0% found this document useful (0 votes)
23 views40 pages

Malware: Group 8 Christine Domingo Ludjango Bigueras Ivan Zyann Magdaraog Jash Lourence Baloyot Princesa Aringo

Ppt

Uploaded by

mendiorojr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views40 pages

Malware: Group 8 Christine Domingo Ludjango Bigueras Ivan Zyann Magdaraog Jash Lourence Baloyot Princesa Aringo

Ppt

Uploaded by

mendiorojr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

MALWARE

Group 8
Christine Domingo
Ludjango Bigueras
Ivan Zyann Magdaraog
Jash Lourence Baloyot
Princesa Aringo
TABLE OF CONTENT

01 02 03 04
MALWARE USAGE OF MALWARE TYPES OF MALWARE HOW MALWARE
SPREADS?

05 06 07
HOW CAN YOU SYMPTOMS ANTI-MALWARE
PROTECT COMPUTER? PROGRAM

BACK NEXT
MALWARE
•Short for Malicious Software

•A is Software used or created to disrupt computer operation, gather

sensitive information, or gain access to private computer system.

•It can appear in the form of code, scripts, active content, and other

software.

•"Malware" is a general term used to refer to a variety of forms of hostile,

intrusive, or annoying software.


BACK NEXT
USAGE OF MALWARE
•Many early infectious programs, including the first internet worms, were

written as experiments or pranks. Today, malware is used primarily to steal

sensitive personal, financial or business information for the benefit of others.

•Malware is sometimes used broadly against government or corporate websites

to gather guarded information, or to disrupt their operation in general.

•However, Malware is often used against individuals to gain personal

information such as social security numbers, bank or credit card numbers, and

so on.
BACK NEXT
TYPES OF MALWARE
Viruses
Trojan Horses
Worms
Spyware
Zombie
Phishing
Spam
Adware

BACK Ransomware NEXT


VIRUSES
•A program or piece of code that is loaded onto
your computer without your knowledge and runs
against your wishes.
•Viruses can also replicate themselves.
•All computer viruses are manmade.
•Viruses copy themselves to other disks to spread
to other computers.
•They can be merely annoying or they can be vastly
destructive to your files.
BACK NEXT
EXAMPLE OF COMPUTER
PAGE 1 OF 2

VIRUSES
-Macro Virus
-Boot Virus

-Logic Bomb Virus


-Directory Virus
-Resident Virus
BACK NEXT
BACK NEXT
TROJAN HORSES
A trojan horse program has the appearance of having a
useful and desired function
• A trojan horse neither replicate nor copies itself,
but cause damage or compromise the security of the
computer
• trojan horse must be sent by someone or carried by
another program and may arrive in the form of an joke
program or software of some sort
• These are often used to capture your logins and
BACK password NEXT
EXAMPLE OF TROJAN HORSES

• Remote access trojan (RATs)•


Backdoor trojans (backdoor)
IRC trojans (IRCbots)
• Keylogging trojans.

BACK NEXT
EXAMPLE OF TROJAN HORSES

BACK NEXT
WORMS
• A computer worm is a self-replicating
computer program.
• It uses a network to send copies of itself to
other nodes (computer on the network) and it
may do so without any user intervention.
• It does not need to attach itself to an
existing progra
BACK
m. NEXT
WORMS

BACK NEXT
SPYWARE
• Spyware is a type of Malware installed on computers the
collects information about users without their knowledge.
• The presence of a spyware is typically hidden from the user
and can be difficult to detect.
• Spyware program lurk on your computer to steal important
information, like your password and logins and other personal
identification information and then sent it off to someone else

BACK
. NEXT
SPYWARE

BACK NEXT
ZOMBIE

• Zombie programs take control of your


computer and use it and it's internet
connection to attack other computers or
networks or to perform other criminal
activity.
BACK NEXT
ZOMBIE

BACK NEXT
PHISHING
• Phishing (pronounce like the word 'fishing') is a message that
tries to trick you into providing information like your social
security number or bank account information or logon and
password for a web site.
• The message may claim that if you do not click on the link in the
message and log onto a financial web site that your account will
be blocked, or some other disaster.

