malicious software
TRANSCRIPT
![Page 1: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/1.jpg)
MALWARESpreading Awareness of Harmful Software . . .
ICT – 7 Presentation
![Page 2: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/2.jpg)
WHAT IS MALWARE ?
Any harmful software
Steals information, ruins computers
Different types of malware spread differently
![Page 3: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/3.jpg)
The Types of MalwareAt a glance . . . .
![Page 4: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/4.jpg)
TYPES OF
MALWARE
Malware
Computer Viruses
Worms
Trojan Horses
Spyware
Ransomware
Adware
Rootkits
Spam
![Page 5: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/5.jpg)
Computer Viruses
Ability to replicate
Attach to programs
Can Can’t
Infect executable files Infect Hardware
Infect disks and boot
records
Infect write – protected
disks (CD – ROM)
Infect E – Mail
attachments-----
![Page 6: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/6.jpg)
Types of Computer Viruses
![Page 7: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/7.jpg)
SEND IN THE CLONER! Richard Skrenta, 1981
Grade 9 Student
Richard Skrenta
![Page 8: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/8.jpg)
Worms Consume memory and overload servers
Steal data, delete files, create botnets
Self – replicate and spread independently
![Page 9: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/9.jpg)
Trojan Horses
Useful or normal appearing programs
Offers remote access to malicious parties
Access information, steal data, modify etc…
![Page 10: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/10.jpg)
Spyware
Spies on user activity
Monitors, harvests data and keystrokes
Modifies security software and browsers
Consume memory and can slow down computers
![Page 11: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/11.jpg)
Ransomware
Restrict Computer Access
Encrypts files on hard disk or computer system
Demands ransom for access regain
![Page 12: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/12.jpg)
Ransomware
![Page 13: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/13.jpg)
Adware Displays excessive advertisements
Pop up advertisements, software advertisements
![Page 14: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/14.jpg)
Rootkits Remotely access computer systems
Control party can freely access files, configurations, software
Hard to detect, remove or prevent
![Page 15: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/15.jpg)
Spam Source for spreading malware
Unsolicited, unwanted messages
E – Mail, mobile message, blogs, internet forums
![Page 16: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/16.jpg)
Detecting, Removing and
Preventing MalwareAntivirus software and prevention methods for malware at a
glance
![Page 17: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/17.jpg)
Preventing Malware Infections
Restricting computer access
Vigilance while installing programs
Refusing malicious requests while browsing
Allowing only trustworthy users
Using trusted removable storage media
![Page 18: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/18.jpg)
Preventing Malware Infections
Keep files and programs on separate disks
Open E – Mail attachments from trusted sources
Using Antivirus Software, Anti – Spyware and free Firewall
program
![Page 19: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/19.jpg)
Symptoms of a Malware Infection
Increased CPU Usage
Slow Response and Browser Speed
Frequently Freezing, Irresponsive, Crashing
Unable to connect to networks
![Page 20: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/20.jpg)
Symptoms of a Malware Infection
Modified or deleted files
Extra, unknown, unwanted
files
Programs turning on and off,
reconfiguring themselves
![Page 21: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/21.jpg)
No Fear …. ANTIVIRUS Is Here!
Detect and remove viruses and malware
Able to scan downloaded, data and system files
Should be kept updated for efficiency
Kaspersky Antivirus
Norton AntivirusMcAfee Antivirus
![Page 22: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/22.jpg)
ANTISPYWARE
For defense against and removal of spyware
Should be kept updated
Ad Aware SE and Windows Defender
![Page 23: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/23.jpg)
Firewalls
Defends against malware over the internet
Prevents unauthorized access
Available as hardware and software
![Page 24: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/24.jpg)
STOP MALWARE!
Spreading awareness and discouraging malware development
Malware developer be given heavier punishments and fines
Development of new, advanced protection software
Encouraging the use of better protective software
![Page 25: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/25.jpg)
“Conflicker” caused a loss of up to
$9.1 billion
“Love Letter” or “ILOVEYOU”
caused a loss of over $37.1 billion
MALWARE SPREADS WORLDWIDE CAUSE HUGE
LOSSES OF MONEY
MyDoom E – Mail worm caused a loss
of upto $38.5 billion
![Page 26: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/26.jpg)
13.3 people in the U.S. become victims of
identity theft every minute
15% of spyware sends potentially confidential info inputted by users collected via keyloggers
or other devices
PEOPLE LOSE PRIVACY
![Page 27: Malicious Software](https://reader034.vdocuments.mx/reader034/viewer/2022042716/55a6c4811a28ab81428b4762/html5/thumbnails/27.jpg)
THANK YOU!
Spread The Message ...
Stop Malware!