
Unit III: Malware
Presentation
•
Moral Science, Education, Computers
•
University
•
Practice Problem
•
Medium
Karma Dorji
Used 32+ times
FREE Resource
13 Slides • 8 Questions
1
Unit III: Malware
By Karma Dorji
2
Malware, short for “malicious software,” refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
Prepared By: Karma Dorji
Definition
3
Worms
Rootkits
Keylogger
Ransomware
Spyware
Adware
Trojan horse
Types of Malware
Some text here about the topic of discussion
4
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
Example: ILOVEYOU
Virus
5
A computer worm replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
Example: The Morris Worm
Worms
6
Trojan horse is any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
Example: RAT
Trojans
7
Multiple Choice
Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer; spread by human action, such as sharing infected files
phishing
trojans
worms
Viruses
8
Multiple Choice
Programs that look useful, but cause damage to your computer
phishing
trojans
worms
horses
9
Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In many cases, the ransom demand comes with a deadline. If the victim doesn’t pay in time, the data is gone forever or the ransom increases.\
Examples: Wannacry2017
Ransomware
10
Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
Example: 1ClickDownloader
Adware
11
Multiple Choice
Which of the following is false about Trojans?
Trojans are designed to cause harm
Trojans replicate themselves
Trojans are hidden inside another file
Trojans can allow hackers unauthorised access
12
Multiple Choice
Types of Malware that takes your data hostage until you pay a fee for it:
Malware
Phishoing
Adware
Ransomware
13
Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
Examples: CoolWebSearch
Spyware
14
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit".
Rootkit
15
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.
Keylogger
16
Multiple Choice
CoolWebSearch
Rootkit
Adware
Spyware
KeyLogger
17
Multiple Select
Which are common types of malware?
Adware
Ransomware
Windows Breaker
Key Logger
Mouse Hacker
18
Thank YOU
19
Open Ended
How can you tell that your system is infected by Malwares?
20
Malware Detection
Your computer slows down
Your screen is inundated with annoying ads
Your systems crashes
You notice a mysterious loss of disk space
There's a weird increase in your system's internet activity
Subject | Subject
Some text here about the topic of discussion
Your browser setting change
Your antivirus product stops working
You lose access to your files or your entire computer
21
Multiple Choice
Harmful programs are used to disrupt computer operation, gather sensitive information or gain unauthorized access to computer systems is commonly referred to as:
Malware
Adware
Spyware
Ransomware
Unit III: Malware
By Karma Dorji
Show answer
Auto Play
Slide 1 / 21
SLIDE
Similar Resources on Wayground
13 questions
Reasoning with Observation and Uncertainty
Presentation
•
University
12 questions
Chapter 8 Quiz
Presentation
•
University
18 questions
Computing Facts & Knowledge
Presentation
•
University
16 questions
PMT | Class Preparation - Quizizz
Presentation
•
University
16 questions
Les 10 principaux risques de sécurité applicative selon l'OWASP
Presentation
•
KG - University
16 questions
Untitled lesson
Presentation
•
KG - University
15 questions
Actividad 5 Diagrama lógico - físico
Presentation
•
University
15 questions
Comparatives and Superlatives
Presentation
•
University
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade
Discover more resources for Moral Science
15 questions
LGBTQ Trivia
Quiz
•
University
36 questions
8th Grade US History STAAR Review
Quiz
•
KG - University
25 questions
5th Grade Science STAAR Review
Quiz
•
KG - University
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
20 questions
5_Review_TEACHER
Quiz
•
University
10 questions
Applications of Quadratic Functions
Quiz
•
10th Grade - University
10 questions
Add & Subtract Mixed Numbers with Like Denominators
Quiz
•
KG - University
20 questions
Block Buster Movies
Quiz
•
10th Grade - Professi...