0% found this document useful (0 votes)
50 views8 pages

CSMA PPT 2101714029

Malware refers to malicious software designed to harm devices, networks, or data. The document defines malware and lists 10 common types: viruses, worms, Trojan horses, ransomware, spyware, adware, rootkits, keyloggers, fileless malware, and botnets. It provides a brief 1-2 sentence description of each type, explaining how they infect systems and what harmful actions they perform like encrypting files, collecting personal data, displaying ads, and forming botnets to launch attacks.

Uploaded by

kharshitha176
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views8 pages

CSMA PPT 2101714029

Malware refers to malicious software designed to harm devices, networks, or data. The document defines malware and lists 10 common types: viruses, worms, Trojan horses, ransomware, spyware, adware, rootkits, keyloggers, fileless malware, and botnets. It provides a brief 1-2 sentence description of each type, explaining how they infect systems and what harmful actions they perform like encrypting files, collecting personal data, displaying ads, and forming botnets to launch attacks.

Uploaded by

kharshitha176
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

What is

malware
K.Harshitha
2101714029
MALWARE
• Malware, short for malicious software,
refers to any software specifically
designed to harm or exploit devices,
networks, or data. Malware is a broad
term that encompasses various types of
malicious software, each with its own
unique characteristics and purposes.
some common types of malware

1.Viruses 6. Adware
2. Worms 7.Rootkits
3. Trojan Horses 8. Keyloggers
4. Ransomware 9. Fileless Malware
5. Spyware 10.Botnets
1. Viruses:
 These are programs that can replicate themselves by attaching to
other programs or files.
 They often spread through infected files and can be triggered when
the infected file is executed.
2. Worms:
 Worms are standalone programs that can replicate and spread
across networks without the need for a host file.
 They can exploit vulnerabilities in operating systems or software to
propagate.
3. Trojan Horses:
 Trojans disguise themselves as legitimate software but contain
malicious code.
 Trojans do not replicate on their own but can be just as destructive
by providing unauthorized access to a system.
4.Ransomware:
 Ransomware encrypts a user's files and demands a ransom,
usually in cryptocurrency, for the decryption key.
 It can spread through malicious email attachments, infected
websites, or other means.
5.Spyware:
 Spyware is designed to spy on the user's activities without their
knowledge.
 It can collect sensitive information, such as login credentials,
browsing habits, or personal data, and send it to a remote server.
6.Adware:
 Adware displays unwanted advertisements on a user's device.
 While not as malicious as some other types of malware, it can be
annoying and may compromise system performance.
7.Rootkits:
 Rootkits are designed to hide the existence of malware on a
system.
 They often modify the operating system to conceal their
presence and make it difficult for antivirus software to detect
and remove them.
8.Keyloggers:
 Keyloggers record keystrokes on a computer, capturing
sensitive information such as passwords and credit card
numbers.
9.Fileless Malware:
 Fileless malware operates in memory and does not rely on
traditional files.
 It can be more challenging to detect because it leaves little
or no footprint on the system's storage.
10.Botnets:
 Botnets are networks of
infected computers (bots)
that are controlled remotely
by a single entity, usually
for malicious purposes.
 These can be used for DDoS
attacks, spam distribution,
or other coordinated
attacks.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy