0% found this document useful (0 votes)
15 views5 pages

Presentation 1

Malware is unauthorized software that infiltrates systems to steal sensitive data and disrupt operations, including various types such as ransomware, adware, spyware, rootkits, and key loggers. Cybercriminals utilize malware for identity theft, financial fraud, and launching attacks on networks. Awareness and protective measures, such as antivirus software and cautious online behavior, are essential for individuals and organizations to safeguard against malware threats.

Uploaded by

TRICKER RAHUL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views5 pages

Presentation 1

Malware is unauthorized software that infiltrates systems to steal sensitive data and disrupt operations, including various types such as ransomware, adware, spyware, rootkits, and key loggers. Cybercriminals utilize malware for identity theft, financial fraud, and launching attacks on networks. Awareness and protective measures, such as antivirus software and cautious online behavior, are essential for individuals and organizations to safeguard against malware threats.

Uploaded by

TRICKER RAHUL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Topic: Classification of Malware

NAME: Rahul Paul

COURSE: BCA(Makaut)

UNIVERSITY ROLL NO:18301222023

SUBJECT: Cyber Security(BCAC602)

SEM: 6th
What is Malware
 Malware is software that gets into the system without user consent to steal the
user’s private and confidential data, including bank details and passwords. They
also generate annoying pop-up ads and change system settings. Malware includes
computer viruses, worms, Trojan horses, ransom ware, spyware, and other
malicious programs. Individuals and organizations need to be aware of the
different types of malware and take steps to protect their systems, such as using
antivirus software, keeping software and systems up-to-date, and being cautious
when opening email attachments or downloading software from the internet.
Why Do Cybercriminals Use Malware?

 Using deception to induce a victim to provide personal information for identity


theft
 Theft of customer credit card information or other financial information
 Taking over several computers and using them to launch denial-of-service
attacks against other networks
 Using infected computers to mine for cryptocurrencies like bit coin.
Types Of Malware
 Ransom ware – Ransom ware grasps a computer system or the data it contains until
the victim makes a payment. Ransom ware encrypts data in the computer with a key
that is unknown to the user. The user has to pay a ransom (price) to the criminals to
retrieve data. Once the amount is paid the victim can resume using his/her system.
 Adware – It displays unwanted ads and pop-ups on the computer. It comes along with
software downloads and packages. It generates revenue for the software distributer by
displaying ads.
 Spyware – Its purpose is to steal private information from a computer system for a
third party. Spyware collects information and sends it to the hacker.
 Rootkits – A rootkit modifies the OS to make a backdoor. Attackers then use the
backdoor to access the computer distantly. Most rootkits take advantage of software
vulnerabilities to modify system files.
 Key loggers – Key logger records everything the user types on his/her computer
system to obtain passwords and other sensitive information and send them to the source
of the key logging program.
THANK YOU

You might also like