What is Malware (Virus), Types of Malware

anuj569807 9 views 15 slides Jun 27, 2024
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

Looking for a computer institute to learn Full Stack development and Digital Marketing? Our institute offers comprehensive courses in both areas, providing students with the skills and knowledge needed to succeed in today's digital landscape


Slide Content

Malware (malicious software)

Malware (malicious software) Malware is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.

Malware History Creeper Worm – 1970 [ ARPANET] (Networking Based) Antivirus- Adv. Res Project , Agency Network ( BOB Thomous )- Reaper ELK Cloner 1982 - Richard Skrenta (Mac OS)

Malware attacks गलत Files Downloading Spam Emails गलत Websites को open करने से 4. Viral Drives use करने से 5. Bluetooth and wi-fi Connectivity से

Types of Malware

Virus A  virus  is the most common type of malware which can execute itself and spread by infecting other programs or files.

Worm A   worm   can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.

Trojan horse A  Trojan horse     is   designed to appear as a legitimate program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions

Spyware Spyware     is   made to collect information and data on the device user and observe their activity without their knowledge

Ransomeware Ransomware  is designed to infect a user's system and encrypt the data. Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.

Rootkit A   rootkit     is created   to obtain administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.

Adware Adware  is used to track a user’s browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. For example, an advertiser might use  cookies  to track the web pages a user visits  to  better target advertising

Keyloggers Keyloggers , also called system monitors, are used to see nearly everything a user does on their computer. This includes emails, opened web-pages, programs and keystrokes.

History The term malware was first used by computer scientist and security researcher Yisrael Radai in 1990. However, malware existed long before this. One of the first known examples of malware was the Creeper virus in 1971, which was created as an experiment by BBN Technologies engineer Robert Thomas. Creeper was designed to infect mainframes on  ARPANET . While the program did not alter functions, or steal or delete data, the program moved from one mainframe to another without permission while displaying a teletype message that read, "I'm the creeper: Catch me if you can

History Creeper was later altered by computer scientist Ray Tomlinson, who added the ability to self-replicate to the virus and created the first known computer worm. The concept of malware took root in the technology industry, and examples of viruses and worms began to appear on Apple and IBM personal computers in the early 1980s before becoming popularized following the introduction of the  World Wide Web  and the commercial internet in the 1990s.