SlideShare a Scribd company logo
1 of 11
Presented by
Velappasami. N. SU.
Sec-`k`
Information Technology
National Engineering College kovilpatti .
What is Ransomware ?
• 'Ransomware' is a type of malware that attempts to
extort money from a computer user by taking
control of data stored on it.
• Hackers use this technique to lock you out of your
devices and demand a ransom in return for access.
Where ransomware comes from ?
 It can enter your PC through an email
attachment
Through your browser if you happen
to visit a website that is infected with
this type of malware.
It can also access your PC via your
network.
How Ransomware Works
How to prevent ransomware ?
 Keep all of the software on your computer up to date.
 Keep your firewall turned on.
 Don't open spam email messages or click links on suspicious
websites.
 Keep your browser clean.
 Delete all files and folders under your TEMP folders
 Good data backups
How to remove ransomware ?
Antivirus software's, which should scan and remove any ransomware attempts found
on your computer. eg: Bitdefender, Avast, AVG, Avira, Kaspersky, Norton.etc
USE SYSTEM RESTORE
Windows 7
1. Shut down and locate the F8
key .
2. Turn the PC on, press the F8
key repeatedly.
3. The Advanced Boot Options will
open.
4. Select Repair Your Computer .
5. Select your Windows account
name and enter your
password.
6. Once logged on,
click System Restore.
USE SYSTEM RESTORE
Windows 8, 8.1, or 10
1. If your PC boots to the
Windows login screen,
hold the Shift key, click the
power icon, and
select Restart.
2. It should reboot to the
recovery screens.
3. Select Troubleshoot > Adva
nced Options > System
Restore.
Conclusion
 Keeping all the software updated and getting latest
security updates might help to prevent the attacks.
 Use of antivirus and original software is highly
recommended.
 Data Backup.
“Knowledge is the best possible weapon to prevent them.”
Be careful what you click!!
RANSOMWARE

More Related Content

What's hot

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra22
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
Angel Sophie
 

What's hot (18)

Some basics of computer security
Some basics of computer securitySome basics of computer security
Some basics of computer security
 
Best Virus Removal Process and Recover your data
Best Virus Removal Process and Recover your dataBest Virus Removal Process and Recover your data
Best Virus Removal Process and Recover your data
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on Mac
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
 
While playing game getting explorer stop working
While playing game getting explorer stop workingWhile playing game getting explorer stop working
While playing game getting explorer stop working
 
Petya ransomware cyber security awareness
Petya ransomware  cyber security awarenessPetya ransomware  cyber security awareness
Petya ransomware cyber security awareness
 
Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?
 
Delete How tosimplified toolbar
Delete How tosimplified toolbarDelete How tosimplified toolbar
Delete How tosimplified toolbar
 
Ch 3 computer malware ppt
Ch 3 computer malware pptCh 3 computer malware ppt
Ch 3 computer malware ppt
 
How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?
 

Similar to RANSOMWARE

so big 22
so big 22so big 22
so big 22
cainem
 
so big ppt
so big pptso big ppt
so big ppt
cainem
 
so big
so bigso big
so big
cainem
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 

Similar to RANSOMWARE (20)

Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
How to-remove- virus
How to-remove- virusHow to-remove- virus
How to-remove- virus
 
ransomware presentation in detail explaination
ransomware presentation in detail explainationransomware presentation in detail explaination
ransomware presentation in detail explaination
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
so big 22
so big 22so big 22
so big 22
 
Remove Coup alert
 Remove Coup alert Remove Coup alert
Remove Coup alert
 
so big ppt
so big pptso big ppt
so big ppt
 
so big
so bigso big
so big
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus project
Virus projectVirus project
Virus project
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

RANSOMWARE

  • 1. Presented by Velappasami. N. SU. Sec-`k` Information Technology National Engineering College kovilpatti .
  • 2. What is Ransomware ? • 'Ransomware' is a type of malware that attempts to extort money from a computer user by taking control of data stored on it. • Hackers use this technique to lock you out of your devices and demand a ransom in return for access.
  • 3. Where ransomware comes from ?  It can enter your PC through an email attachment Through your browser if you happen to visit a website that is infected with this type of malware. It can also access your PC via your network.
  • 5.
  • 6. How to prevent ransomware ?  Keep all of the software on your computer up to date.  Keep your firewall turned on.  Don't open spam email messages or click links on suspicious websites.  Keep your browser clean.  Delete all files and folders under your TEMP folders  Good data backups
  • 7. How to remove ransomware ? Antivirus software's, which should scan and remove any ransomware attempts found on your computer. eg: Bitdefender, Avast, AVG, Avira, Kaspersky, Norton.etc
  • 8. USE SYSTEM RESTORE Windows 7 1. Shut down and locate the F8 key . 2. Turn the PC on, press the F8 key repeatedly. 3. The Advanced Boot Options will open. 4. Select Repair Your Computer . 5. Select your Windows account name and enter your password. 6. Once logged on, click System Restore.
  • 9. USE SYSTEM RESTORE Windows 8, 8.1, or 10 1. If your PC boots to the Windows login screen, hold the Shift key, click the power icon, and select Restart. 2. It should reboot to the recovery screens. 3. Select Troubleshoot > Adva nced Options > System Restore.
  • 10. Conclusion  Keeping all the software updated and getting latest security updates might help to prevent the attacks.  Use of antivirus and original software is highly recommended.  Data Backup. “Knowledge is the best possible weapon to prevent them.” Be careful what you click!!