Malware Introduction
Malware Introduction
WHAT IS MALWARE???
MALWARE
The word MALWARE comes form the combination of Malicious and Software.
In Spanish, ‘MAL’ is a prefix that means, ‘BAD’ , making the term ‘bad ware’.
To hurt others and make money, usually by affecting important information adversely.
People first started writing malware in the 1970s and early 1980s. They were written as
experiments or pranks for fun.
‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage
- but did foretell the future of malware with its quick spread through systems. ‘Reaper’
was created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’
program.
Experts believe that 31.5% of the world's computers have some type of
malware installed today.
HOW DOES MALWARE WORK ?
ENTRY
EXECUTION DISTRIBUTION
INFECTION EXPLOIT
TYPES OF MALWARE
1.Viruses
2.Worms
3.Trojan Horse
4.Ransomware
5.Spyware
6.Adware
7.Scareware
8.Rootkit
VIRUSES
VIRUS
Like a virus but they are self-contained programs (they don’t need a host).
Copy themselves from machine-to-machine.
Scan for other vulnerable machines.
Can cause slowness or even block network transmissions.
They attack the weakened points in a network.
TROJAN HORSE
WHAT IS TROJAN HORSE ??
Destructive Trojans
FTP Trojans
It’s monitors the user’s activities on the internet and transmit the
information to the third party
TYPES OF SPYWARE
Tracking cookies
SPYWARE
System monitors
Commercial Cell
Phone Spyware
keylogger
ADWARE
Software where advertising banners are displayed while any program is running.
Once a rootkit has been installed, the controller of the rootkit has the
ability to remotely execute files and change system configurations on
the host machine.
The two most effective ways to fight against malware are: Personal vigilance and protective
tools.
Malware security protection provides that second vital layer of protection for your
computer or network.