SlideShare a Scribd company logo
Types, differences & prevention
Malware, short for Malicious Software is any
software used to
 Disrupt computer operation
 Gather sensitive information
 Gain access to private computer systems
 Spyware
 Adware
 Keyboard logger
 Ransom ware
 Rogue software & scare ware
 Viruses
 Trojan horses
 Worms
A software program that monitors your
computer usage without your knowledge and
can
 Eat up system resources
 Affect performance
 Steal confidential data
 Keep track of what websites you visit
A program that delivers targeted advertising
content to users often by gathering information
from a user’s computer about what the user
does online and which websites are visited.
Adware can
 Change your homepage
 Flood your screen with multiple pop-up ads
 Install tool bars in your browser
 Read cookies installed on your computer
 A program that keeps track of every
keystroke that you type at your computer.
 Can gain access to your passwords, account
numbers, credit card numbers and other
personal data.
Applications that use unethical marketing
practices to trick users into paying for and
downloading worthless or malicious software
pretending as computer security software.
 They display a bogus message announcing
that your computer has been infected with
spyware
 Message is formatted to display as if it was
coming from your own security software
Malware used in cybercrime
A form of malware in which user’s files are
encrypted or the system is disabled if the
ransom is not paid.
“Ransom” consists of
 Sending a premium SMS text message
 A wired transfer
 Online payment voucher services
 The digital currency ‘bitcoin’
Ransomware can:
 Encrypt text files, Word documents, PDF’s,
JPG picture files
 Display false notices in the name of law
enforcement agencies that your system had
been used in illegal activities
 Imitate Windows product activation notices
 Could be an empty threat
Malware used in cybercrime
 Is a malware program that installs without
user’s consent
 Is attached to an executable file
 Replicates by inserting copies of itself into
other programs, data files etc.
A virus can
 Steal hard disk space or CPU time
 Access private information
 Corrupt data
 A non-self-replicating type of malware
 Looks legitimate (in the form of a music/
movie/game file)
 Act as a backdoor, contacting a controller
which can have unauthorized access to the
affected computer
 Standalone malware computer program
 Does not need to attach itself to an existing
program
 Replicates itself to spread to other computers
over a network
 Using genuine operating system and keeping
it up to date
 Regularly update everything installed on your
computer
 Use a good anti-virus and anti-spyware
software
 Use a built-in or third party firewall
 Uninstall toolbars, plug-ins and other
software that you don’t use
 Don’t open email attachments or downloaded
files without verifying their source
 Be wary of clicking links in emails and while
browsing
 Be alert to fake virus warnings, often within
web browser windows, that encourage you to
download, install or purchase unfamiliar
software
 Heed warnings from web browsers, search
engines and security products
Thank You

More Related Content

PPT
ISDD Hacking and Viruses
PPT
Security Software
PPT
ISDD - Security Risks
PPT
ISDD Security Precautions
PPT
Computer Malware
PPT
Introduction to Malware
PPTX
Ethical hacking trojans, worms and spyware
PPTX
Ethical hacking introduction to ethical hacking
ISDD Hacking and Viruses
Security Software
ISDD - Security Risks
ISDD Security Precautions
Computer Malware
Introduction to Malware
Ethical hacking trojans, worms and spyware
Ethical hacking introduction to ethical hacking

What's hot (20)

PPTX
Computer Security
PPTX
Ppt123
PPTX
Ethical hacking anti virus
PDF
How To Protect From Malware
PPTX
Types of malware
PPTX
All about computer malwares
PPT
spyware
PPTX
Harmful software
PPTX
Computer Malware and its types
PPT
Spyware
PPTX
Ch 3 computer malware ppt
PDF
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
PPTX
Impact on IT system breaches
PPT
Trojan horse nitish nagar
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
Firewall
PPT
How To Protect Your Computer
PPT
Malware
PPTX
IT viruses
Computer Security
Ppt123
Ethical hacking anti virus
How To Protect From Malware
Types of malware
All about computer malwares
spyware
Harmful software
Computer Malware and its types
Spyware
Ch 3 computer malware ppt
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Impact on IT system breaches
Trojan horse nitish nagar
PACE-IT, Security+3.1: Types of Malware
Firewall
How To Protect Your Computer
Malware
IT viruses
Ad

Viewers also liked (20)

PPT
Execution plan
PPT
Vm i falun 2
PPTX
Internet of things
PPTX
Solfã¶rmã¶rkelse gotd
PPTX
Skuggpinne i tiden
PPT
Fã¤rgglad byggsten lego - utan bilder
PPTX
Rocka sockorna
PPTX
Retno dwi ganda
PPTX
Loren
PDF
Academic records
PPTX
Minecraft
PDF
Connecting Youth for Change (CYC)
PPT
Cristmas carts alejandro
PPT
Majblomman gotd5
PDF
mazlee_mamat Resume 14082015
PDF
eng. Amr Mousa CV full
DOC
ReSuMe-IGMM5
PPTX
Les nouveaux métiers du web (Formathèque 2014)
PPT
Hetvägg
PDF
project_portfolio_20130912
Execution plan
Vm i falun 2
Internet of things
Solfã¶rmã¶rkelse gotd
Skuggpinne i tiden
Fã¤rgglad byggsten lego - utan bilder
Rocka sockorna
Retno dwi ganda
Loren
Academic records
Minecraft
Connecting Youth for Change (CYC)
Cristmas carts alejandro
Majblomman gotd5
mazlee_mamat Resume 14082015
eng. Amr Mousa CV full
ReSuMe-IGMM5
Les nouveaux métiers du web (Formathèque 2014)
Hetvägg
project_portfolio_20130912
Ad

