SlideShare ist ein Scribd-Unternehmen logo
1 von 13
!កលវិទ'ល័យ *ប,ល-.យ 
Build Bright University 
Information Security And Legal Framework 
Group 8 
• !"ធនបទ: Malware 
• ស("្ចរ",-."ះ អ៊ូ 2ន់5រិទ7 
• ប0"ៀ2ននូវ5្" 7"ហស":ត្ិ (5:15 ល>"ច -8:20 យប់) 
• សមជិកF"ុម: 
-ណJប K"ងហុង2 2 -សំង សុធN 
-គង ់ឫទី្2 2 -សុខ22 ចិTN"U 
2-ហក់ សុខX"ង -មុំ វណ្ៈ
មតិករN 
N 
Ι.K"ចក្ី្ើមN 
ΙΙ. ^ើអ្ីaជ 22 Μαλωαρε?N 
ΙΙΙ. បcd"e"លបណh"លមកពី ΜαλωαρεN 
Ις. ដំkះ("យl" ΜαλωαρεN 
ς. ករសរុបK"ចក្ីl" ΜαλωαρεN 
ςΙ. ឯកសរnងN
Ι.K"ចក្ី្ើមN 
2 នយp"លបច្rប":ន្ tើងសu្"តwើញថ!"ព័ន្ 㻵㼚㼠㼑㼞㼚㼑㼠 
មនកររ{កចំ|{នគួរឲ",កត់សម"ល់ e"លវអចជួយស‚"ƒលករងរ 
ជ…"ើន ដល់មនុស"†ទូទំងពិភព‰កទំងមូលŠ"ម្ង។ ទន្ឹមនិង 
មនកររ{កចំŽ"ះ វក៏មនផលវ‘បកមួយចំនួនផងe"រ e"លផលវ‘បក 
ទំង“ះ ”ើត•ើង–យសរ ពួកសង្2 មងងឹត ពួកគត់បនយក 
!"ព័ន្ 㻵㼚㼠㼑㼞㼚㼑㼠 ™"ើš"ស់ខុសទំនង (ខុសច"›ប់) e"លបង្បcd" ដល់ 
អ្ក™"ើš"ស់!"ព័ន្ 㻵㼚㼠㼑㼞㼚㼑㼠 ទំងមូល ដូចœ្"ះពួកtើងទំងអស់គ" 
žពួកគត់ថ ពួក 㻴㼍㼏㼗㼑㼞 ។ –យសរមនបcd"ជ…"ើនŸ ើ 
㻵㼚㼠㼑㼞㼚㼑㼠 22ខ្rំបទសូម ើកយក 㻹㼍㼘㼣㼍㼞㼑 មក¢្ើករបកស្យ។ ក្rងករ 
បកស្យŽ"ះខ្rំ ើកយកចំនុច៣សំខន់ៗ មកនិយយ ដូចជ អ្ីa 
ជ 22 㻹㼍㼘㼣㼍㼞㼑?បcd"e"លបណh"លមកពី 㻹㼍㼘㼣㼍㼞㼑 និង ដំkះ("យ 
របស់វ។N
ΙΙ. ^ើអ្ីaជ 22 Μαλωαρε?N 
2㻹㼍㼘㼣㼍㼞㼑 គឺជ!"¨"ទl" 㻿㼛㼒㼠 㻯㼛㼐㼑 មួយ!"¨"ទe"ល¢្ើឲ",ប៉ះពល់ 
ដល់ 㻯㼛㼙㼜㼡㼠㼑㼞 របស់tើងតមធតុនីមួយៗ របស់ 㻹㼍㼘㼣㼍㼞㼑 e"លធតុ 
ទំង“ះរួមប¬្­លទំង 㼂㼕㼞㼡㼟㼑㼟, 㼃㼛㼞㼙㼟, 㼀㼞㼛㼖㼍㼚 , 㻾㼛㼛㼠㼗㼕㼠㼟 និង2 㻭㼐㼣㼍㼞㼑 
ជ®ើម។N
㻼㼍㼚㼐㼍-㻹㼍㼘㼣㼍㼞㼑N
ΙΙΙ. បcd"e"លបណh"លមកពី ΜαλωαρεN 
Μαλωαρε គឺវមនករប៉ះពល់ដល់ Χομπυτερ ជ…"ើនដូចជ៖N 
ü ςιρυσ គឺវ¢្ើករ αχχεσσ Ÿក្rង Χομπυτερ របស់tើង –យគ."ន 
