0% found this document useful (0 votes)
8 views16 pages

B Ing

Uploaded by

Aziz 1250
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views16 pages

B Ing

Uploaded by

Aziz 1250
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Computers and

Malicious Programs
Understanding Technology and Security Threats
Introduction

Definition of a Computer

A computer is an electronic
device that processes data to
perform various tasks.
Introduction

Definition of Malicious Programs

Malicious software, or malware, refers to


any software specifically designed to
disrupt, damage, or gain unauthorized
access to a computer system.
Introduction

Importance of Understanding Computers and


Malicious Programs

Computers play a crucial role in modern life,


while malicious programs pose significant threats
to computer systems and data.
Components of a Computer

Hardware

• Central Processing Unit (CPU)


• Memory (RAM)
• Storage Devices (Hard Drive, SSD) S
• Input Devices (Keyboard, Mouse) •

• Output Devices (Monitor, Printer) •

Components of a Computer

Software
Hardware

• Central
SystemProcessing
Software (Operating
Unit (CPU)System)
• Memory
Application
(RAM)Software (Word Processors,
• Storage
Web Browsers)
Devices (Hard Drive, SSD)
• Input
Peripheral
DevicesDevices
(Keyboard, Mouse)
• Output
DevicesDevices
connected
(Monitor,
to the computer
Printer) but are
not part of the core system, such as
printers, scanners, and external drives.
Components of a Computer

Software
Hardware

• Central
SystemProcessing
Software (Operating
Unit (CPU)System)
• Memory
Application
(RAM)
Software (Word Processors,
• Storage
Web Browsers)
Devices (Hard Drive, SSD)
• Input Devices (Keyboard, Mouse)
• Output Devices (Monitor, Printer)
Types of Computers
Personal Computers (PC)
• Designed for individual use, including desktops, laptops

Server Computers
• Used to manage network resources and provide services
to other computers on the network.

Mainframe Computers
• Powerful computers used by large organizations for data
processing and transaction processing.
Supercomputers
• High-performance computers used for tasks requiring
immense computational power, such as weather
forecasting and scientific simulations.
Types of Malicious Programs
Worms
Viruses
• Definition: Programs
Self-replicating programs that
that replicate
spread across
themselves bynetworks.
attaching to other programs.
Conficker worm.
Example: ILOVEYOU virus.

Ransomware
Trojans
• Definition: Software
Programsthatthatencrypts files or locks
appear legitimate but the
system
contain until a ransom
malicious code.is paid.
Example: WannaCry
Zeus Trojan. ransomware.

Adware
Spyware
•Definition: Software
Definition: that
Software automatically
that displays
secretly gathers user
advertisements.
information without their consent.
Superfish spyware.
Example: FinFisher adware.
Types of Malicious Programs
Worms
Viruses
• Definition: Self-replicating programs that
Programs that replicate
spread across
themselves bynetworks.
attaching to other programs.
Example: Conficker
ILOVEYOU worm.
virus.

Ransomware
Trojans
• Definition: Software
Programsthatthatencrypts files or locks
appear legitimate but the
system
contain until a ransom
malicious code.is paid.
Example: WannaCry
Zeus Trojan. ransomware.

Adware
Spyware
Definition: Software
• Definition: that
Software automatically
that displays
secretly gathers user
advertisements.
information without their consent.
Example: Superfish adware.
FinFisher spyware.
Common Methods of
Malware Distribution
Infected Websites
Email Attachments • Visiting compromised
• Malware often spreads websites can lead to
through infected email malware infections.
attachments. Removable Media
• USB drives and other
removable media can carry
malware.
Software Downloads Drive-by Downloads
• Downloading software from • Malware can be automatically
untrustworthy sources can downloaded and installed when
result in malware infections. visiting certain websites
without user interaction.
Impact of Malicious Programs
Data Loss
Malware can delete, corrupt, or steal sensitive data.

Financial Loss
Ransomware attacks can result in financial losses due to extortion.

Identity Theft
Spyware can gather personal information leading to identity theft.

System Downtime
Infected systems may experience downtime for cleanup and recovery.

Reputation Damage
Organizations may suffer reputation damage due to malware-related incidents.
Prevention and Mitigation

Use Antivirus Software


Install reputable antivirus software and keep it updated.

Enable Firewalls
Firewalls can block unauthorized access to your network.

Regular Software Updates


Keep all software and operating systems up to date to patch security
vulnerabilities.
Prevention and Mitigation

Exercise Caution Online


Avoid clicking on suspicious links or downloading files from unknown
sources.

Backup Data Regularly


Regularly backup important data to mitigate the impact of ransomware
attacks.

Educate Users
Train users on how to recognize and avoid potential malware threats.
Conclusion
THANK YOU

You might also like