Search Header Logo
Unit III: Malware

Unit III: Malware

Assessment

Presentation

Moral Science, Education, Computers

University

Practice Problem

Medium

Created by

Karma Dorji

Used 32+ times

FREE Resource

13 Slides • 8 Questions

1

Unit III: Malware

By Karma Dorji

2

media

Malware, short for “malicious software,” refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.

Prepared By: Karma Dorji

Definition

3

  • Worms

  • Rootkits

  • ​Keylogger

  • Ransomware

  • Spyware

  • Adware

  • Trojan horse

Types of Malware

Some text here about the topic of discussion

4

media

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

Example: ILOVEYOU​

Virus

5

media

A computer worm replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

Example: The Morris Worm​

Worms

6

media

Trojan horse is any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

Example: RAT​

Trojans

7

Multiple Choice

Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer; spread by human action, such as sharing infected files

1

phishing

2

trojans

3

worms

4

Viruses

8

Multiple Choice

Programs that look useful, but cause damage to your computer

1

phishing

2

trojans

3

worms

4

horses

9

media

Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In many cases, the ransom demand comes with a deadline. If the victim doesn’t pay in time, the data is gone forever or the ransom increases.\

Examples:​ Wannacry2017

Ransomware

10

media

Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.

Example: 1ClickDownloader

Adware

11

Multiple Choice

Which of the following is false about Trojans?

1

Trojans are designed to cause harm

2

Trojans replicate themselves

3

Trojans are hidden inside another file

4

Trojans can allow hackers unauthorised access

12

Multiple Choice

Types of Malware that takes your data hostage until you pay a fee for it:

1

Malware

2

Phishoing

3

Adware

4

Ransomware

13

media

Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.

Examples:​ CoolWebSearch

Spyware

14

media

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit".

Rootkit

15

media

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.

Keylogger

16

Multiple Choice

CoolWebSearch

1

Rootkit

2

Adware

3

Spyware

4

KeyLogger

17

Multiple Select

Which are common types of malware?

1

Adware

2

Ransomware

3

Windows Breaker

4

Key Logger

5

Mouse Hacker

18

Thank YOU

media

19

Open Ended

Question image

How can you tell that your system is infected by Malwares?

20

Malware Detection

  • Your computer slows down

  • Your screen is inundated with annoying ads

  • Your systems crashes

  • You notice a mysterious loss of disk space

  • There's a weird increase in your system's internet activity

Subject | Subject

Some text here about the topic of discussion

  • Your browser setting change

  • Your antivirus product stops working

  • You lose access to your files or your entire computer

21

Multiple Choice

Harmful programs are used to disrupt computer operation, gather sensitive information or gain unauthorized access to computer systems is commonly referred to as:

1

Malware

2

Adware

3

Spyware

4

Ransomware

Unit III: Malware

By Karma Dorji

Show answer

Auto Play

Slide 1 / 21

SLIDE