B Ing
B Ing
Malicious Programs
Understanding Technology and Security Threats
Introduction
Definition of a Computer
A computer is an electronic
device that processes data to
perform various tasks.
Introduction
Hardware
Software
Hardware
• Central
SystemProcessing
Software (Operating
Unit (CPU)System)
• Memory
Application
(RAM)Software (Word Processors,
• Storage
Web Browsers)
Devices (Hard Drive, SSD)
• Input
Peripheral
DevicesDevices
(Keyboard, Mouse)
• Output
DevicesDevices
connected
(Monitor,
to the computer
Printer) but are
not part of the core system, such as
printers, scanners, and external drives.
Components of a Computer
Software
Hardware
• Central
SystemProcessing
Software (Operating
Unit (CPU)System)
• Memory
Application
(RAM)
Software (Word Processors,
• Storage
Web Browsers)
Devices (Hard Drive, SSD)
• Input Devices (Keyboard, Mouse)
• Output Devices (Monitor, Printer)
Types of Computers
Personal Computers (PC)
• Designed for individual use, including desktops, laptops
Server Computers
• Used to manage network resources and provide services
to other computers on the network.
Mainframe Computers
• Powerful computers used by large organizations for data
processing and transaction processing.
Supercomputers
• High-performance computers used for tasks requiring
immense computational power, such as weather
forecasting and scientific simulations.
Types of Malicious Programs
Worms
Viruses
• Definition: Programs
Self-replicating programs that
that replicate
spread across
themselves bynetworks.
attaching to other programs.
Conficker worm.
Example: ILOVEYOU virus.
Ransomware
Trojans
• Definition: Software
Programsthatthatencrypts files or locks
appear legitimate but the
system
contain until a ransom
malicious code.is paid.
Example: WannaCry
Zeus Trojan. ransomware.
Adware
Spyware
•Definition: Software
Definition: that
Software automatically
that displays
secretly gathers user
advertisements.
information without their consent.
Superfish spyware.
Example: FinFisher adware.
Types of Malicious Programs
Worms
Viruses
• Definition: Self-replicating programs that
Programs that replicate
spread across
themselves bynetworks.
attaching to other programs.
Example: Conficker
ILOVEYOU worm.
virus.
Ransomware
Trojans
• Definition: Software
Programsthatthatencrypts files or locks
appear legitimate but the
system
contain until a ransom
malicious code.is paid.
Example: WannaCry
Zeus Trojan. ransomware.
Adware
Spyware
Definition: Software
• Definition: that
Software automatically
that displays
secretly gathers user
advertisements.
information without their consent.
Example: Superfish adware.
FinFisher spyware.
Common Methods of
Malware Distribution
Infected Websites
Email Attachments • Visiting compromised
• Malware often spreads websites can lead to
through infected email malware infections.
attachments. Removable Media
• USB drives and other
removable media can carry
malware.
Software Downloads Drive-by Downloads
• Downloading software from • Malware can be automatically
untrustworthy sources can downloaded and installed when
result in malware infections. visiting certain websites
without user interaction.
Impact of Malicious Programs
Data Loss
Malware can delete, corrupt, or steal sensitive data.
Financial Loss
Ransomware attacks can result in financial losses due to extortion.
Identity Theft
Spyware can gather personal information leading to identity theft.
System Downtime
Infected systems may experience downtime for cleanup and recovery.
Reputation Damage
Organizations may suffer reputation damage due to malware-related incidents.
Prevention and Mitigation
Enable Firewalls
Firewalls can block unauthorized access to your network.
Educate Users
Train users on how to recognize and avoid potential malware threats.
Conclusion
THANK YOU