0% found this document useful (0 votes)
49 views16 pages

Malicious Code

The document discusses various types of malware such as ransomware, trojans, worms, rootkits, backdoors, viruses, fileless viruses, spyware, and adversarial artificial intelligence. It provides details on each type of malware including how they work, examples, and recommended defenses. Defenses include anti-malware tools, keeping systems updated, user awareness training, and downloading files only from trusted sources. The document is an educational guide on different malware threats and how to protect against them.

Uploaded by

Hafiz Ali Hummad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views16 pages

Malicious Code

The document discusses various types of malware such as ransomware, trojans, worms, rootkits, backdoors, viruses, fileless viruses, spyware, and adversarial artificial intelligence. It provides details on each type of malware including how they work, examples, and recommended defenses. Defenses include anti-malware tools, keeping systems updated, user awareness training, and downloading files only from trusted sources. The document is an educational guide on different malware threats and how to protect against them.

Uploaded by

Hafiz Ali Hummad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

MALICIOUS CODE

GROUP:
CONTENTS

 Malware
 Types of Malware
 Defense
MALWARE

 The term malware describes a wide range of


software that is intentionally designed to cause
harm to systems and devices, networks, or
users. Malware can also gather information,
provide illicit access, and take a broad range of
actions that the legitimate owner of a system or
network may not want to occur
TYPES OF MALWARE

 Ransomware
 Trojans
 Worms
 Rootkits
 Backdoors
 Virus
 Fileless viruses
 Spyware
 Adversarial Artificial Intelligence
RANSOMWARE

 Ransomware is malware that takes over a


computer and then demands a ransom.
 crypto malware
 WannaCry Ransomware
 Reporting of users to law enforcement
 Defense
 Effective backup
 Anti-malware tools
TROJANS

 Trojans, or Trojan horses, are a type of malware


that is typically disguised as legitimate
software.
 Remote Access Trojans (RATs)
 Zeus Trojan/ Zbot
 Defense
 Security Awareness
 Anti-Malware Solutions
BACKDOORS
 A backdoor attack is using any malware or technology
to gain unauthorized access to any application or
system by passing all security measures
 Backdoors allow attackers to get into system by
passing security protocols and gain admin access.
 Types Of Backdoor
 Administrative backdoor
 Malicious backdoor
 Defense
 Anti-Malware Tools
 Change default passwords.
 Choose applications and plugins carefully.
WORMS

 A computer worm is a standalone malware computer


program that replicates itself in order to spread to
other computers. worm spreads across a network
through Internet or by connected devices. It works on
law of exponential growth, controlling and infecting
more and more computers in a short time
 Defense
 Firewall/ NGFW
 Anti-Malware Solution
 Keep up to date
 Download files from trusted sources only
ROOTKITS

 Rootkits are malware that is specifically designed to control over a


target computer or network. Rootkits can sometimes appear as a single
piece of software but are often made up of a collection of tools that
allow hackers administrator-level control over the target device.
 Types Of Rootkit
 Hardware/Firmware rootkit
 Boot loader rootkit
 Memory Rootkit
 Application rootkit
 Kernel mode rootkit
 Defense
 Keep up to date
 Be alert to phishing scams
 Download files from trusted sources only
BOTS

 Bots are remotely controlled systems or devices


that have a malware infection. Groups of bots are
known as botnets, and botnets are used by
attackers who control them to perform various
actions, ranging from additional compromises
and infection, to denial-of-service attacks
 Botnets and Distributed Denial-of-Service (DDoS)
Attacks
 Defense
 IPS/IDS
 NGFW
VIRUSES

 Computer virus is malicious code that replicates


by copying itself to another program, computer
boot sector or document and changes how a
computer works.
 Memory-resident viruses
 Non-memory-resident viruses
 Boot sector viruses
 Email viruses

 Defense
 Anti-Malware Solution
 Scheduled Scans
FILELESS VIRUSES

 Fileless virus attacks are similar to traditional


viruses in a number of critical ways. They
spread via methods like spam email and
malicious websites.

 Defense
 User awareness
 Anti-Malware Solution
SPYWARE

 Spyware is malware that is designed to obtain


information about an individual, organization,
or system.
 Track users' browsing habits
 Sensitive data
 Allows remote access to web cameras

 Defense
 User Awareness
 Anti-Malware Solutions
ADVERSARIAL ARTIFICIAL INTELLIGENCE
Adversarial machine learning is a technique used in
machine learning to fool or misguide a model with
malicious input. While adversarial machine learning
can be used in a variety of applications, this technique
is most commonly used to execute an attack or cause
a malfunction in a machine learning system.

Defense
Understand the quality and security of source data.
Work with AI and ML developers to ensure that they are
working in secure environments and that data sources,
systems, and tools are maintained in a secure manner.
Ensure that changes to AI and ML algorithms are
reviewed, tested, and documented.
Encourage reviews to prevent intentional or unintentional
bias in algorithms.
ANY QUESTIONS?
THANK YOU!

You might also like