CSMA PPT 2101714029
CSMA PPT 2101714029
malware
K.Harshitha
2101714029
MALWARE
• Malware, short for malicious software,
refers to any software specifically
designed to harm or exploit devices,
networks, or data. Malware is a broad
term that encompasses various types of
malicious software, each with its own
unique characteristics and purposes.
some common types of malware
1.Viruses 6. Adware
2. Worms 7.Rootkits
3. Trojan Horses 8. Keyloggers
4. Ransomware 9. Fileless Malware
5. Spyware 10.Botnets
1. Viruses:
These are programs that can replicate themselves by attaching to
other programs or files.
They often spread through infected files and can be triggered when
the infected file is executed.
2. Worms:
Worms are standalone programs that can replicate and spread
across networks without the need for a host file.
They can exploit vulnerabilities in operating systems or software to
propagate.
3. Trojan Horses:
Trojans disguise themselves as legitimate software but contain
malicious code.
Trojans do not replicate on their own but can be just as destructive
by providing unauthorized access to a system.
4.Ransomware:
Ransomware encrypts a user's files and demands a ransom,
usually in cryptocurrency, for the decryption key.
It can spread through malicious email attachments, infected
websites, or other means.
5.Spyware:
Spyware is designed to spy on the user's activities without their
knowledge.
It can collect sensitive information, such as login credentials,
browsing habits, or personal data, and send it to a remote server.
6.Adware:
Adware displays unwanted advertisements on a user's device.
While not as malicious as some other types of malware, it can be
annoying and may compromise system performance.
7.Rootkits:
Rootkits are designed to hide the existence of malware on a
system.
They often modify the operating system to conceal their
presence and make it difficult for antivirus software to detect
and remove them.
8.Keyloggers:
Keyloggers record keystrokes on a computer, capturing
sensitive information such as passwords and credit card
numbers.
9.Fileless Malware:
Fileless malware operates in memory and does not rely on
traditional files.
It can be more challenging to detect because it leaves little
or no footprint on the system's storage.
10.Botnets:
Botnets are networks of
infected computers (bots)
that are controlled remotely
by a single entity, usually
for malicious purposes.
These can be used for DDoS
attacks, spam distribution,
or other coordinated
attacks.
THANK YOU