Malware is malicious software installed without a user's consent that can harm devices. There are many types like viruses, worms, trojans, and spyware. Malware can steal or encrypt data, monitor users, and hijack systems. Famous incidents include WannaCry ransomware which infected over 200,000 systems globally in 2017, and the Mirai botnet launched a massive DDoS attack the same year. Users can mitigate malware by keeping software updated, being wary of links and attachments, using trusted devices only, and backing up files regularly.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
113 views5 pages
Malware Tutorial 1 (AKASH & SANGA)
Malware is malicious software installed without a user's consent that can harm devices. There are many types like viruses, worms, trojans, and spyware. Malware can steal or encrypt data, monitor users, and hijack systems. Famous incidents include WannaCry ransomware which infected over 200,000 systems globally in 2017, and the Mirai botnet launched a massive DDoS attack the same year. Users can mitigate malware by keeping software updated, being wary of links and attachments, using trusted devices only, and backing up files regularly.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5
MALWARE
Malicious software installed in user’s electronic device without their
knowledge in different ways. TYPES OF MALWARE Viruses - It spreads itself inserting into other programs. Worms - It is a self replicating malware that duplicates itself before spreading. Trojan horses -They look like legitimate software and the user is tricked by social engineering. Spyware -It spy's or monitor user’s private activities without their permission. RAT(Remote Access Tool) –Malware as with a backdoor entry with administrative rights. Adware -They are usually pop up ads in a user’s browser or an un-closable window. Bots -It self propagate and connect back to central servers. WHAT DO THEY DO?
Steal, encrypt or delete sensitive data.
Alter or hijack core computing functions. Monitor a user’s activity without their permission. A malware tricks the user to install a software which has malicious code built into it. MALWARE INCIDENT’S WannaCry Ransomware: It is one of the most famous malware that caused a huge damage for 4 days until a solution was found to stop it. It was an epidemic that knocked out more than 200,000 computers in over 150 countries and even forced factories to shut down production until the situation was resolved. Mirai Botnet: It’s an incident where all the Internet of Things (IoT) devices with infected malware all together targeted a DNS service provider DYN with multiple requests causing a massive DDoS attack and causing the services to fail. MITIGATION FOR MALWARE Keep software’s up-to-date. Be aware of links and attachments in mail. Watch out for malicious or compromised websites and pirated material in websites. Don't attach infected or unknown removable devices. Backup files. Follow the 3-2-1 rule: make 3 copies, store in at least 2 locations, with at least 1 offline copy. Do not use untrusted devices to log on to email, social media, and corporate accounts. Make sure the company policy covers for the loss occurred Always have a response plan and make sure the employees are aware of it.