SlideShare a Scribd company logo
HARMFUL SOFTWARE
Malware and Virus
Software and Computer
 Software is an inseparable component of the computer
 Different types of software have made our work easy
BUT…
Some software that are very harmful for our system and data
Malware
 Combination of two words
Malicious + Software
Software written and developed to create mischief or hurt the user
Various types:
 Virus
 Trojan Horse
 Worms
 Rootkits
 Backdoors
 Ransomware
 Spyware
 Adware
 Sacreware
Purpose of Malware
 In the beginning Malware was written for purpose of
experiments.
 Sometimes, it was also written as a joke.
 With advancement in technology, it is being used with
more intensions:
 Steal Personal informations
 Obtain bank account details and credit card details.
 Disturb activities
 Take control of users computer for illegal activities
 Send email spams
 Advertise products
Symptoms of presence of Malware
 Unexplained messages start appearing on the screen
 Some files deleted on their own.
 Keyboard does not work properly
 Unexplained problems occur while printing files
 Making system unusable/ crashing of the system
 Slowing down of your system
 Automatic rebooting/restarting
 Data on the system becomes inaccessible
 Random playing of strange sounds
Types of Malware
1. Virus
 The term ‘VIRUS’ was first used by John Von Neumann in 1949
 A computer virus is nothing but an electronic version of ‘Biological virus’
Vital
Information
Resource
Under
Siege
 When enters the computer, it replicates itself and cause infection.
CREEPER is widely acclaimed as
the first virus on ARPANET
(First version of Internet)
Types of Viruses
 File Infector Virus: This virus attacks executable files of the computer.
 This virus either deletes or damages files.
 Eg: Sunday, Invader, Cascade
 Boot Sector Virus: Infects the boot sector of hard disk
 Either copies boot sector instructions present in hard disk to some other
location or overwrites these instructions
 Eg: Disk Killer, stone Virus
 Macro Virus: Infects the macro files of MS Office files
 Difficult to detect(They enter the system as a part of office file and appear
non-suspesious)
 Eg: Nuclear, DMV
2. Trojan Horses
 These are ordinary looking files but are actually programs
that delete/ corrupt files.
 They are transferred as innocent attachments to an email.
 They do not replicate themselves.
 They are usually written with the intention of stealing
data.
 These are used to take unauthorized access and control of
infected system.
 Eg: PC-Write (First Trojan Horse in cyber history)
The Trojan Horse can:
 Crash the computer
 Corrupt user data
 Format HD
 Make unauthorized transfer of data/electronic money
 Modify/delete data
 Unnecessary download or upload files
 Control computer remotely
3. Worms
 Viruses are transferred from one system to another as an
attachment to a file or a program.
 Worms can spread on their own. (Do not need the support
of another file)
 Worms are designed only to spread from one computer to
another.
 NOT TO CAUSE CHANGES IN DATA OF THE SYSTEMS.
 Some worms cause problem of increased network traffic.
 Eg: Red Code, Slammer worm, Storm
4. Backdoors
 When you log into a computer system, it asks for the user
name and password
 Backdoor malware has been designed to bypass this
process
 It can get installed to a computer with/without the
knowledge of the user.
 Eg: Subseven, NetBus, Award BIOS
5.Rootkit
 Rootkit is a special type of malware that gives
administrative rights to use the computer.
 Unlike other malware, they are not harmful.
 They are simply cover other malware, gain entry to the
computer and then attack the computer using other
malware like virus, Trojan etc.
 Eg: Back Orifice
6.Spyware
 Spyware is a type of malware that does not
corrupt the computer
 It is designed to collect personal information
about an individual/ organization.
 It is designed to collect informations like web
visiting history of the user
 advertisement start appearing according to
the web visiting history
 Some spyware designed to download unwanted
softwares/files form internet.
 It does not multiply
Symptoms of spyware infected systems:
 Performance of the computer has started
decreasing.
 The free space in the computer HD has
decreased on its own.
 Huge network traffic
 Applications installed on the computer
started closing in their own.
 User has started facing difficulty in
connecting to the computer.
Check your knowledge:
 Macros present in ……………………….. File.
 Ans: Office file
 Malware is written and developed to
create…………… or ………………….. The user.
 Ans: Mischief or Hurt
 ………………… collects information about an
individual or an organization.
 Ans:Spyware
 ………………………. Is considered as the first Trojan
Horse in cyber history
 Ans:PC-write
 …………………….. Is widely acclaimed as the first
virus on ARPANET
 Creeper