BACK NEXT
PHISHING

BACK NEXT
SPAM
• Spam is email that you did not request and do not
want
• One person's spam is another useful newsletter or
sale add
•Spam is a common way to spread viruses,trojans, and
the like.
BACK NEXT
SPAM

BACK NEXT
ADWARE
•Adware(short for advertising -supported software)is
a type of malware that automatically delivers
advertisements
•Common examples of adware include pop-up adds on
websites and advertisement that are displayed by
software
• Often times software and applications offer"free"

BACK
versions that come bundled with adware. NEXT
ADWARE

BACK NEXT
RANSOMWARE
•Ransomware is a form of malware that essentially holds a
computer system captive while demanding a ransome
•The malware restricts user acces to the computer either
by encrypting files on the hard drive or locking down the
system and displaying messages that are intended to force
the user to pay the malware creator to remove the
restrictions and regain access to their computer
BACK NEXT
RANSOMWARE

BACK NEXT
HOW TO MALWARE SPREADS?
•Malware is a program that must be triggered or somehow
executed before it can infect your computer system and spread
to others.
•Here are some example on how malware is distributed
a) Social network
b)Pirated software
c) Removable
d) Emails
BACK e) Websites NEXT
DAMAGES

1.Data loss
• Many viruses and Trojans will attempt to
delete files or wipe hard drives when
activated,but even if you catch the infection
early,you may have to delete infected files

BACK NEXT
DAMAGES
2. Account Theft
•Many types of malware include keylogger functions designed
to steal accounts and passwords from their targets

•This can give the malware author access to any of the user's
online accounts, including emails servers from which the
hacker can launch new attacks.
BACK NEXT
DAMAGES
3. Botnets
- Many types of malware also subvert control over the user's
computer, turning it into a "bot" or "zombie."
- Hackers build networks of these commandeered computers,
using their combined processing power for tasks like cracking
password files or sending out bulk emails.

BACK NEXT
DAMAGES
4. Financial Losses

- If a hacker gains access to a credit card or bank account via a keylogger, he can
then use that information to run up charges or drain the account.
- Given the popularity of online banking and bill payment services, a hacker who
manages to secrete a keylogger on a user system for a full month may gain access
to the user entire financial portfolio. Allowing him to do as much damage as
possible in a single attack

BACK NEXT
HOW CAN YOU PROTECT YOUR COMPUTER?

- Install protection software.


- Practice caution when working with files from unknown or
questionable sources.
- Do not open e-mail if you do not recognize the sender.
- Download files only from reputable Internet sites.
- Install firewall.
- Scan your hard drive for viruses monthly.
BACK NEXT
SYMPTOMS
- Increased CPU usage
- Slow computer or web browser speeds
- Problems connecting to networks
- Freezing or crashing
- Modified or deleted files
- Appearance of strange files, programs, or desktop icons
- Programs running, turning off, or reconfiguring themselves (malware will often
reconfigure or turn off antivirus and firewall programs)

BACK NEXT
ANTI-MALWARE PROGRAM

•Anti-malware program is used to prevent, detect, and remove


computer viruses, worms, trojan horses and any other type of
malware.

•Example of Anti-Malware program:


-Antivirus program
-Anti-spyware program
-Anti-spam program
BACK -firewall NEXT
ANTIVIRUS PROGRAM
•"Antivirus" is protective software designed to defend
your computer against malicious software.in order to be
an effective depends,the antivirus software needs to
run in background at all times and should be kept
updated so it recognizes new versions of malicious
software.
BACK NEXT
EXAMPLE OF ANTIVIRUS PROGRAM
*Norton
antivirus
*AVG
*Kaspersky
*Avast
*PC-Cilin
*McAffee
BACK *Avira NEXT
ANTI-SPYWARE PROGRAM

Anti-spyware program is a type of


program designed to prevent and detect
unwanted spyware program installation
and to remove those program if installed.

BACK NEXT
EXAMPLE OF ANTI-SPYWARE
PROGRAM

-Spyware Doctor
-AVG Anti-spyware
-STOPzilla
-Spysweeper

BACK NEXT
ANTI-SPAM PROGRAM

Anti-spam software tries to identify


useless or dangerous message for you.

BACK NEXT
FIREWALL
*A firewall blocks attempts to access your files over a network
or internet connection.
*That will block incoming attacts.
*Your computer can become infected through shared disk or
even from another computer on the network.
*So you need to monitor what your computer is putting out
over the network or internet also.
BACK NEXT
THANK YOU

You might also like