ករអនុc°"ត ពី Υσερ Xើយវបណh"លឲ",មនករបត់បង់ Δατα 
Ÿក្rង Χομπυτερ tើង។N 
ü Ωορμ គឺវបu្ើតគ"របស់វ ក្rង Χομπυτερ របស់tើង–យគ."ន 
ករអនុc°"ត ពី Υσερ ±" Xើយវមិនបន¢្ើឲ",មនករបត់បង់ 
Δατα2 របស់tើង±"2 ប៉ុ²្"វ¢្ើឲ", Χομπυτερ របស់tើងដំ³ើរករ 
(Προχεσσ) យឺត។N 
ü Τροϕανσ គឺ™"ៀបបនដូចជ Γαμε មួយ!"¨"ទអ¬្ឹង វដំ³ើរករ 
–ខ្µនឯងŸp"លtើង¶ើក Χομπυτερ របស់tើង™"ើš"ស់ 
Xើយវអច¢្ើឲ", មនករបត់បង់Δατα, ប៉ះពល់ដល់ Ιντερνετ 
Χοννεχτιον, បំផ¸"ញ Πασσωορδ ក្rង Χομπυτερ22 របស់tើងជ®ើម។
䈄 㻹㼍㼘㼣㼍㼞㼑 㼀㼍㼞㼓㼑㼠N
Ις. ដំkះ("យl" ΜαλωαρεN 
១.22 2¢្ើករ Υπδατε Μσ ΩινδοωσN 
២. ដំ•ើង និង Υπδατε កម្វ‘ធី កម½"ត់¾"¿គ (Αντιϖιρυσ)N 
៣.2 !"ុង!"យ័ត្ក្rងករ Δοωνλοαδ φιλεσ "†"ងៗœ"ញពី ΙντερνετN 
៤.2 Áៀសវងករបងd"ញពត៏មន2ផÂ"ល់ខ្µន ើ Ωεβ σιτε.N 
5. ™"ើš"ស់ Βροωσερ ϖερσιον ខ្ស់ ដូចជ ៖2 Φιρεφοξ..N 
6. ™"ើš"ស់ Στρονγ Πασσωορδ N
㼀㻹㻳-㻹㼍㼘㼣㼍㼞㼑N
ς. ករសរុបK"ចក្ីl" Μαλωαρε N 
2Μαλωαρε ជ Σοφτωαρε Προγραμ e"លអច¢្ើឲ",មនករប៉ះពល់ 
ដល់ Χομπυτερ របស់tើង ។ Μαλωαρε មនករចូលរួមផ"†ំl" ςιρυσ, 
Ωορμ, Τροϕαν,….ជ®ើម ។ វអច¢្ើឲ",មនករប៉ះពល់ដល់ 
Χομπυτερ យÄ"ងធ្ន់ធ្រ។ ដូចŽ"ះ tើងក៏មនវ‘ធនករក្rងករ 
–ះ("យ ើបcd"ទំងŽ"ះដូចខង ើផងe"រ ។N
2 ςΙ. ឯកសរnង 
ü ηττπ://υσ.νορτον.χομ/σεχυριτψ!ρεσπονσε/μαλωαρε.ϕσπN 
ü ηττπ://ωωω.ηεαϖεντοολσ.χομ/σολυτιονσ-φορ-σεχυριτψ.ητμN 
ü ηττπ://χτ.γοϖ/δχπ/χωπ/ϖιεω.ασπ?α=1629&θ=498608N 
ü ηττπ://γυιδεσ.ωικινυτ.χομ/Εφφεχτσ-οφ-Μαλωαρε-Ινφεχτιονσ%3Α-Αϖοιδ- 
τηε-Δανγερσ-οφ-Μαλωαρε-Προγραμσ/27γφ7βυω/N 
N
Understanding Malware by BBU Student

