
malware
Presentation
•
Other
•
University
•
Practice Problem
•
Hard
sitokata tamaa
Used 1+ times
FREE Resource
13 Slides • 8 Questions
1
Unit III: Malware
By Karma Dorji
2
Malware, short for “malicious software,” refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
Prepared By: Karma Dorji
Definition
3
Worms
Rootkits
Keylogger
Ransomware
Spyware
Adware
Trojan horse
Types of Malware
Some text here about the topic of discussion
4
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
Example: ILOVEYOU
Virus
5
A computer worm replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
Example: The Morris Worm
Worms
6
Trojan horse is any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
Example: RAT
Trojans
7
Multiple Choice
Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer; spread by human action, such as sharing infected files
phishing
trojans
worms
Viruses
8
Multiple Choice
Programs that look useful, but cause damage to your computer
phishing
trojans
worms
horses
9
Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In many cases, the ransom demand comes with a deadline. If the victim doesn’t pay in time, the data is gone forever or the ransom increases.\
Examples: Wannacry2017
Ransomware
10
Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
Example: 1ClickDownloader
Adware
11
Multiple Choice
Which of the following is false about Trojans?
Trojans are designed to cause harm
Trojans replicate themselves
Trojans are hidden inside another file
Trojans can allow hackers unauthorised access
12
Multiple Choice
Types of Malware that takes your data hostage until you pay a fee for it:
Malware
Phishoing
Adware
Ransomware
13
Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
Examples: CoolWebSearch
Spyware
14
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit".
Rootkit
15
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.
Keylogger
16
Multiple Choice
CoolWebSearch
Rootkit
Adware
Spyware
KeyLogger
17
Multiple Select
Which are common types of malware?
Adware
Ransomware
Windows Breaker
Key Logger
Mouse Hacker
18
Thank YOU
19
Open Ended
How can you tell that your system is infected by Malwares?
20
Malware Detection
Your computer slows down
Your screen is inundated with annoying ads
Your systems crashes
You notice a mysterious loss of disk space
There's a weird increase in your system's internet activity
Subject | Subject
Some text here about the topic of discussion
Your browser setting change
Your antivirus product stops working
You lose access to your files or your entire computer
21
Multiple Choice
Harmful programs are used to disrupt computer operation, gather sensitive information or gain unauthorized access to computer systems is commonly referred to as:
Malware
Adware
Spyware
Ransomware
Unit III: Malware
By Karma Dorji
Show answer
Auto Play
Slide 1 / 21
SLIDE
Similar Resources on Wayground
13 questions
BASE DE DATOS II
Lesson
•
University
16 questions
E-commerce
Lesson
•
University
17 questions
ARTICLES: A/AN, THE AND ZERO
Lesson
•
University
14 questions
Unit 7 What is this for? Part 1
Lesson
•
University
16 questions
RWS 1312- Zuniga - Fall 2023
Lesson
•
University
17 questions
LMS CANVAS
Lesson
•
University
14 questions
Workshop
Lesson
•
University
13 questions
Tema 4. Los datos numéricos en ciencias sociales. (1)
Lesson
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
13 questions
SMS Cafeteria Expectations Quiz
Quiz
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
12 questions
SMS Restroom Expectations Quiz
Quiz
•
6th - 8th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
10 questions
Pi Day Trivia!
Quiz
•
6th - 9th Grade
Discover more resources for Other
20 questions
Disney Trivia
Quiz
•
University
19 questions
8.I_Review_TEACHER
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
39 questions
Unit 7 Key Terms
Quiz
•
11th Grade - University
14 questions
The Cold War
Quiz
•
KG - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 6 Key Terms
Quiz
•
11th Grade - University
40 questions
Famous Logos
Quiz
•
7th Grade - University