SlideShare a Scribd company logo
Malicious Software 
Identification 
Presented By: 
Sandeep Kaur
What is Malicious Software? 
 Malware, short for malicious software, is software used to disrupt 
computer operation, gather sensitive information, or gain access to 
private computer systems. 
 It can appear in the form of code, scripts, active content, and other 
software. 
 In law , malware is sometimes known as a computer contaminant.
List of malware 
 Virus 
 Logic bomb 
 Trojan horse 
 Spyware 
 Backdoors
Virus 
 A Computer Virus is a program that can copy itself and infect a 
computer without the permission or knowledge of the user. 
 A Computer Virus has 2 major characteristics: the ability to replicate 
itself, and the ability to attach itself to another computer file. 
 Viruses can be transmitted as attachments to an e-mail note or in a 
downloaded file, or be present on a diskette or CD. 
 Two different types of viruses occur in PCs: 
boot sector viruses (BSV) & program viruses.
Logic bomb 
 one of oldest types of malicious software. 
 A logic bomb is a program that performs a malicious action as a 
result of a certain logic condition. 
 A logic bomb is programming code, inserted intentionally, that is 
designed to execute (or "explode") under circumstances such as 
the lapse of a certain amount of time or the failure of a program 
user to respond to a program command.
Trojan Horse 
 Trojan horse is any program that invites the user to run it, concealing 
harmful or malicious code. 
 The code may take effect immediately and can lead to many 
undesirable effects, such as deleting the user's files or installing 
additional harmful software. 
 Some Trojans allow people to take control of your computer so that 
they can send out spam e-mail (making it look as if it comes from 
you) or do other underhand things.
Spyware 
 Spyware is any technology that aids in gathering information about 
a person or organization without their knowledge. 
 On the Internet (where it is sometimes called a Spybot or tracking 
software), Spyware is programming that is put in someone's 
computer to secretly gather information about the user and relay it 
to advertisers or other interested parties. 
 Spyware can get in a computer as a software virus .
Spyware software payload 
1. Spyware engine infects 
a user’s computer. 
Computer user 
2. Spyware process collects 
keystrokes, passwords, 
and screen captures. 
3. Spyware process 
periodically sends 
collected data to 
spyware data collection 
agent. 
Spyware data collection agent
Backdoor 
 A backdoor, which is also sometimes called a trapdoor, is a hidden 
feature or command in a program that allows a user to perform 
actions he or she would not normally be allowed to do. 
 It is a method of gaining access to some part of a system other than 
by the normal procedure . 
 Hackers who successfully penetrate a system may insert trapdoors 
to allow them entry at a later date, even if the vulnerability that 
they originally exploited is closed. 
 have been commonly used by developers.
Malware attacks
What can I do? 
 Use only trusted software not pirated software. 
 Regularly take backup of the programs. 
 Use anti-virus software to detect and remove viruses. 
 Install firewall software, which hampers or prevents the functionality 
of worms and Trojan horses. 
 Make sure that the e-mail attachments are secure. 
 Do not keep a floppy disk in the drive when starting a program, 
unless sure that it does not include malicious software, else virus will 
be copied in the boot sector.
Can we remove virus without 
antivirus?
For check the virus: 
>dir c: s –h *.* /s /d 
For shortcut virus: 
Type “attrib –r –a –s –h /s /d (name of drive):/*.*” 
For delete: 
Delete autorun.inf 
On command prompt:
Anti-Malware Software
Thank you

More Related Content

PPTX
Trojans and backdoors
PPTX
trojan horse- malware(virus)
PPT
Trojan horse
PDF
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
DOCX
Logic bomb virus
PDF
The rise of malware(ransomware)
PDF
What is Ransomware?
PPTX
Hacking and Types of Hacker.
Trojans and backdoors
trojan horse- malware(virus)
Trojan horse
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Logic bomb virus
The rise of malware(ransomware)
What is Ransomware?
Hacking and Types of Hacker.

What's hot (20)

PPTX
Types of Hacker
PPTX
Malware Analysis
PPTX
Types of Cyber Attacks
PPTX
WannaCry / Wannacrypt Ransomware
PPT
DDoS Attacks
PPTX
Fundamentals of Network security
PDF
What is malware
PPTX
Ransomware attack
PDF
Vulnerability Assessment and Penetration Testing Report
PPTX
Ethical Hacking
PPTX
Firewall and Types of firewall
PPTX
Ransomware
PPTX
Malware & Anti-Malware
PDF
Network firewall function & benefits
PDF
Database forensics
PDF
Threat Hunting Procedures and Measurement Matrice
PPTX
Presentation_Malware Analysis.pptx
PPTX
PPTX
Ransomware
PPTX
Malware forensic
Types of Hacker
Malware Analysis
Types of Cyber Attacks
WannaCry / Wannacrypt Ransomware
DDoS Attacks
Fundamentals of Network security
What is malware
Ransomware attack
Vulnerability Assessment and Penetration Testing Report
Ethical Hacking
Firewall and Types of firewall
Ransomware
Malware & Anti-Malware
Network firewall function & benefits
Database forensics
Threat Hunting Procedures and Measurement Matrice
Presentation_Malware Analysis.pptx
Ransomware
Malware forensic
Ad

