0% found this document useful (0 votes)
27 views33 pages

Week 8 - PPT (2007)

Malicious software (malware) can harm devices by slowing them down, causing data loss, gaining unauthorized access to sensitive information, or completely failing systems. Protective measures like antivirus software, firewalls, regular updates, and safe browsing habits are essential to mitigate malware risks. Common types of malware include viruses, Trojans, worms, adware, spyware, ransomware, botnets, keyloggers, and those spread through drive-by attacks. Users should take precautions like installing antivirus software, updating regularly, using strong unique passwords, enabling firewalls and two-factor authentication, avoiding public Wi-Fi for sensitive activities, limiting administrative privileges, and backing up data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPS, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views33 pages

Week 8 - PPT (2007)

Malicious software (malware) can harm devices by slowing them down, causing data loss, gaining unauthorized access to sensitive information, or completely failing systems. Protective measures like antivirus software, firewalls, regular updates, and safe browsing habits are essential to mitigate malware risks. Common types of malware include viruses, Trojans, worms, adware, spyware, ransomware, botnets, keyloggers, and those spread through drive-by attacks. Users should take precautions like installing antivirus software, updating regularly, using strong unique passwords, enabling firewalls and two-factor authentication, avoiding public Wi-Fi for sensitive activities, limiting administrative privileges, and backing up data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPS, PDF, TXT or read online on Scribd
You are on page 1/ 33

Cyber Hygiene

By L. John
What is Malicious Software
Malicious Software

• Malicious software, often referred to as


malware, encompasses a wide range of
software designed to harm, disrupt, or gain
unauthorized access to computers,
networks, or devices.
Malware can cause

• System slowdowns

• data loss
Malware can cause

• unauthorized access to sensitive information

• financial harm
Malware can cause

• or even complete system failure


Protective measures

• Protection measures like antivirus


software, firewalls, regular updates,
and cautious browsing habits are
essential to mitigate the risks
associated with malicious software.
Anti-Virus software
• What is anti virus?

Prevent
Scan

Detect
Delete
Anti-Virus software

• Once installed, most antivirus software runs


automatically in the background to provide real-time
protection against virus attacks.
What is a virus

• It is a file or code, typically


delivered over a network, that
infects, explores, steals or
conducts virtually any behavior
an attacker wants.
What is a Trojan

• In computing, a Trojan horse is


any malware that misleads users
of its true intent by disguising
itself as a standard program.
What is Worm
• The worm can both run and
spread itself to other computers.
Because a worm has the ability
to automatically propagate
itself, you can get a worm in
your computer just because it is
on the same network as another
infected device.
What is Adware
• It a type of malware that displays
unwanted advertisements on
your computer or device.
• Adware is commonly activated
unknowingly when users are
trying to install legitimate
applications that adware is
bundled with.
What is Spyware

• Spyware is software with


malicious behavior that aims to
gather information about a
person or organization and send
it to another entity in a way that
harms the user by violating their
privacy
What is Ransomware

• Ransomware is a type of
cryptovirological malware
that permanently block
access to the victim's
personal data unless a
ransom is paid.
What is a botnet

• Botnets can be used to perform


Distributed Denial-of-Service
attacks, steal data, send spam,
and allow the attacker to access
the device and its connection.
What are Keyloogers

• A keylogger or keystroke
logger/keyboard capturing is a
form of malware or hardware that
keeps track of and records your
keystrokes as you type. It takes
the information and sends it to a
hacker using a command-and-
control server.
What are drive-by attacks

• Simply visiting an infected website may be sufficient for the


malware to be downloaded and run on a computer.
Precautions to take
Install Antivirus Software

• Use a reputable antivirus


software and keep it updated
regularly to detect and
remove malware
Update Software Regularly

• Keep your operating system,


applications and security software
updated to patch any
vulnerabilities that hackers could
exploit.
Exercise Caution Online

• Be wary of clicking on
suspicious links,
downloading attachments
from unknown sources, or
visiting untrustworthy
websites
Use strong Passwords

• Create complex and


unique passwords for
your accounts and
consider using a
password manager for
added security
Enable Firewall Protection

• Activate your
device’s firewall
to block
unauthorized
access to your
network
Backup data

• Regularly
Backup your
important data
to an external
Drive or a
secure cloud
storage service
Avoid Public Wi-Fi for Sensitive Activities

• Refrain from accessing


sensitive information
when using public Wi-
Fi networks as they
can be vulnerable to
attacks
Enable Two factor Authentication

• Add an extra
layer of
Security to
your accounts
by using 2FA
Wherever
Possible
Educate yourself

• Stay informed
about common
phishing tactics
and malware
scams to recognize
and avoid potential
threats.
Limit Administrative Priviledges

• Restrict administrative
privileges on your
devices to prevent
malware from making
significant system
changes

You might also like