by companies for marketing purposes.
30.
31.
32. SCAREWARE
Scareware is a type of malware designed to trick victims into purchasing
and downloading useless and potentially dangerous software.
Scareware, which generates pop-ups that resemble Windows system
messages, usually purports to be antivirus or antispyware software, a firewall
application or a registry cleaner. The messages typically say that a large
number of problems -- such as infected files -- have been found on the
computer and the user is prompted to purchase software to fix the problems.
33.
34.
35. ROOTKIT
It is a computer program designed to provide continued privileged access to a
computer while actively hiding its presence.
Originally, a rootkit was a collection of tools that enabled administrator-level
access to a computer or network.
Once a rootkit has been installed, the controller of the rootkit has the
ability to remotely execute files and change system configurations on
the host machine.
A rootkit on an infected computer can also access log files and
spy on the legitimate computer owner’s usage.
36.
37. The two most effective ways to fight against malware are: Personal vigilance and protective
tools.
Malware security protection provides that second vital layer of protection for your
computer or network.
A robust antivirus software package is the primary component of technological
defenses that every personal and business computer system should have.
No protection is absolute. But a combination of personal awareness and
well-designed protective tools will make your computer as safe as it can be.
PROTECTION AGAINST MALWARE