0% found this document useful (0 votes)
7 views10 pages

Comprog1 - SLK Q1 4

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 10

SHS

GRADE
11

COMPUTER PROGRAMMING .NET 1


QUARTER 1- MODULE 4

PERFORM COMPUTER OPERATIONS

Name: _______________________________________________________________________

Grade Level & Section: __________________________________________________________

Subject Teacher: _______________________________________________________________


OBJECTIVES:

After this lesson, you will be able to answer the following questions:
• What is a computer malware?
• What are the different kinds of malware?
• What is an anti-virus?
• How does anti-virus work?

PRE-TEST

Direction: Multiple choices. Encircle the letter of the correct answer.


1. This kind of malware can be used for key-logging and similar activities, thereby helping
hackers gain access to personal data.
A) Adware
B) Trojan
C) Hybrid attack
D) Spyware
2. A malicious code designed to spread from host to host by itself without the user’s
knowledge to perform malicious actions.
A) Adware
B) Trojan
C) Worm
D) Spyware
3. Demands a ransom from you to get things back on track.
A) Adware
B) Ransomware
C) Worm
D) Spyware
4. It is a type of malicious code or software that looks legitimate but will harm your computer.
A) Adware
B) Trojan
C) Worm
D) Spyware
5. A program or set of programs that are designed to prevent, search for, detect, and remove
software viruses, and other malicious software.
A) Malware
B) Operating system
C) Application
D) Antivirus

1
ROUSING ACTIVITY

INQUIRY QUESTIONS:
Directions: Read the given questions below and answer each item by expressing your own
ideas in 2 – 3 sentences per item.

1. How would you describe a computer malware in your own words?


2. How can you defend your devices from malwares?

1. _________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

_______________________________________________________________________________.

2. _________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

_______________________________________________________________________________.

2
LESSON PROPER

What is a Computer Malware?


A computer virus is a malicious code designed to spread from host to host by itself without the user’s
knowledge to perform malicious actions. It imposes harm to a computer by corrupting system files,
destroying data or otherwise by being a nuisance. The reason for designing a computer virus is to
attack vulnerable systems to gain admin control and steal confidential information Cybercriminal’s
prey on online users by tricking them.

Types of Computer Malware

Virus
We tend to refer to all malware as viruses, but it is not so. A virus
modifies other legitimate host files in such a way that when you
execute a file in the victim’s system, you also execute the
virus. Today, with different kinds of malware infecting the cyber
world, computer viruses have become rather uncommon; they
comprise less than 10% of all malwares.
Remember, viruses infect other files, they are the only malware that
infect other files and hence it is hard to clean them up. Even the
best among antivirus programs struggles with this; most of the time
they either delete or quarantine the infected file and do not get rid
of the virus itself.

Worm
A worm is self-replicating and spreads without end-user action, causing real devastation. Viruses
need end users to kick them off so that they can go on and infect other files and systems. On the
other hand, worms do not need any such end-user action. They had simply spread by themselves,
self-replicating in the process and destroying systems, devices, networks, and connected
infrastructure as well. Worms spread by exploiting other files and programs to do the spreading
work. When one person in an organization opens an email that contains a worm, the entire network
in the organization could get infected in just a few minutes.

Trojan
Trojans, reminding you of what happened during
the Trojan war, masquerade as legitimate
programs. However, they contain malicious
instructions. Trojans mostly arrive via email or
spread from infected websites that users visit. They
only work when the victim executes it. A user may
3
find a pop up that tells him his system was infected. The pop up would instruct him to run a program
to clean his system. He takes the bait, without knowing that it is a Trojan. Trojans are very common,
especially because it is easy to write Trojans. Additionally, they are easy because Trojans spread
by tricking end-users to execute them. This effectively renders security software useless.

Ransomware
Ransomware, as the name suggests, demands a ransom from
you to get things back on track. The main issue with
ransomware, which would spread tremendously fast across
organizations, networks, and countries, is that they encrypt all
files in a system or network, rendering them inaccessible. A
ransom note pops up, demanding payment in cryptocurrency,
for decrypting the files. If the ransom is not paid, the encrypted
files could eventually get destroyed and hence ransomware
should be one of the most devastating forms of malware. Most
ransomware are Trojans and spread through social
engineering. Unfortunately, in some cases, hackers refuse to
decrypt files even after you pay the ransom.

Adware
Adware is nothing but attempting to expose users to unwanted, potentially malicious advertising.
These ads most likely end up infecting a user’s device. There are adware programs that redirect a
user, during browser searches, to look-alike web pages that have
promotions of other products. Removing adware is easier. You
just need to find the malicious executable and remove it.

Spyware
Spyware, as the name suggests, helps hackers spy on systems
and their users. This kind of malware can be used for key-logging
and similar activities, thereby helping hackers gain access to
personal data (including login credentials) and intellectual
property. Spyware is also used by people who want to keep a
check on the computer activities of people personally known to
them. Spyware, like adware, is easy to remove.

File-less malware
While traditional malware travels and infects systems using the file system, File-less malware travels
and infects without directly using files or file systems. Such malware exploits and spread in memory
only; they also spread using ‘non-file’ OS objects, like APIs, registry keys etc. File-less malware
attacks are mostly initiated with the exploitation of an already existing legitimate program or by using
existing legitimate tools that are built into the OS (for example, Microsoft’s PowerShell). Thus, it
becomes tough to detect and prevent these kinds of attacks.