More Related Content

PPT
Trojan horse nitish nagar
PPT
Itc lec 15 Computer security risks
PPTX
PPTX
Introductio to Virus
PPTX
Computer Malware and its types
PDF
How To Protect From Malware
PPT
Introduction to Malware
PPTX
Computer Virus
Trojan horse nitish nagar
Itc lec 15 Computer security risks
Introductio to Virus
Computer Malware and its types
How To Protect From Malware
Introduction to Malware
Computer Virus

What's hot (20)

DOCX
Computer virus
PPTX
Computer virus
PPT
Malware
PPT
Presentation on computer viruses
PPTX
Computer virus & its cure
PPT
Trojan horse
DOCX
Computer virus (Microsoft Word)
PPTX
Presentation on computer virus
PPTX
Virus
PPT
Computer virus
PPTX
Computer virus
PPTX
computer virus and related legal issues
PPTX
Malware- Types, Detection and Future
PPTX
presentation on computer virus
PPT
Computer Malware
PPTX
Computer viruses
PPTX
Computer viruses
PPTX
Ppt123
PPT
Computer Virus
DOCX
Computer viruses by joy chakraborty
Computer virus
Computer virus
Malware
Presentation on computer viruses
Computer virus & its cure
Trojan horse
Computer virus (Microsoft Word)
Presentation on computer virus
Virus
Computer virus
Computer virus
computer virus and related legal issues
Malware- Types, Detection and Future
presentation on computer virus
Computer Malware
Computer viruses
Computer viruses
Ppt123
Computer Virus
Computer viruses by joy chakraborty
Ad

Similar to Harmful software (20)

PPTX
MALWARE AND ITS TYPES
PPTX
Final malacious softwares
PPS
Virus & Computer security threats
PPS
Computer Security threat
PPTX
computer virus ppt.pptx
ODP
Viruses andthreats@dharmesh
PPTX
Computer Virus ICT 402.pptx
PPT
list of Deception as well as detection techniques for maleware
PPTX
SECURITY THREATS AND SAFETY MEASURES
PPTX
MALWARE
PPTX
All about computer malwares
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPTX
Dickmaster
PPTX
Type of Malware and its different analysis and its types !
PPTX
PPTX
Computervirus
PPTX
Computer virus
PPTX
Computer virus (Microsoft Powerpoint)
PPTX
Security & Privacy - Lecture B
MALWARE AND ITS TYPES
Final malacious softwares
Virus & Computer security threats
Computer Security threat
computer virus ppt.pptx
Viruses andthreats@dharmesh
Computer Virus ICT 402.pptx
list of Deception as well as detection techniques for maleware
SECURITY THREATS AND SAFETY MEASURES
MALWARE
All about computer malwares
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Dickmaster
Type of Malware and its different analysis and its types !
Computervirus
Computer virus
Computer virus (Microsoft Powerpoint)
Security & Privacy - Lecture B
Ad

Recently uploaded (20)

PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Trump Administration's workforce development strategy
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
Classroom Observation Tools for Teachers
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Hazard Identification & Risk Assessment .pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
advance database management system book.pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Empowerment Technology for Senior High School Guide
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Final Presentation General Medicine 03-08-2024.pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Trump Administration's workforce development strategy
Unit 4 Skeletal System.ppt.pptxopresentatiom
Classroom Observation Tools for Teachers
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Indian roads congress 037 - 2012 Flexible pavement
Hazard Identification & Risk Assessment .pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
advance database management system book.pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
History, Philosophy and sociology of education (1).pptx
1_English_Language_Set_2.pdf probationary
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Empowerment Technology for Senior High School Guide
Final Presentation General Medicine 03-08-2024.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Final Presentation General Medicine 03-08-2024.pptx

Harmful software

  • 2. Software and Computer  Software is an inseparable component of the computer  Different types of software have made our work easy BUT… Some software that are very harmful for our system and data
  • 3. Malware  Combination of two words Malicious + Software Software written and developed to create mischief or hurt the user Various types:  Virus  Trojan Horse  Worms  Rootkits  Backdoors  Ransomware  Spyware  Adware  Sacreware
  • 4. Purpose of Malware  In the beginning Malware was written for purpose of experiments.  Sometimes, it was also written as a joke.  With advancement in technology, it is being used with more intensions:  Steal Personal informations  Obtain bank account details and credit card details.  Disturb activities  Take control of users computer for illegal activities  Send email spams  Advertise products
  • 5. Symptoms of presence of Malware  Unexplained messages start appearing on the screen  Some files deleted on their own.  Keyboard does not work properly  Unexplained problems occur while printing files  Making system unusable/ crashing of the system  Slowing down of your system  Automatic rebooting/restarting  Data on the system becomes inaccessible  Random playing of strange sounds
  • 6. Types of Malware 1. Virus  The term ‘VIRUS’ was first used by John Von Neumann in 1949  A computer virus is nothing but an electronic version of ‘Biological virus’ Vital Information Resource Under Siege  When enters the computer, it replicates itself and cause infection. CREEPER is widely acclaimed as the first virus on ARPANET (First version of Internet)
  • 7. Types of Viruses  File Infector Virus: This virus attacks executable files of the computer.  This virus either deletes or damages files.  Eg: Sunday, Invader, Cascade  Boot Sector Virus: Infects the boot sector of hard disk  Either copies boot sector instructions present in hard disk to some other location or overwrites these instructions  Eg: Disk Killer, stone Virus  Macro Virus: Infects the macro files of MS Office files  Difficult to detect(They enter the system as a part of office file and appear non-suspesious)  Eg: Nuclear, DMV
  • 8. 2. Trojan Horses  These are ordinary looking files but are actually programs that delete/ corrupt files.  They are transferred as innocent attachments to an email.  They do not replicate themselves.  They are usually written with the intention of stealing data.  These are used to take unauthorized access and control of infected system.  Eg: PC-Write (First Trojan Horse in cyber history)
  • 9. The Trojan Horse can:  Crash the computer  Corrupt user data  Format HD  Make unauthorized transfer of data/electronic money  Modify/delete data  Unnecessary download or upload files  Control computer remotely
  • 10. 3. Worms  Viruses are transferred from one system to another as an attachment to a file or a program.  Worms can spread on their own. (Do not need the support of another file)  Worms are designed only to spread from one computer to another.  NOT TO CAUSE CHANGES IN DATA OF THE SYSTEMS.  Some worms cause problem of increased network traffic.  Eg: Red Code, Slammer worm, Storm
  • 11. 4. Backdoors  When you log into a computer system, it asks for the user name and password  Backdoor malware has been designed to bypass this process  It can get installed to a computer with/without the knowledge of the user.  Eg: Subseven, NetBus, Award BIOS
  • 12. 5.Rootkit  Rootkit is a special type of malware that gives administrative rights to use the computer.  Unlike other malware, they are not harmful.  They are simply cover other malware, gain entry to the computer and then attack the computer using other malware like virus, Trojan etc.  Eg: Back Orifice
  • 13. 6.Spyware  Spyware is a type of malware that does not corrupt the computer  It is designed to collect personal information about an individual/ organization.  It is designed to collect informations like web visiting history of the user  advertisement start appearing according to the web visiting history  Some spyware designed to download unwanted softwares/files form internet.  It does not multiply
  • 14. Symptoms of spyware infected systems:  Performance of the computer has started decreasing.  The free space in the computer HD has decreased on its own.  Huge network traffic  Applications installed on the computer started closing in their own.  User has started facing difficulty in connecting to the computer.
  • 15. Check your knowledge:  Macros present in ……………………….. File.  Ans: Office file  Malware is written and developed to create…………… or ………………….. The user.  Ans: Mischief or Hurt  ………………… collects information about an individual or an organization.  Ans:Spyware  ………………………. Is considered as the first Trojan Horse in cyber history  Ans:PC-write  …………………….. Is widely acclaimed as the first virus on ARPANET  Creeper