1 / 8

Malware

Malware. Malware : An Introduction.

kelli
Download Presentation

Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malware

  2. Malware : An Introduction Malware is an abbreviated form of ‘malicious software.’ In a layman’s terms, it refers to any software that is a threat to your computer system. Malware is a generic term for many different kinds of harmful software, such as spyware, adware, etc. which are explained later.

  3. Why do we need to protect ourselves? Everyone locks and secures their home before they leave - it’s just good sense! The house needs to be kept safe from thieves and miscreants, of whom there is no dearth today.The same goes for your computer. By leaving it unsecured, you’re inviting all sorts of trouble from people who’d love to cause damage to your system. Making sure it stays safe is as important as locking your house before leaving it.

  4. How can Malware enter your computer? One of the most common ways is, surprisingly, through software that is meant to protect your computer. These rogue security programs typically trick users into believing that they are legitimate security software which will protect their computers. Once downloaded, they can infiltrate the system like any other piece of malware.Another way for malware to enter your computer is through email attachments. People often open attachments from senders they don’t know, exposing their computers to a multitude of threats in the process. In some cases, malware that has infiltrated someone’s computer attaches itself to the user’s email program and sends infected files to the user’s contacts.Malware also spreads through P2P (Peer-to-Peer) file sharing programs.P2P clients are a great way to share files across the globe, but they’re also a great way to invite viruses and Trojans into your computer.

  5. Types of Malware - Viruses In a nutshell, viruses are pieces of software that can attach themselves to your files and replicate. Once the file is opened, the virus makes a copy of itself and starts spreading to other files and computers.The term virus is often incorrectly used to refer to all kinds of malware, including, but not limited to spyware, adware, Trojan horses and worms. The truth is, however, that a virus is a specific category of malware, separate from the ones mentioned above.In nature, a virus needs a host in order to be able to replicate. The same applies to computer viruses. They need to attach themselves to a host file in order to replicate. Depending on what the virus is intended for, it can steal, copy or erase data, among other things.

  6. Types of Malware - Trojans Rewind to the 12th century B.C., to the time of the Trojan War. The Greeks and the Trojans were fighting each other, and neither side seemed willing to surrender. The Trojans, however, thought otherwise when they saw the huge wooden horse left outside their city walls by the Greeks. Believing it to be a gift and a sign of graceful acceptance, they welcomed it into their city with joy. Little did they know that the horse contained Greek soldiers. In the dead of night, these soldiers crept out and destroyed the city of Troy.But what does this interesting yet seemingly irrelevant snippet of mythology have to do with malware?Trojans are a category of malware that get their name from the very Trojan Horse mentioned above. They are computer programs that seem to be harmless but are actually just the opposite. They appear to be benign programs but carry out unexpected and undesirable functions.Trojans, unlike viruses, do not replicate. They simply carry out their dastardly acts on their own.

  7. Types of Malware - Worms Like viruses, worms too are pieces of software that replicate and spread, but unlike viruses, they do not need a host file to attach themselves to. Their execution is completely independent. Quite a scary thought, isn’t it? The fact that a program can exploit one of the many possible vulnerabilities in your system and then proceed to carry out perhaps irreparable damage all by itself?The good news is, there are ways and means to protect your computer from ever having to face such trouble.

  8. Types of Malware – Spyware & Adware Spyware is a category of malware that is installed on a user’s computer, usually without his/her knowledge or consent. It is used to track information about the user which can then be used for many purposes. It can collect data about, say, the user’s internet activity and then send that data to a third party without the user’s knowledge.Adware is another type of malware that displays advertisements on the user’s screen in the form of pop-ups, banners, etc. while the program associated with it is running.Adware by itself may not be harmful, but in many cases it is combined with spyware so that the overall software has great potential to cause harm. In such cases, the spyware may track a user’s internet habits and use the information to display ads in the web browser.Spyware and adware, unlike viruses or worms, usually do not replicate. Once they gain access to your computer, they carry out their functions without attempting to spread to other files in your computer or other computers on the network.

More Related