4
The hybrid attacks.
This is rather dangerous and devastating. Today, we have
malware that could be a combination of more than one stream
of traditional malware. For example, some malware is part
virus, part Trojan, and part worm. Such a malware might
appear as a Trojan during the initial stage, after which it would
perhaps spread like a worm. There are also bots, wherein the
hackers use one kind of malware to gain access to hundreds
of computers. Those systems are then used (either by the
same hackers or by others who purchase them) to carry out
other attacks.

How do I detect a virus on a Windows PC?


It is not always obvious when your computer is infected. Some of the
warning signs indicating that your PC or laptop might have a virus, Trojan,
worm, or some other kinds of malware are:
• A very slow running computer.
• Pop-up messages that appear out of nowhere and are hard to remove.
• Unrecognized computer programs launching on their own.
• The sound of the hard drive-in constant action

Any one of these symptoms might be caused by a virus or a different kind of malware. If you are
experiencing two or three of them at the same time, that is a strong indication that you have got a
virus. That said, a lot of modern malwares, like spyware and crypto miners, go out of their way to
stay as hidden as possible.

*To catch those, you will need to download an antivirus program.

What is Anti-Virus
Antivirus software is a program or set of programs that are
designed to prevent, search for, detect, and remove software
viruses, and other malicious software like worms, trojans,
adware, and more.

Why Do I Need Antivirus Software?


These tools are critical for users to have installed and up to date
because a computer without antivirus software protection will be
infected within minutes of connecting to the internet.

5
What Does Antivirus Software Do?
Several different companies build antivirus software and what each offer can vary but all perform
some essential functions:
• Scan specific files or directories for any malware or known malicious patterns.
• Allow you to schedule scans to automatically run for you.
• Allow you to initiate a scan of a file or your entire computer, or of a CD or flash drive at any
time.
• Remove any malicious code detected –sometimes you will be notified of an infection and
asked if you want to clean the file, other programs will automatically do this behind the
scenes.
• Show you the ‘health’ of your computer.

REFERENCES:

https://www.webroot.com/us/en/resources/tips-articles/what-is-anti-virus-software
https://edu.gcfglobal.org/en/basic-computer-skills/understanding-file-extensions/1/
https://www.tutorialspoint.com/computer_fundamentals/computer_software.htm

6
ACTIVITIES

Directions: Read the given questions below and answer each item by expressing your own
ideas in 2 – 3 sentences per item.

Are you going to use anti-virus? Why?

1. _____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

___________________________________________________________________________.
How can you protect your computer from malware attacks?

2. _____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________
ASSESSMENT
.

Directions: Encircle the correct answer.


1. A computer malware that helps hackers spy on systems and their users.
A) Adware
B) Trojan
C) Hybrid attack
D) Spyware

7
2. A computer malware that travels and infects without directly using files or file systems.
A) Ransomware
B) File-less Malware
C) Hybrid attack
D) Spyware
3. Hackers use bots or one kind of malware to gain access to hundreds of computers.
A) Ransomware
B) File-less Malware
C) Hybrid attack
D) Spyware
4. A computer malware that redirects a user, during browser searches, to look-alike web pages
that have promotions of other products.
A) Adware
B) Trojan
C) Hybrid attack
D) Spyware
5. A computer malware that encrypts all files in a system or network, rendering them
inaccessible with a ransom note.
A) Ransomware
B) File-less Malware
C) Hybrid attack
D) Spyware
6. A malicious code designed to spread from host to host by itself without the user’s
knowledge to perform malicious actions.
A) Operating system
B) Application Software
C) Computer Malware
D) Anti-virus
7. A computer malware that is self-replicating and spreads without end-user action, causing real
devastation.
A) Spyware
B) Worm
C) Adware
D) Anti-virus
8. A computer malware that impersonates as legitimate programs.
A) Adware
B) Trojan
C) Hybrid attack
D) Spyware

8
9. A computer malware that demands a ransom from you to get things back on track.
A) Ransomware
B) File-less Malware
C) Hybrid attack
D) Spyware
10. A computer malware that attempts to expose users to unwanted, potentially malicious
advertising.
A) Adware
B) Trojan
C) Hybrid attack
D) Spyware

Directions: Find ten (10) key words used in this lesson. Encircle your answer.

A P M E M O R Y H Y B R I D M
O D O X X A A S H S D O C S A
K V W B O A N S P Y W A R E L
H I A A H W S U T T K P O M W
H R A D R E O Y U I L A C V A
I U M S P E M L S N M N O S R
B S N I E C W P V U I T M N E
O C Z O A O A P F M O I P R B
S O F T W A R E N I T V U E E
N C O S E U E S M T A I T K V
C H C L T R O J A N D R E A I
U O W D E Q U E L Y A U R E R
T P D T E B W W O S P S P P D
W Q Z E E R O O S I S N A S T
W O R M P M I P O U M P U T C

VIRUS ADWARE COMPUTER

MALWARE SPYWARE HYBRID

RANSOMWARE TROJAN SOFTWARE

ANTIVIRUS WORM CODE

You might also like