RECOGNIZING TYPES OF MALWARES TO SECURE DATA

clar14 14 views 34 slides Sep 29, 2024
Slide 1
Slide 1 of 34
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34

About This Presentation

THE TOPIC IS ALL ABOUT THE RECOGNIZING THE TYPES OF MALWARES FOR DATA SECURITY UNDER THE LEARNING OBJECTIVE "MAINTENANCE OF COMPUTER SYSTEM"


Slide Content

Attendance Checking

Assignment checking

Assignment: 1. What is the primary function of a web browser? A) To store and manage files on your computer B) To browse and search for information on the internet C) To play multimedia files and games D) To create and edit documents

Assignment: 2. What is the function of the "Address Bar" in a web browser? A) To display a list of frequently visited websites B) To show the current website you are visiting C) To enter a URL or search query to access a specific website D) To view the browser's history of visited websites

Assignment: 3. What is the function of the "Search Bar" in a web browser? A) To display a list of recently visited websites B) To enter a search query to find specific information on the internet C) To bookmark a favorite website D) To clear browser history and cookies

Assignment: 4. How can you use a web browser to find information on a specific topic? A) By typing in a URL or website address B) By using the "Search Bar" to enter a search query C) By clicking on a link or button to access related information D) By using the "Address Bar" to enter a specific URL or website

Assignment: 5. What is the purpose of "Bookmarking" a website in a web browser? A) To remember a password for a website B) To delete a website from your browser's history C) To save a website for easy access later D) To block a website from being accessed

WHAT IS THE DIFFERENCE BETWEEN WEB BROWSER AND INTERNET?

Activity 1: “Visual diagnosis” Watch and pay close attention to the video. Analyze and write down the effect/s of a virus on both human bodies and computer software .

Learning Objective 6: Recognize malwares to ensure security of data . Maintain computer equipment and systems.

MALWARE Malicious Software Refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and computer systems.

TYPES OF MALWARE

VIRUS A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be “infected” with computer virus.

WORM Exploits vulnerabilities in your security software to steal sensitive information, install backdoors that can be used to access the system, corrupt files, and do other kinds of harm.

TROJAN HORSE A type of malware that downloads onto a computer disguised as a legitimate program.

ADWARE A type of malware that displays unwanted advertisements on your device, often in the form of pop-ups or banners.

SPYWARE A malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent. An unwanted software that spied on their user and computer activity.

RANSOMWARE A type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.

SAMPLE ENCRYPTED DOCUMENT SAMPLE ENCRYPTED FILES/FOLDERS

KEYLOGGERS A keylogger or keystroke logger/keyboard capturing is a form of malware or hardware that keeps track and records your keystrokes as you type.

ROOTKITS A type of malware designed to give hackers access to and control over a target device.

PHISHING A type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

Activity 2: Brainstorm and list down different strategies in preventing malware attacks.

Strategies to prevent malware attacks: Use anti-virus software Use strong password Keep software up-to-date Be cautious with downloads Back up data

Activity 3: Recognize malwares based on their specific characteristics described in each scenario.

Case 1 A user, "David", notices that his computer is running slowly, and strange processes are running in the background. An investigation reveals that his computer is infected with malware that has hidden itself deep in the system and is allowing hackers to access the computer remotely.

Case 2 A business owner, "Mike", discovers that someone has been accessing his computer remotely and stealing sensitive business data. An investigation reveals that his employee's computer was infected with malware that captured every keystroke made on the keyboard.

CASE 3: A small business, "Green Cleaners", has been infected with a malware. The malware, known as " Cryptolocker ", has encrypted all of the company's files and is demanding a ransom payment in exchange for the decryption key. The business owner is unsure of what to do and is worried about losing important data and business operations.

CASE 4 A college student, "Emily", receives an email from what appears to be her bank's email address. The email claims that her account has been compromised and asks her to click on a link to reset her password. However, the email is actually a n attempt by hackers to steal Emily's login credentials.

CASE 5 A user, "Sarah", installs a free software download from the internet. Unbeknownst to Sarah, the software is infected with malware that generates pop-up ads and tracks her online activity. The malware also slows down Sarah's computer and makes it difficult to browse the internet.

ASSESSMENT: keystroke logger/keyboard capturing is a form of malware or hardware that keeps track and records your keystrokes as you type. A type of malware that downloads onto a computer disguised as a legitimate program. A malware designed to deliver targeted advertisements or infected computers. An unwanted software that spied on their user and computer activity A malware that often used to steal user data, including login credentials and credit card numbers KEYLOGGER PHISHING ADWARE SPYWARE TROJAN HORSE

A malware infection can have serious consequences for computer software and data. By understanding how a virus spreads and affects computer software, you can take steps to prevent and remove an infection. Remember to always use antivirus software, keep software up-to-date, and be cautious when downloading software or opening email attachments.

Assignment: List down best practices to ensure safety of data in your devices.