Lecture 6
Lecture 6
Lecture 6
COS-413
Lecture Five
Eng. Mohamed Jaambiir
Malware
Many early infectious programs, including the first Internet Worm, were written as
experiments or pranks.
Today, malware is used primarily to steal sensitive personal, financial, or
business information for the benefit of others.
Malware is sometimes used broadly against government or corporate websites to
gather guarded information, or to disrupt their operation in general.
However, malware is often used against individuals to gain personal information
such as social security numbers, bank or credit card numbers, and so on.
Types of Malware
1. Virus
Virus is program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
Viruses require human intervention to propagate. Viruses can also replicate
themselves.
Viruses copy themselves to other disks to spread to other computers.
Once users download the malicious code onto their devices; often delivered via
malicious advertisements or phishing emails; the virus spreads throughout their
systems. Viruses can modify computer functions and applications; copy, delete and
exfiltrate data; encrypt data to perform ransomware attacks; and carry out DDoS
attacks.
Types of viruses
2. Worms
Ransomware locks or encrypts files or devices and forces victims to pay a ransom
in exchange for re-entry.
Ransomware is a form of malware that essentially holds a computer system captive
while demanding a ransom.
The malware restricts user access to the computer either by encrypting files on the
hard drive or locking down the system and displaying messages that are intended
to force the user to pay the malware creator to remove the restrictions and regain
access to their computer.
Example of Ransomware
9. Rootkits
Spam is email that you did not request and do not want.
Spam is a common way to spread viruses, Trojans, and malware.
Spammers often send messages or emails with links to install
malware onto your system.
Example of Spam
Damages caused by malware
1. Data Loss
Many viruses and Trojans will attempt to delete files or wipe hard drives when
activated, but even if you catch the infection early, you may have to delete infected
files.
2. Account Theft
Many types of malware include Keylogger functions, designed to steal accounts and
passwords from their targets.
This can give the malware author access to any of the user's online accounts,
including email servers from which the hacker can launch new attacks.
Damages caused by malware
3.Botnets
Many types of malware also subvert control over the user's computer, turning it into a
"bot" or "zombie."
Hackers build networks of these commandeered computers, using their combined
processing power for tasks like cracking password files or sending out bulk emails.
4. Financial Losses
If a hacker gains access to a credit card or bank account via a Keylogger, he can
then use that information to run up charges or drain the account.
How To Know If Devices Are Infected With
Malware?
The following are the most typical indications that malware has compromised your
computer:
I. Increased CPU usage
II. Problems connecting to networks
III. When your web browser directs you to a website you didn’t intend to visit, this is
known as a browser redirect.
IV. Warnings about infections are frequently accompanied by offers to buy a product to
treat them.
V. Having trouble starting or shutting down your computer.
VI. Persistent pop-up ads.
How To Protect From Malware?
Anti-Malware Program
Anti-Malware program is used to prevent, detect, and remove computer
viruses, worms, Trojan horses and any other type of malware.
Examples of Anti-Malware program:
1. Antivirus program
2. Anti-spyware program
3. Anti-spam program
4. Firewall
1. Antivirus Program
I. Norton Antivirus
II. AVG
III. Kaspersky
IV. Avast!
V. PC-Cilin
VI. McAffee
VII. Avira
2. Anti-Spyware Program
Anti-spam is software that aims to detect and block potentially dangerous email
from user inboxes. Anti-spam protocols determine what is an unsolicited and
unwanted message (spam).
Examples of Anti-spam program:
I. SpamTitan
II. Leanmail
III. MailCleaner
IV. Mimecast
4. Firewall