0% found this document useful (0 votes)
72 views11 pages

Malicious Software: Meeting 5

Malicious software, also known as malware, includes viruses, worms, and Trojan horses. Viruses infect other files by overwriting, appending, or prepending their code. Worms replicate by creating copies of themselves and spread through networks without infecting files. Trojan horses appear to be benign programs but contain destructive code or features. Common types of Trojan horses include password stealers, keyloggers, and remote administrators. Antivirus software should be used to clean systems infected with malware.

Uploaded by

Faldy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views11 pages

Malicious Software: Meeting 5

Malicious software, also known as malware, includes viruses, worms, and Trojan horses. Viruses infect other files by overwriting, appending, or prepending their code. Worms replicate by creating copies of themselves and spread through networks without infecting files. Trojan horses appear to be benign programs but contain destructive code or features. Common types of Trojan horses include password stealers, keyloggers, and remote administrators. Antivirus software should be used to clean systems infected with malware.

Uploaded by

Faldy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Malicious Software

Meeting 5
Malicious Software
In computer world, there is also a software
which is created to do something bad and
to perform criminal intension. This kind of
software is called malicious software or
malware. Malicious software can bedivided
into some categories:
Virus
a.VIRUS
Virus is a software that can replicate by injecting or infecting its
own code into other file. By its way to infect other file, virus can
be divided into three categories:
Virus
1. Overwriting
A type of computer virus that will copy its own code
over the host computer system's file data, which
destroys the original program. After your computer
system has been cleaned using an antivirus
program, users will need to install the original
program again.
Virus
2. Appending
A virus that inserts a copy of its malicious
code at the end of the file. The goal of an
appending virus is not to harm the host
program, but to modify it to hold the virus
code and then be able to run itself.
Virus
3.Prepending
A virus defines the method it uses of infecting
files by adding their code to the beginning of the
file. By doing this, these viruses ensure that they
are activated when an infected file is used.
Worm
b. WORM
Worm is also a kind of malicious software. It is different from
virus which is worm can not inject of infect other files. A worm
is a software which replicates by creating its own copy. And
without infecting other file. Worm actually spreads through a
network or the Internet using email. Below is a sample of worm
called I Love You. Worm I Love You spreads through the
Internet as an email attachment.
Worm
Usually worm will do something tricky to cheat email
receiver. The first is using double file extension. At the left
sample, worm I Love You uses two extension, those are
TXT.VBS. The second trick is using social engineering. At
the above sample, the worm uses a name “I LOVE YOU”
which might interested to every email receiver. Who
doesn’t need love? So, the effect of these tricks are any
body –the email receiver- will click that attachment which
is actually a worm code.
Trojan
c. TROJAN HORSE
Trojan horse is derived from ancient Greek. Trojan Horse is
a program that looks like a good program but actually
contains destructive code or destructive feature. Trojan
horse is different from virus and worm, trojan horse can
not replicate and cannot infect other file.
Trojan
There are many kind of trojan horse. Below are some of
them:
a. Password stealer e. Remote monitoring
b. Keylogger f. Remote administrator, etc
c. Fake Program
d. Anonymous emailer
Exercises Meeting-5
1. What is the meaning Malicious Software ?
2. What is the meaning Virus ?
3. According to infect to other file, virus can be divided
into three categories, mentioned that and explain ?
4. What is the meaning Worm and give the examples ?
5. What is the meaning Trojan Horse and give the
examples ?
6. How to clean Virus, Malware, Worm, and Trojan
Horse ! ( with your own words)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy