Presentation Cyber Security
Presentation Cyber Security
Malware:
Malware is malicious software and refers to any software that is designed to cause harm to
computer systems, networks, or users. Malware can take many forms. Individuals and
organizations need to be aware of the different types of malware and take steps to protect
their systems, such as using antivirus software, keeping software and systems up-to-date,
and being cautious when opening email attachments or downloading software from the
internet.
What is Malware?
Malware is soft and ware that gets into the system without user consent to steal the user’s
private confidential data, including bank details and passwords. They also generate
annoying pop-up ads and change system settings.
What Does Malware Do?
Malware is designed to harm and exploit your computer or network. It can steal sensitive
information like passwords and credit card numbers, disrupt your system’s operations, and
even allow attackers to gain unauthorized access to your device. Some types of malware, such
as ransomware, encrypt your files and demand payment to unlock them, while spyware
monitors your activities and sends the information back to the attacker. Additionally, malware
can spread to other devices on the same network, making it a significant threat. Protecting
your devices with up-to-date antivirus software and being cautious about your open links and
attachments can help mitigate these risks.
Why Do Cybercriminals Use Malware?
Cybercriminals (bad people on the internet) use malware (bad software) for different bad reasons.
Here’s what they do with it:
1. To trick people and steal personal information
They send fake messages or create fake websites to make you give them your:
Name
Passwords
ID numbers
Then they use your information to pretend to be you (this is called identity theft).
2. To steal money or credit card details
They use malware to get into your bank account or credit card info, and then they use it to
steal your money.
3. To control many computers and attack websites
They can take over many computers at once and use them to attack other websites.
This is called a Denial-of-Service (DoS) attack, which makes a website crash or stop working.
4. To secretly use your computer to make cryptocurrency
They install malware that uses your computer to create digital money like Bitcoin, without you
knowing.
Types of Malware
Virus:
A computer virus is a type of malicious software (malware) that
attaches itself to clean files or programs and spreads when that
file or program is run. It can corrupt, delete, or steal data, and
sometimes damage system functions.
✅ Protection Against Viruses:
Use reliable antivirus software and keep it updated.
Don’t open suspicious emails or unknown attachments.
Keep your system and applications updated with the latest
security patches.
Avoid downloading pirated software or files from untrusted
websites.
Regularly back up your data to recover in case of infection.
Worm:
A worm is a type of malware that replicates itself and spreads across networks without
needing to attach to files or programs. It can slow down systems, consume bandwidth, and
create backdoors for hackers.
✅ Protection Against Worms:
Use a firewall to block unauthorized network access.
Install security updates for your operating system and software.
Use strong, unique passwords for your devices and networks.
Scan USBs and external drives before opening them.
Monitor network activity for unusual traffic or behavior.
Cyber Attack Life Cycle:-
The Cyber Attack Life Cycle is a framework that outlines the stages
an attacker goes through to execute a successful cyber attack. It
typically includes stages such as reconnaissance (gathering
information about the target), weaponization (creating malicious
payloads), delivery (sending the payload to the target), exploitation
(exploiting vulnerabilities), installation (installing malware or
backdoors), command and control (establishing communication
with the compromised system), and execution (carrying out the
attack’s objectives). Understanding this cycle helps organizations
identify and mitigate threats at each stage.
stages of a cyber security attack: