SlideShare a Scribd company logo
• A malicious software
• Any kind of unwanted program.
• Installs without your consent on your PC.
• It includes virus, worms, trojans, rootkits,
backdoor.
•It is created by people to intentionally
damage computers.
 To partially control the user’s PC
 To track the user’s activity
 To capture important data, financial details
 To commit fraud
 To blackmail and ask for
ransom
1) Trojan horse
 A malicious program that is disguised as useful and legitimate software.
2) Virus
 Self-replicating program that spreads by inserting copies of itself into other
executable code or documents.
3) Worm
 Self-replicating program, similar to virus, but is self-contained (does not
need to be part of another program). Spreads by exploiting service
vulnerabilities.
4) Backdoor
 Software that allows access to a computer system bypassing the normal
authentication procedures.
5) Rootkit
 A stealthy type of software, typically malicious, designed to hide the
existence of certain processes or programs from normal methods of
detection.
 They generally spread via email attachments and
internet downloads.
 They run without you being aware about them.
 It can damage your software, hardware and files.
 They both multiply and spread themselves to other
computers to cause damage.
How are Trojans and
Worms different?
 Trojans get into your PC via a program and then cause
damage, whereas a worm gets into your PC via email
and cause damage or effect functioning by multiplying.
 Never open an email from an unknown user.
 Do not click on email links until you are completely
aware about what it contains.
 Use a good anti-virus and Antispyware software and
keep it up to date.
 Update your PC regularly.
 Do not install without knowing.
 Antivirus software is a computer program that detects,
prevents, and takes action to disinfect or remove
malicious software programs, such as viruses and
worms.
Thank You

More Related Content

PPTX
Malware and it's types
PPTX
Types of malware
PPTX
Computer Malware and its types
PDF
What is malware
PDF
Malware and security
PPTX
computer virus ppt.pptx
PDF
How To Protect From Malware
Malware and it's types
Types of malware
Computer Malware and its types
What is malware
Malware and security
computer virus ppt.pptx
How To Protect From Malware

What's hot (20)

PPT
Trojan horse nitish nagar
PPTX
Viruses notes
PPTX
Security Pp Cis
PPTX
Ethical hacking introduction to ethical hacking
PPT
Malware
PPTX
PPTX
Ethical hacking trojans, worms and spyware
PPT
Virus
PPTX
PPTX
Ppt123
PPT
Antivirus!!
PPTX
Adware
PPTX
PPT
Ict Assignment
PPS
introduction to malwares,virus,trojan horse
PPT
Computer Malware
PDF
Know More about Your Enemies
PPTX
MALWARE
PPTX
Ethical hacking anti virus
PPT
Viruses, Worms And Trojan Horses
Trojan horse nitish nagar
Viruses notes
Security Pp Cis
Ethical hacking introduction to ethical hacking
Malware
Ethical hacking trojans, worms and spyware
Virus
Ppt123
Antivirus!!
Adware
Ict Assignment
introduction to malwares,virus,trojan horse
Computer Malware
Know More about Your Enemies
MALWARE
Ethical hacking anti virus
Viruses, Worms And Trojan Horses
Ad

Similar to All about computer malwares (20)

PPS
Virus & Computer security threats
PPS
Computer Security threat
PPTX
Harmful software
PPTX
Final malacious softwares
PPTX
Internet Security
PPTX
How to Protect your PC from Malware
PPTX
Computer viruses
PPTX
Computer virus
PPTX
MALWARE AND ITS TYPES
PPTX
SECURITY THREATS AND SAFETY MEASURES
PPTX
Computer virus (Microsoft Powerpoint)
PPTX
Computervirus
PPTX
Computer virus
PPTX
Social impacts of it
PPT
Internet Security
PPTX
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
PPTX
Computer Viruses
PPTX
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
PPTX
Computer virus & its cure
Virus & Computer security threats
Computer Security threat
Harmful software
Final malacious softwares
Internet Security
How to Protect your PC from Malware
Computer viruses
Computer virus
MALWARE AND ITS TYPES
SECURITY THREATS AND SAFETY MEASURES
Computer virus (Microsoft Powerpoint)
Computervirus
Computer virus
Social impacts of it
Internet Security
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
Computer Viruses
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
Computer virus & its cure
Ad

Recently uploaded (20)

PPTX
Funds Management Learning Material for Beg
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Testing WebRTC applications at scale.pdf
PDF
Introduction to the IoT system, how the IoT system works
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
Funds Management Learning Material for Beg
Unit-1 introduction to cyber security discuss about how to secure a system
Testing WebRTC applications at scale.pdf
Introduction to the IoT system, how the IoT system works
Tenda Login Guide: Access Your Router in 5 Easy Steps
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Introuction about ICD -10 and ICD-11 PPT.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Slides PPTX World Game (s) Eco Economic Epochs.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Cloud-Scale Log Monitoring _ Datadog.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Paper PDF World Game (s) Great Redesign.pdf
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Slides PDF The World Game (s) Eco Economic Epochs.pdf
presentation_pfe-universite-molay-seltan.pptx

All about computer malwares

  • 1. • A malicious software • Any kind of unwanted program. • Installs without your consent on your PC. • It includes virus, worms, trojans, rootkits, backdoor. •It is created by people to intentionally damage computers.
  • 2.  To partially control the user’s PC  To track the user’s activity  To capture important data, financial details  To commit fraud  To blackmail and ask for ransom
  • 3. 1) Trojan horse  A malicious program that is disguised as useful and legitimate software. 2) Virus  Self-replicating program that spreads by inserting copies of itself into other executable code or documents. 3) Worm  Self-replicating program, similar to virus, but is self-contained (does not need to be part of another program). Spreads by exploiting service vulnerabilities. 4) Backdoor  Software that allows access to a computer system bypassing the normal authentication procedures. 5) Rootkit  A stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection.
  • 4.  They generally spread via email attachments and internet downloads.  They run without you being aware about them.  It can damage your software, hardware and files.
  • 5.  They both multiply and spread themselves to other computers to cause damage. How are Trojans and Worms different?  Trojans get into your PC via a program and then cause damage, whereas a worm gets into your PC via email and cause damage or effect functioning by multiplying.
  • 6.  Never open an email from an unknown user.  Do not click on email links until you are completely aware about what it contains.  Use a good anti-virus and Antispyware software and keep it up to date.  Update your PC regularly.  Do not install without knowing.
  • 7.  Antivirus software is a computer program that detects, prevents, and takes action to disinfect or remove malicious software programs, such as viruses and worms.