SlideShare a Scribd company logo
CS111: INTRODUCTION TO COMPUTING
SOURCE: CISCO.COM
WHAT IS MALWARE?
Malware, short for “malicious software”, refers
to any intrusive software developed by
cybercriminals (often called “hackers”) to steal
data and damage or destroy computers and
computer systems.
Examples of common malware include viruses,
worms, Trojan viruses, spyware, adware, and
ransomware.
Recent malware attacks have exfiltrated data in
mass amounts.
HOW DO WE PROTECT
THE NETWORK
AGAINST MALWARE?
Typically, businesses focus on
preventative tools to stop
breaches.
By securing the perimeter,
businesses assume they are safe.
Some advanced malware, however,
will eventually make their way into
your network.
As a result, it is crucial to deploy
technologies that continually
monitor and detect malware that
has evaded perimeter defenses.
Sufficient advanced malware
protection requires multiple layers
of safeguards along with high-level
network visibility and intelligence.
HOW DO WE DETECT
AND RESPOND TO
MALWARE?
Malware will inevitably
penetrate your network.
You must have defenses
that provide significant
visibility and breach
detection.
In order to remove
malware, you must be able
to identify malicious actors
quickly.
This requires constant
network scanning.
Once the threat is
identified, you must
remove the malware from
your network.
Today's antivirus products
are not enough to protect
against advanced cyber
threats.
WHAT ARE THE
TYPES OF MALWARE?
Malware detection is crucial with
malware's prevalence on the
Internet because it functions as an
early warning system for the
computer secure regarding malware
and cyber attacks.
It keeps hackers out of the computer
and prevents the information from
getting compromised.
VIRUS
Viruses are a subgroup of malware.
A virus is malicious software attached
to a document or file that supports
macros to execute its code and spread
from host to host.
Once downloaded, the virus will lay
dormant until the file is opened and
in use.
Viruses are designed to disrupt a
system’s ability to operate.
As a result, viruses can cause
significant operational issues and
data loss.
WORMS
Worms are a malicious software that
rapidly replicates and spreads to any
device within the network.
Unlike viruses, worms do not need
host programs to disseminate.
A worm infects a device via a
downloaded file or a network
connection before it multiplies and
disperses at an exponential rate.
Like viruses, worms can severely
disrupt the operations of a device
and cause data loss.
TROJAN VIRUS
Trojan viruses are disguised as
helpful software programs.
But once the user downloads it, the
Trojan virus can gain access to
sensitive data and then modify,
block, or delete the data.
This can be extremely harmful to
the performance of the device.
Unlike normal viruses and worms,
Trojan viruses are not designed to
self-replicate.
SPYWARE
Spyware is a malicious software
that runs secretly on a computer
and reports back to a remote user.
Rather than simply disrupting a
device’s operations, spyware
targets sensitive information and
can grant remote access to
predators.
Spyware is often used to steal financial or
personal information.
A specific type of spyware is a keylogger,
which records your keystrokes to reveal
passwords and personal information.
ADWARE
Adware is malicious software used
to collect data on your computer
usage and provide appropriate
advertisements to you.
While adware is not always
dangerous, in some cases adware
can cause issues for your system.
Adware can redirect your browser
to unsafe sites, and it can even
contain Trojan horses and spyware.
Additionally, significant levels of
adware can slow down your
system noticeably.
Because not all adware is
malicious, it is important to have
protection that constantly and
intelligently scans these programs.
RANSOMWARE
Ransomware is malicious software
that gains access to sensitive
information within a system,
encrypts that information so that
the user cannot access it, and then
demands a financial payout for the
data to be released.
Ransomware is commonly part of a
phishing scam.
By clicking a disguised link, the
user downloads the ransomware.
The attacker proceeds to encrypt
specific information that can only
be opened by a mathematical key
they know.
When the attacker receives
payment, the data is unlocked.
FILELESS
MALWARE
Fileless malware is a type of
memory-resident malware.
As the term suggests, it is malware
that operates from a victim’s
computer’s memory, not from files
on the hard drive.
Because there are no files to scan,
it is harder to detect than
traditional malware.
It also makes forensics more
difficult because the malware
disappears when the victim
computer is rebooted.
In late 2017, the Cisco Talos threat
intelligence team posted an
example of fileless malware that
they called DNSMessenger.
CS111-PART 7 (MALWARE).pdf
Some viruses are sneaky and can infect your system without you
ever knowing.
Knowing the symptoms of a virus can help you save your
computer before it's too late.
Look for slow computer performance, erratic computer behavior,
unexplained data loss, or frequent system crashes.

More Related Content

PPTX
Malware ppt final.pptx
PPTX
Computer-software (1).pptx
ODP
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
ODP
Viruses andthreats@dharmesh
PPTX
malware ppt.pptx
PPTX
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
Malware ppt final.pptx
Computer-software (1).pptx
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Viruses andthreats@dharmesh
malware ppt.pptx
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf

Similar to CS111-PART 7 (MALWARE).pdf (20)

PPTX
SECURITY THREATS.pptx SECURITY THREATS.pptx
PPTX
12 Malware very useful Presentation for others
PPTX
computer virus ppt.pptx
PPTX
lecture-11-30052022-103626am.pptx
PPTX
Computer virus
ODP
Virus and antivirus final ppt
PDF
Computer Virus Guide
PPTX
Computer virus
PPTX
NETWORK SECURITY THREATS - POWERPOINT PRESENTATION
PPTX
Computer-vIRUS-malicious software and worm.pptx
PPT
Anti virus and current trends
PPTX
How to Protect your PC from Malware
PPTX
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
PDF
Malware and malicious programs
PPTX
Computer virus
ODP
Computer Viruses & Management Strategies
PPTX
3rd week holiday homework class 10*.pptx
PPTX
PPTX
MALWARE AND ITS TYPES
PPTX
computer virus full explain ppt.pptx
SECURITY THREATS.pptx SECURITY THREATS.pptx
12 Malware very useful Presentation for others
computer virus ppt.pptx
lecture-11-30052022-103626am.pptx
Computer virus
Virus and antivirus final ppt
Computer Virus Guide
Computer virus
NETWORK SECURITY THREATS - POWERPOINT PRESENTATION
Computer-vIRUS-malicious software and worm.pptx
Anti virus and current trends
How to Protect your PC from Malware
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
Malware and malicious programs
Computer virus
Computer Viruses & Management Strategies
3rd week holiday homework class 10*.pptx
MALWARE AND ITS TYPES
computer virus full explain ppt.pptx
Ad

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Computing-Curriculum for Schools in Ghana
PDF
Complications of Minimal Access Surgery at WLH
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Classroom Observation Tools for Teachers
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Lesson notes of climatology university.
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Anesthesia in Laparoscopic Surgery in India
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Microbial diseases, their pathogenesis and prophylaxis
Computing-Curriculum for Schools in Ghana
Complications of Minimal Access Surgery at WLH
Module 4: Burden of Disease Tutorial Slides S2 2025
Orientation - ARALprogram of Deped to the Parents.pptx
01-Introduction-to-Information-Management.pdf
Supply Chain Operations Speaking Notes -ICLT Program
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Classroom Observation Tools for Teachers
Paper A Mock Exam 9_ Attempt review.pdf.
Lesson notes of climatology university.
History, Philosophy and sociology of education (1).pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Ad

CS111-PART 7 (MALWARE).pdf

  • 1. CS111: INTRODUCTION TO COMPUTING SOURCE: CISCO.COM
  • 3. Malware, short for “malicious software”, refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware. Recent malware attacks have exfiltrated data in mass amounts.
  • 4. HOW DO WE PROTECT THE NETWORK AGAINST MALWARE?
  • 5. Typically, businesses focus on preventative tools to stop breaches. By securing the perimeter, businesses assume they are safe. Some advanced malware, however, will eventually make their way into your network.
  • 6. As a result, it is crucial to deploy technologies that continually monitor and detect malware that has evaded perimeter defenses. Sufficient advanced malware protection requires multiple layers of safeguards along with high-level network visibility and intelligence.
  • 7. HOW DO WE DETECT AND RESPOND TO MALWARE?
  • 8. Malware will inevitably penetrate your network. You must have defenses that provide significant visibility and breach detection. In order to remove malware, you must be able to identify malicious actors quickly.
  • 9. This requires constant network scanning. Once the threat is identified, you must remove the malware from your network. Today's antivirus products are not enough to protect against advanced cyber threats.
  • 10. WHAT ARE THE TYPES OF MALWARE?
  • 11. Malware detection is crucial with malware's prevalence on the Internet because it functions as an early warning system for the computer secure regarding malware and cyber attacks. It keeps hackers out of the computer and prevents the information from getting compromised.
  • 12. VIRUS
  • 13. Viruses are a subgroup of malware. A virus is malicious software attached to a document or file that supports macros to execute its code and spread from host to host.
  • 14. Once downloaded, the virus will lay dormant until the file is opened and in use. Viruses are designed to disrupt a system’s ability to operate. As a result, viruses can cause significant operational issues and data loss.
  • 15. WORMS
  • 16. Worms are a malicious software that rapidly replicates and spreads to any device within the network. Unlike viruses, worms do not need host programs to disseminate.
  • 17. A worm infects a device via a downloaded file or a network connection before it multiplies and disperses at an exponential rate. Like viruses, worms can severely disrupt the operations of a device and cause data loss.
  • 19. Trojan viruses are disguised as helpful software programs. But once the user downloads it, the Trojan virus can gain access to sensitive data and then modify, block, or delete the data.
  • 20. This can be extremely harmful to the performance of the device. Unlike normal viruses and worms, Trojan viruses are not designed to self-replicate.
  • 22. Spyware is a malicious software that runs secretly on a computer and reports back to a remote user. Rather than simply disrupting a device’s operations, spyware targets sensitive information and can grant remote access to predators.
  • 23. Spyware is often used to steal financial or personal information. A specific type of spyware is a keylogger, which records your keystrokes to reveal passwords and personal information.
  • 25. Adware is malicious software used to collect data on your computer usage and provide appropriate advertisements to you. While adware is not always dangerous, in some cases adware can cause issues for your system.
  • 26. Adware can redirect your browser to unsafe sites, and it can even contain Trojan horses and spyware. Additionally, significant levels of adware can slow down your system noticeably. Because not all adware is malicious, it is important to have protection that constantly and intelligently scans these programs.
  • 28. Ransomware is malicious software that gains access to sensitive information within a system, encrypts that information so that the user cannot access it, and then demands a financial payout for the data to be released. Ransomware is commonly part of a phishing scam.
  • 29. By clicking a disguised link, the user downloads the ransomware. The attacker proceeds to encrypt specific information that can only be opened by a mathematical key they know. When the attacker receives payment, the data is unlocked.
  • 31. Fileless malware is a type of memory-resident malware. As the term suggests, it is malware that operates from a victim’s computer’s memory, not from files on the hard drive. Because there are no files to scan, it is harder to detect than traditional malware.
  • 32. It also makes forensics more difficult because the malware disappears when the victim computer is rebooted. In late 2017, the Cisco Talos threat intelligence team posted an example of fileless malware that they called DNSMessenger.
  • 34. Some viruses are sneaky and can infect your system without you ever knowing. Knowing the symptoms of a virus can help you save your computer before it's too late. Look for slow computer performance, erratic computer behavior, unexplained data loss, or frequent system crashes.