Weitere ähnliche Inhalte

Mehr von Phannarith Ou, G-CISO

Mehr von Phannarith Ou, G-CISO (20)

Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your information
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
 
Internet Security Policy - Khmer
Internet Security Policy - Khmer Internet Security Policy - Khmer
Internet Security Policy - Khmer
 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From Virus
 
How to Secure Your WiFi
How to Secure Your WiFiHow to Secure Your WiFi
How to Secure Your WiFi
 
Facebook Security in 3 Ways
Facebook Security in 3 Ways Facebook Security in 3 Ways
Facebook Security in 3 Ways
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Exchange Server 2003
Exchange Server 2003Exchange Server 2003
Exchange Server 2003
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development Proposal
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
ូUnderstanding DNS Spoofing
ូUnderstanding DNS SpoofingូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
 
Heartbleed vulnerability
Heartbleed vulnerabilityHeartbleed vulnerability
Heartbleed vulnerability
 
P12 r202t8 05-spam
P12 r202t8 05-spamP12 r202t8 05-spam
P12 r202t8 05-spam
 
P12 r202t8 04-d-dos
P12 r202t8 04-d-dosP12 r202t8 04-d-dos
P12 r202t8 04-d-dos
 
Understanding Phishing
Understanding Phishing Understanding Phishing
Understanding Phishing
 
Understanding Virus
Understanding VirusUnderstanding Virus
Understanding Virus
 
Paliment memberlist full-2013-new
Paliment memberlist full-2013-newPaliment memberlist full-2013-new
Paliment memberlist full-2013-new
 

