0% found this document useful (0 votes)
16 views5 pages

Malware

Uploaded by

xodiw23656
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views5 pages

Malware

Uploaded by

xodiw23656
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Malware

Malware, short for malicious software, is any software intentionally


designed to cause damage, disrupt operations, or gain unauthorised
access to computer systems, networks, or devices.

Alt text: Malware

Key Characteristics of Malware


1. Intentional Harm:

● Malware is created with the intention of causing harm to systems or


stealing information.

Example: A program that encrypts files on a user's computer and


demands a ransom for decryption (ransomware).

2. Variety of Forms:

● Malware comes in different forms, each with unique behaviours and


purposes.

Example: Viruses, worms, trojans, ransomware, spyware, adware,


and rootkits.

1 | Page
3. Stealth and Deception:

● Many types of malware are designed to evade detection by


disguising themselves as legitimate software or operating in the
background.

Example: A trojan horse appears to be a harmless application but


contains hidden malicious code.

Common Types of Malware


a. Virus

b. Worms

c. Trojans

d. Ransomware

e. Spyware

f. Adware

g. Rootkits

a. Viruses:

Malware that attaches itself to a legitimate program and spreads to


other programs or files when executed.

****

Alt text: Computer virus


Example: A virus that infects a word processing document and
spreads to other documents when opened.

2 | Page
b. Worms:

Self-replicating malware that spreads


without user interaction by exploiting
vulnerabilities in networked devices.

Example: A worm that propagates


through network shares, infecting
multiple computers.
Alt text: Multiple computers
infected by replicating worms.

c. Trojans:

Malware disguised as legitimate software


tricks users into installing it, thereby allowing
unauthorised access to their systems.

Example: A fake antivirus program that


Alt text: Trojan horse installs a backdoor into the user's system.

d. Ransomware:

Malware that encrypts a victim’s files


and demands a ransom payment for
the decryption key.

Example: The WannaCry ransomware


attack that spread globally and
affected numerous organizations.

Alt text: Ransomware

e. Spyware:

Malware that secretly gathers


information about a user’s activities
without their consent.

Example: Keyloggers that capture


and transmit keystrokes to attackers.
Alt text: Spyware

3 | Page
f. Adware:

Malware that automatically displays or downloads advertising


material when a user is online.

Alt text: Adware

Example: Pop-up ads that appear on a user's screen while browsing


the internet.

g. Rootkits:

Malware designed to gain


administrative-level control
over a system without
detection.

Example: A rootkit that hides


itself within the operating
system’s core files, making it
difficult to detect and remove. Alt text: Root kit

Practical Importance of Malware


1. Detection and Prevention:

Understanding how different types of malware operate helps in


deploying appropriate detection and prevention mechanisms.

Example: Using antivirus software to scan and detect malicious files.

4 | Page
2. Incident Response:

Knowing the signs and symptoms of malware infections allows for


quick and effective incident response.

Example: Recognising unusual system behaviour, such as slow


performance or unexpected pop-ups, as potential indicators of
malware.

3. System Hardening:

Implementing security measures to protect systems against malware


attacks.

Example: Regularly updating software, using firewalls, and employing


intrusion detection systems (IDS).

4. User Education:

Educating users on safe computing practices to prevent malware


infections.

Example: Training users to recognise phishing emails that may


contain malicious attachments or links.

5 | Page

You might also like