Malware, short for malicious software, refers to any software intentionally designed to cause harm to a computer, network, or user. It encompasses a broad range of malicious programs, including viruses, worms, trojan horses, ransomware, spyware, and adware. Viruses attach themselves to legitimate programs and replicate when executed, worms spread independently, trojans disguise themselves as benign software to deceive users, ransomware encrypts files demanding payment for decryption, spyware monitors user activities, and adware displays unwanted advertisements. These types of malware exploit vulnerabilities to compromise system integrity, steal sensitive information, or disrupt normal computer functions, posing significant threats to cybersecurity.
3. INTRODUCTION :
What is malware ?
• An invasive software or computer code designed to infect, damage,
or gain access to computer systems.
• Designed to compromise the security and privacy of computer
systems.
• The general goal of malware is to disrupt the normal operations of a
device.
4. PURPOSE :
• Malware is created for various purposes, including stealing
sensitive information, disrupting operations, gaining
unauthorized access, or causing damage to computer systems.
CHARACTERISTICS :
• Stealthy behavior, attempting to avoid detection and
removal.
• It can be destructive, causing damage to files, hardware,
or the overall system.
• Malware may grant unauthorized access to attackers,
compromising the security of the affected system.
5. COMMON TYPES OF MALWARE :
Malware
Virus
Worms
Trojans
Ransomware
Spyware
Adware
6. 1. VIRUS :
• Most common type of malware.
• Executes itself and spread by infecting other
programs or files.
2. Worms :
• Standalone malicious programs, replicates itself without any
interaction from the malware authors.
• Some worms act as delivery agents to install additional
malware.
7. 3. TROJANS :
4. RANSOMWARE :
• Ransomware encrypts files on a victim's system and
demands payment for their release.
• It Targets both individuals and organizations.
• Payments are often requested in cryptocurrency.
• It appear as a legitimate software program to gain access to
a system.
• Spreads by some form of social engineering.
• It hides a malicious code within legitimate software to try
and gain users' system access with their software.
8. 5. SPYWARE :
6. ADWARE :
• Also known as advertisement-supported software.
• Displays unwanted (and sometimes irritating) pop-up adverts
which can appear on your computer or mobile device.
• It can slow down system performance and compromise user
privacy.
• Designed to monitor and collect user information
without their knowledge.
• Tracks keystrokes, browsing habits, and sensitive
information.
• Can lead to identity theft and privacy breaches.
9. PROTECTION AGAINST MALWARE :
We can prevent malware with a variety of techniques. They are ;
• Install anti-malware software on your devices like (McAfee, Avast
Antivirus, Windows Defender, etc.
• Regularly back up important data to an external and secure location.
• Consider enabling features like "Safe Browsing" for additional protection.
• Keep Operating Systems Updated and use Strong Passwords.
• Keep yourself informed about the latest cybersecurity threats and best
practices.
10. CASE STUDY :
WANNACRY ???
• WannaCry is a type of malicious software called ransomware.
• It spread very quickly through the internet and affected computers running an old version of
Windows.
• It locked up the files, making them unusable and then asked for money (ransom) to unlock
the files.
• Hospitals, businesses, and regular people were affected. It caused a lot of trouble because
important files became inaccessible.
• Cybersecurity experts worked hard to find a way to stop WannaCry. They created a "kill
switch" that slowed it down.
• WannaCry highlighted the importance of timely software updates and the risks associated
with hoarding cybersecurity vulnerabilities.