Understanding Malware by BBU Student

  • 1. !កលវិទ'ល័យ *ប,ល-.យ Build Bright University Information Security And Legal Framework Group 8 • !"ធនបទ: Malware • ស("្ចរ",-."ះ អ៊ូ 2ន់5រិទ7 • ប0"ៀ2ននូវ5្" 7"ហស":ត្ិ (5:15 ល>"ច -8:20 យប់) • សមជិកF"ុម: -ណJប K"ងហុង2 2 -សំង សុធN -គង ់ឫទី្2 2 -សុខ22 ចិTN"U 2-ហក់ សុខX"ង -មុំ វណ្ៈ
  • 2. មតិករN N Ι.K"ចក្ី្ើមN ΙΙ. ^ើអ្ីaជ 22 Μαλωαρε?N ΙΙΙ. បcd"e"លបណh"លមកពី ΜαλωαρεN Ις. ដំkះ("យl" ΜαλωαρεN ς. ករសរុបK"ចក្ីl" ΜαλωαρεN ςΙ. ឯកសរnងN
  • 3. Ι.K"ចក្ី្ើមN 2 នយp"លបច្rប":ន្ tើងសu្"តwើញថ!"ព័ន្ 㻵㼚㼠㼑㼞㼚㼑㼠 មនកររ{កចំ|{នគួរឲ",កត់សម"ល់ e"លវអចជួយស‚"ƒលករងរ ជ…"ើន ដល់មនុស"†ទូទំងពិភព‰កទំងមូលŠ"ម្ង។ ទន្ឹមនិង មនកររ{កចំŽ"ះ វក៏មនផលវ‘បកមួយចំនួនផងe"រ e"លផលវ‘បក ទំង“ះ ”ើត•ើង–យសរ ពួកសង្2 មងងឹត ពួកគត់បនយក !"ព័ន្ 㻵㼚㼠㼑㼞㼚㼑㼠 ™"ើš"ស់ខុសទំនង (ខុសច"›ប់) e"លបង្បcd" ដល់ អ្ក™"ើš"ស់!"ព័ន្ 㻵㼚㼠㼑㼞㼚㼑㼠 ទំងមូល ដូចœ្"ះពួកtើងទំងអស់គ" žពួកគត់ថ ពួក 㻴㼍㼏㼗㼑㼞 ។ –យសរមនបcd"ជ…"ើនŸ ើ 㻵㼚㼠㼑㼞㼚㼑㼠 22ខ្rំបទសូម ើកយក 㻹㼍㼘㼣㼍㼞㼑 មក¢្ើករបកស្យ។ ក្rងករ បកស្យŽ"ះខ្rំ ើកយកចំនុច៣សំខន់ៗ មកនិយយ ដូចជ អ្ីa ជ 22 㻹㼍㼘㼣㼍㼞㼑?បcd"e"លបណh"លមកពី 㻹㼍㼘㼣㼍㼞㼑 និង ដំkះ("យ របស់វ។N
  • 4. ΙΙ. ^ើអ្ីaជ 22 Μαλωαρε?N 2㻹㼍㼘㼣㼍㼞㼑 គឺជ!"¨"ទl" 㻿㼛㼒㼠 㻯㼛㼐㼑 មួយ!"¨"ទe"ល¢្ើឲ",ប៉ះពល់ ដល់ 㻯㼛㼙㼜㼡㼠㼑㼞 របស់tើងតមធតុនីមួយៗ របស់ 㻹㼍㼘㼣㼍㼞㼑 e"លធតុ ទំង“ះរួមប¬្­លទំង 㼂㼕㼞㼡㼟㼑㼟, 㼃㼛㼞㼙㼟, 㼀㼞㼛㼖㼍㼚 , 㻾㼛㼛㼠㼗㼕㼠㼟 និង2 㻭㼐㼣㼍㼞㼑 ជ®ើម។N
  • 6. ΙΙΙ. បcd"e"លបណh"លមកពី ΜαλωαρεN Μαλωαρε គឺវមនករប៉ះពល់ដល់ Χομπυτερ ជ…"ើនដូចជ៖N ü ςιρυσ គឺវ¢្ើករ αχχεσσ Ÿក្rង Χομπυτερ របស់tើង –យគ."ន ករអនុc°"ត ពី Υσερ Xើយវបណh"លឲ",មនករបត់បង់ Δατα Ÿក្rង Χομπυτερ tើង។N ü Ωορμ គឺវបu្ើតគ"របស់វ ក្rង Χομπυτερ របស់tើង–យគ."ន ករអនុc°"ត ពី Υσερ ±" Xើយវមិនបន¢្ើឲ",មនករបត់បង់ Δατα2 របស់tើង±"2 ប៉ុ²្"វ¢្ើឲ", Χομπυτερ របស់tើងដំ³ើរករ (Προχεσσ) យឺត។N ü Τροϕανσ គឺ™"ៀបបនដូចជ Γαμε មួយ!"¨"ទអ¬្ឹង វដំ³ើរករ –ខ្µនឯងŸp"លtើង¶ើក Χομπυτερ របស់tើង™"ើš"ស់ Xើយវអច¢្ើឲ", មនករបត់បង់Δατα, ប៉ះពល់ដល់ Ιντερνετ Χοννεχτιον, បំផ¸"ញ Πασσωορδ ក្rង Χομπυτερ22 របស់tើងជ®ើម។
  • 8. Ις. ដំkះ("យl" ΜαλωαρεN ១.22 2¢្ើករ Υπδατε Μσ ΩινδοωσN ២. ដំ•ើង និង Υπδατε កម្វ‘ធី កម½"ត់¾"¿គ (Αντιϖιρυσ)N ៣.2 !"ុង!"យ័ត្ក្rងករ Δοωνλοαδ φιλεσ "†"ងៗœ"ញពី ΙντερνετN ៤.2 Áៀសវងករបងd"ញពត៏មន2ផÂ"ល់ខ្µន ើ Ωεβ σιτε.N 5. ™"ើš"ស់ Βροωσερ ϖερσιον ខ្ស់ ដូចជ ៖2 Φιρεφοξ..N 6. ™"ើš"ស់ Στρονγ Πασσωορδ N
  • 9.
  • 11. ς. ករសរុបK"ចក្ីl" Μαλωαρε N 2Μαλωαρε ជ Σοφτωαρε Προγραμ e"លអច¢្ើឲ",មនករប៉ះពល់ ដល់ Χομπυτερ របស់tើង ។ Μαλωαρε មនករចូលរួមផ"†ំl" ςιρυσ, Ωορμ, Τροϕαν,….ជ®ើម ។ វអច¢្ើឲ",មនករប៉ះពល់ដល់ Χομπυτερ យÄ"ងធ្ន់ធ្រ។ ដូចŽ"ះ tើងក៏មនវ‘ធនករក្rងករ –ះ("យ ើបcd"ទំងŽ"ះដូចខង ើផងe"រ ។N
  • 12. 2 ςΙ. ឯកសរnង ü ηττπ://υσ.νορτον.χομ/σεχυριτψ!ρεσπονσε/μαλωαρε.ϕσπN ü ηττπ://ωωω.ηεαϖεντοολσ.χομ/σολυτιονσ-φορ-σεχυριτψ.ητμN ü ηττπ://χτ.γοϖ/δχπ/χωπ/ϖιεω.ασπ?α=1629&θ=498608N ü ηττπ://γυιδεσ.ωικινυτ.χομ/Εφφεχτσ-οφ-Μαλωαρε-Ινφεχτιονσ%3Α-Αϖοιδ- τηε-Δανγερσ-οφ-Μαλωαρε-Προγραμσ/27γφ7βυω/N N