Download presentation
Presentation is loading. Please wait.
Published bySteven Bennett Modified over 8 years ago
1
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari027354 Hazira Hamiza Mustapa@Mustapha026980
3
Malware (malicious software), is software used to: disrupt computer operation gather sensitive information gain access to private computer systems.
4
It can appear in the form of : Code Scripts active content other software.
5
In US law, malware = computer contaminant Malware is different from defective software: It is legitimate software but contains harmful bugs some disguised as genuine software
6
Today, malware is used to: steal sensitive information of personal, financial, or business importance by black hat hackers with harmful intentions. used broadly against government or corporate websites used against individuals to gain personal information
7
2 categories: 1) Dependent (those that need a host program). 2) Independent.
8
Parasitic: fragments of programs that cannot exist independently of some actual application program Examples: Viruses, logic bombs, and backdoors.
9
It is a self-contained program that can be scheduled and run by the operating system. Examples: Worms and bot programs.
11
the use of electronic messaging systems to send unsolicited bulk messages (example: advertising) indiscriminately.
12
instant messaging spam Usenet newsgroup spam Web search engine spam spam in blogs, wiki spam online classified ads spam mobile phone messaging spam Internet forum spam junk fax transmissions social networking spam social spam television advertising and file sharing spam
14
standalone malware computer program that replicates itself in order to spread to other computers.
15
Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
17
a type of malware that replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive
18
often perform some type of harmful activity on infected hosts, such as : stealing hard disk space or CPU time accessing private information corrupting data displaying political or humorous messages spamming their contacts logging their keystrokes.
19
However, not all viruses carry a destructive payload or attempt to hide they are self-replicating computer programs which install themselves without the user's consent
20
http://en.wikipedia.org/wiki/Malware http://en.wikipedia.org/wiki/Spam_(elec tronic) http://en.wikipedia.org/wiki/Computer_ worm http://en.wikipedia.org/wiki/Computer_ virus
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.