Malware
-
Upload
vansh-sethi -
Category
Technology
-
view
211 -
download
2
description
Transcript of Malware
![Page 1: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/1.jpg)
![Page 2: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/2.jpg)
A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
![Page 3: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/3.jpg)
Types of Malwares
The term Adware is frequently used to describe a form of malware , usually that which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up.
![Page 4: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/4.jpg)
Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
![Page 5: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/5.jpg)
A Virus is a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers.
![Page 6: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/6.jpg)
Computer Worm is a program that replicates itself and destroys data and files on the computer. Worms work to “eat” the system operating files and data files until the drive is empty.
![Page 7: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/7.jpg)
The most dangerous Malware. Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ” Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.
![Page 8: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/8.jpg)
The term Spam refers to unsolicited commercial advertisements distributed online. Most spam comes to people via email, but spam can also be found in online chat rooms and message boards.Spam consumes a tremendous amount of network bandwidth on the Internet. More importantly, it can consume too much of peoples' personal time if not managed properly.
![Page 9: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/9.jpg)
Antivirus, anti-virus, or AV software is computer software used to prevent, detect and remove malicious computer viruses. Most software described as antivirus also works against other types of malware, such as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.
![Page 10: Malware](https://reader038.fdocuments.us/reader038/viewer/2022103018/5586be3cd8b42a315c8b466f/html5/thumbnails/10.jpg)
By - Vansh SethiX - A27