Download presentation
Presentation is loading. Please wait.
1
Various Types of Malware
Aranpreet Singh 37703 Victoria Institute Of Technology Abstract: 7. Botnet: This research paper will provides an overview of the most common malware applications. For specific steps you can take to protect against malware, see our Protect against Viruses & Security Threats pages. A botnet, also sometimes called a zombie army, is a software program created to automatically perform specific operations. Once a botnet infects your computer, it will connect to some sort of control server and wait for instructions from the botnet’s creator. Introduction: This his report will represent the basic information of Malware is a catch-all term for various malicious software, including viruses, adware, spyware, browser hijacking software, and fake security software. 8. Ransomware: Different Types Of Malware: The most common types of malware are viruses, worms, and Trojan horses. These three are usually thought to be the same. These three are all malicious programs that can cause damage to your computer. 1. Virus: A computer virus is a man-made piece of code that has the capability to copy itself. Microsoft defines a virus as a small software program that is designed to spread from one computer to another and to interfere with computer operation Ransomware is a fairly new type of malware. This type of malware holds your computer or files hostage and demands a ransom payment. Some ransomware simply pop up a box asking for money before you can continue using your computer. Malware Prevention and Removal Install and run anti-malware and firewall software. When selecting software, choose a program that offers tools for detecting, quarantining, and removing multiple types of malware. Keep software and operating systems up to date with current vulnerability patches. These patches are often released to patch bugs or other security flaws that could be exploited by attackers. Be vigilant when downloading files, programs, attachments, etc. Downloads that seem strange or are from an unfamiliar source often contain malware. 2. Worm: 5. Adware: It is any type of software that displays advertising on computer. The kind of adware that’s particularly malicious is the kind that abuses its access to your system to display ads when it shouldn’t. Adwares are considered to be more socially acceptable” than other types of Malware. A worm is similar to a virus by design and is generally considered to be a sub-class of a virus. However, unlike viruses, worms don’t need human interaction. They have the capability to travel from computer to computer on their own References 6. Keylogger: Landwehr, C. E; A. R Bull; J. P McDermott; W. S Choi (1993). A taxonomy of computer program security flaws, with examples. DTIC Document. Retrieved 5 April 2012. Young, Adam; Yung, Moti (1997). "Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage". Symp. on Security and Privacy. IEEE. pp. 224–235 Russinovich, Mark (31 October 2005). "Sony, Rootkits and Digital Rights Management Gone Too Far". Mark's Blog. Microsoft MSDN. Retrieved 29 July 2009. An Undirected Attack Against Critical Infrastructure" (PDF). United States Computer Emergency Readiness Team(Us-cert.gov). Retrieved 28 September 2014 . 3. Trojan Horse or Trojan: This type of malware is named after the mythological Trojan Horse. A Trojan horse, or simply a Trojan, appears to be useful at first by disguising itself as a legitimate file or software from a legitimate source. 4. Spyware: There are some spyware that get included in Trojans then spy on keystrokes to steal financial data. A keylogger runs in the background, recording every keystroke you make. Keystrokes can include usernames, passwords, credit card numbers, and other sensitive data. Keyloggers upload these keystrokes to a malicious server where it can be analyzed and people can pick out useful passwords and credit card numbers
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.