Similar to Malware used in cybercrime (20)

PPTX
MALWARE AND ITS TYPES
PPTX
Computer-software (1).pptx
PPTX
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
PPTX
PDF
CS111-PART 7 (MALWARE).pdf
PPTX
Security & Privacy - Lecture B
PPTX
security issues
PDF
Week3-CyberSecurity 8th Semester important.pdf
PDF
Online Safety - Malwares
PPTX
Malware ppt final.pptx
PPSX
Security Awareness Training
PPTX
malware ppt.pptx
PPTX
MALWARE
PPTX
12 Malware very useful Presentation for others
PPTX
CSC103 Digital Security
PPTX
Virus and malware presentation
PPTX
lecture-11-30052022-103626am.pptx
PDF
Computer viruses
PPTX
Computer security
PPTX
Information Technology - System Threats
MALWARE AND ITS TYPES
Computer-software (1).pptx
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
CS111-PART 7 (MALWARE).pdf
Security & Privacy - Lecture B
security issues
Week3-CyberSecurity 8th Semester important.pdf
Online Safety - Malwares
Malware ppt final.pptx
Security Awareness Training
malware ppt.pptx
MALWARE
12 Malware very useful Presentation for others
CSC103 Digital Security
Virus and malware presentation
lecture-11-30052022-103626am.pptx
Computer viruses
Computer security
Information Technology - System Threats

Recently uploaded (20)

PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
artificialintelligenceai1-copy-210604123353.pptx
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PDF
Course Overview and Agenda cloud security
PPTX
Database Information System - Management Information System
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
Cyber Hygine IN organizations in MSME or
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
t_and_OpenAI_Combined_two_pressentations
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Alethe Consulting Corporate Profile and Solution Aproach
Mathew Digital SEO Checklist Guidlines 2025
Layers_of_the_Earth_Grade7.pptx class by
AI_Cyberattack_Solutions AI AI AI AI .pptx
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
artificialintelligenceai1-copy-210604123353.pptx
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
Course Overview and Agenda cloud security
Database Information System - Management Information System
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Cyber Hygine IN organizations in MSME or
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Exploring The Internet Of Things(IOT).ppt
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
t_and_OpenAI_Combined_two_pressentations

Malware used in cybercrime

  • 1. Types, differences & prevention
  • 2. Malware, short for Malicious Software is any software used to  Disrupt computer operation  Gather sensitive information  Gain access to private computer systems
  • 3.  Spyware  Adware  Keyboard logger  Ransom ware  Rogue software & scare ware  Viruses  Trojan horses  Worms
  • 4. A software program that monitors your computer usage without your knowledge and can  Eat up system resources  Affect performance  Steal confidential data  Keep track of what websites you visit
  • 5. A program that delivers targeted advertising content to users often by gathering information from a user’s computer about what the user does online and which websites are visited.
  • 6. Adware can  Change your homepage  Flood your screen with multiple pop-up ads  Install tool bars in your browser  Read cookies installed on your computer
  • 7.  A program that keeps track of every keystroke that you type at your computer.  Can gain access to your passwords, account numbers, credit card numbers and other personal data.
  • 8. Applications that use unethical marketing practices to trick users into paying for and downloading worthless or malicious software pretending as computer security software.  They display a bogus message announcing that your computer has been infected with spyware  Message is formatted to display as if it was coming from your own security software
  • 10. A form of malware in which user’s files are encrypted or the system is disabled if the ransom is not paid. “Ransom” consists of  Sending a premium SMS text message  A wired transfer  Online payment voucher services  The digital currency ‘bitcoin’
  • 11. Ransomware can:  Encrypt text files, Word documents, PDF’s, JPG picture files  Display false notices in the name of law enforcement agencies that your system had been used in illegal activities  Imitate Windows product activation notices  Could be an empty threat
  • 13.  Is a malware program that installs without user’s consent  Is attached to an executable file  Replicates by inserting copies of itself into other programs, data files etc. A virus can  Steal hard disk space or CPU time  Access private information  Corrupt data
  • 14.  A non-self-replicating type of malware  Looks legitimate (in the form of a music/ movie/game file)  Act as a backdoor, contacting a controller which can have unauthorized access to the affected computer
  • 15.  Standalone malware computer program  Does not need to attach itself to an existing program  Replicates itself to spread to other computers over a network
  • 16.  Using genuine operating system and keeping it up to date  Regularly update everything installed on your computer  Use a good anti-virus and anti-spyware software  Use a built-in or third party firewall  Uninstall toolbars, plug-ins and other software that you don’t use
  • 17.  Don’t open email attachments or downloaded files without verifying their source  Be wary of clicking links in emails and while browsing  Be alert to fake virus warnings, often within web browser windows, that encourage you to download, install or purchase unfamiliar software  Heed warnings from web browsers, search engines and security products