Similar to Malicious Software Identification (20)

PPTX
Computer virus
ODP
Computer Viruses & Management Strategies
PPTX
Computer-software (1).pptx
PPTX
viruses.pptx
PPTX
Malware part 1
PPTX
Types of malicious software and remedies
PDF
CS111-PART 7 (MALWARE).pdf
ODP
Viruses andthreats@dharmesh
PPTX
12 Malware very useful Presentation for others
ODP
Virus and antivirus final ppt
PPTX
MALWARE / VIRUS AND WORMS CHARACTERISTICS
PPTX
MALWARE UNIT II PPT .pptx ..The unit covers about virus and worms and its fu...
PPTX
Trojan horse
PPTX
malware ppt.pptx
PPTX
Final malacious softwares
PPT
list of Deception as well as detection techniques for maleware
ODP
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
PDF
Computer Virus Guide
Computer virus
Computer Viruses & Management Strategies
Computer-software (1).pptx
viruses.pptx
Malware part 1
Types of malicious software and remedies
CS111-PART 7 (MALWARE).pdf
Viruses andthreats@dharmesh
12 Malware very useful Presentation for others
Virus and antivirus final ppt
MALWARE / VIRUS AND WORMS CHARACTERISTICS
MALWARE UNIT II PPT .pptx ..The unit covers about virus and worms and its fu...
Trojan horse
malware ppt.pptx
Final malacious softwares
list of Deception as well as detection techniques for maleware
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Computer Virus Guide
Ad

Recently uploaded (20)

PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
Introduction to Information and Communication Technology
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
E -tech empowerment technologies PowerPoint
DOCX
Unit-3 cyber security network security of internet system
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Funds Management Learning Material for Beg
Design_with_Watersergyerge45hrbgre4top (1).ppt
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Introduction to cybersecurity and digital nettiquette
SASE Traffic Flow - ZTNA Connector-1.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Exploring VPS Hosting Trends for SMBs in 2025
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Tenda Login Guide: Access Your Router in 5 Easy Steps
Paper PDF World Game (s) Great Redesign.pdf
artificialintelligenceai1-copy-210604123353.pptx
Introduction to Information and Communication Technology
Unit-1 introduction to cyber security discuss about how to secure a system
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
E -tech empowerment technologies PowerPoint
Unit-3 cyber security network security of internet system
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Funds Management Learning Material for Beg

Malicious Software Identification

  • 1. Malicious Software Identification Presented By: Sandeep Kaur
  • 2. What is Malicious Software?  Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.  It can appear in the form of code, scripts, active content, and other software.  In law , malware is sometimes known as a computer contaminant.
  • 3. List of malware  Virus  Logic bomb  Trojan horse  Spyware  Backdoors
  • 4. Virus  A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.  A Computer Virus has 2 major characteristics: the ability to replicate itself, and the ability to attach itself to another computer file.  Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD.  Two different types of viruses occur in PCs: boot sector viruses (BSV) & program viruses.
  • 5. Logic bomb  one of oldest types of malicious software.  A logic bomb is a program that performs a malicious action as a result of a certain logic condition.  A logic bomb is programming code, inserted intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a program user to respond to a program command.
  • 6. Trojan Horse  Trojan horse is any program that invites the user to run it, concealing harmful or malicious code.  The code may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or installing additional harmful software.  Some Trojans allow people to take control of your computer so that they can send out spam e-mail (making it look as if it comes from you) or do other underhand things.
  • 7. Spyware  Spyware is any technology that aids in gathering information about a person or organization without their knowledge.  On the Internet (where it is sometimes called a Spybot or tracking software), Spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.  Spyware can get in a computer as a software virus .
  • 8. Spyware software payload 1. Spyware engine infects a user’s computer. Computer user 2. Spyware process collects keystrokes, passwords, and screen captures. 3. Spyware process periodically sends collected data to spyware data collection agent. Spyware data collection agent
  • 9. Backdoor  A backdoor, which is also sometimes called a trapdoor, is a hidden feature or command in a program that allows a user to perform actions he or she would not normally be allowed to do.  It is a method of gaining access to some part of a system other than by the normal procedure .  Hackers who successfully penetrate a system may insert trapdoors to allow them entry at a later date, even if the vulnerability that they originally exploited is closed.  have been commonly used by developers.
  • 11. What can I do?  Use only trusted software not pirated software.  Regularly take backup of the programs.  Use anti-virus software to detect and remove viruses.  Install firewall software, which hampers or prevents the functionality of worms and Trojan horses.  Make sure that the e-mail attachments are secure.  Do not keep a floppy disk in the drive when starting a program, unless sure that it does not include malicious software, else virus will be copied in the boot sector.
  • 12. Can we remove virus without antivirus?
  • 13. For check the virus: >dir c: s –h *.* /s /d For shortcut virus: Type “attrib –r –a –s –h /s /d (name of drive):/*.*” For delete: Delete autorun.inf On command prompt:

Editor's Notes

  • #10: It is a method of gaining access to some part of a system other than by the normal procedure (e.g. gaining access without having to supply a password).