Summary

This document provides an overview of malware, including different types such as viruses, worms, Trojans, spam, backdoors, rootkits, keyloggers, and spyware. It explains how malware spreads and the damages it can cause, such as data loss, account theft, botnets, and financial losses. The document also outlines common symptoms of malware infection and preventive measures, emphasizing the importance of installing protection software and practicing caution while working with unknown files.

Full Transcript

Malware What’s Ahead? Identify various malware programs and their extent of harm to the computing society Learn how these tricky programs can spread to almost any device connected to a network Malware Malware Malware is any program or file that is harmful to a computer user. Ma...

Malware What’s Ahead? Identify various malware programs and their extent of harm to the computing society Learn how these tricky programs can spread to almost any device connected to a network Malware Malware Malware is any program or file that is harmful to a computer user. Malware includes computer viruses, worms, Trojan horses, spam, backdoor, rootkit, keylogger, and spyware. Malware Usage of Malware 1) To steal information that can be readily monetized, such as login credentials, credit card, and bank account numbers; 2) Intellectual property such as computer software, financial algorithms, and trade secrets; 3) To ransom money in Bitcoin, for example, Wannacry Ransomware; 4) To spy on computer users for an extended period without their knowledge, for example, Reign Malware; 5) It may be designed to cause harm, often as sabotage, for instance, Stuxnet; and 6) Extort payment for example Cryptolocker. Malware Viruses A computer virus is a malicious piece of executable code that propagates typically by attaching itself to a host document that will generally be an executable file. The term “host” means a document or a file. Malware Worms A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. It does not need to attach itself to an existing program. Malware Trojan A Trojan horse or Trojan is a type of malware that disguises as legitimate software. Trojans are written to discover financial information, take over your computer’s system resources, and create a “denial-of-service attack” in larger systems, making a machine or network resource unavailable to those attempting to reach it. Malware Spam Spamming is a method of flooding the internet with copies of the same message. Most spams are commercial advertisements which are sent as an unwanted email to users. Spam is also known as Electronic junk emails or junk newsgroup postings. These spam emails are very annoying as it keeps coming every day and keeps your mailbox full. Malware Backdoors Backdoors are much the same as Trojans or worms, except that they open a “backdoors” on a computer, providing a network connection for hackers or other Malware to enter or for viruses or spam to be sent. A front-door, on the other hand, requires the action of a legitimate user. For example, malware that is run when a legitimate user runs an infected email attachment or runs a malicious program the user downloaded from the internet. Malware Rootkit A rootkit is compared to a burglar hiding in the attic of a house, waiting to take from you while you are not home. It is the hardest of all malware to detect and therefore to remove; many experts recommend entirely wiping your hard drive and reinstalling everything from scratch. It is designed to permit the other formation gathering malware to get the identity information from your computer without you realizing anything is going on. Malware Keylogger The keylogger records everything you type on your PC to glean your log-in names, passwords, and other sensitive information, and send it on to the source of the keylogging program. Malware Spyware Spyware is a software that spies on you, tracking your internet activities to send advertising (adware) back to your system. Malware HOW Malware Spreads? Malware is a program that must be triggered or somehow executed before it can infect your computer system and spread to others. Here are some examples of how malware is distributed: a) Social network b) Pirated software c) Removable media d) Emails e) Websites Malware Damages 1. Data Loss 2. Account Theft 3. Botnets 4. Financial Losses Malware Symptoms Increased CPU usage Slow computer or web browser speeds Problems connecting to networks Freezing or crashing Modified or deleted files Appearance of strange files, programs, or desktop icons Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs) Malware Symptoms Strange computer behavior Emails/messages being sent automatically and without the user’s knowledge (a friend receives a strange email from you that you did not send) There seems to be a lot of network activity when you are not using the network The available memory on your computer is lower than it should be Programs or files appear or disappear without your knowledge File names are changed Malware How can you protect your computer? ✓ Install protection software. ✓ Practice caution when working with files from unknown or questionable sources. ✓ Do not open e-mail if you do not recognize the sender. ✓ Download files only from reputable Internet sites. ✓ Install a firewall. ✓ Scan your hard drive for viruses monthly

Use Quizgecko on...
Browser
Browser