TYPES OF ATTACK (PART 3)
MALWARE Part 1
Prof. Neeraj Bhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Sciences
MDS University Ajmer, Rajasthan
What is Malware?
It’s a malicious code or program planted on our computer by an attacker
to gain control over our computer, network, and data –without our
knowledge for causes harm.
Malware is short for MALicious softWARE and a generic term covering a
range of software programs, and types of programs designed to attack,
degrade or prevent the intended use of computer whether it is a virus,
worms, Trojan Horse, Logic Bomb, Cookies, Adware, Spyware, Crimeware,
Spam, Trapdoor, Keyloggers etc.
Types of Malware
COMPUTER VIRUS
A computer virus is a type of malicious code or program
written to alter the way a computer operates and is designed
to spread from one computer to another. A virus operates by
inserting or attaching itself to a legitimate program or
document that supports macros in order to execute its code.
In the process, a virus has the potential to cause unexpected
or damaging effects, such as harming the system software by
corrupting or destroying data.
COMPUTER WORM
A computer worm is a type of malware that spreads
copies of itself from computer to computer. A worm
can replicate itself without any human interaction,
and it does not need to attach itself to a software
program in order to cause damage.
Trojan Horse
• A Trojan horse or Trojan is a type of malware that is often
disguised as legitimate software. Trojans can be employed by
cyber-thieves and hackers trying to gain access to users'
systems. Users are typically tricked by some form of social
engineering into loading and executing Trojans on their
systems. Once activated, Trojans can enable cyber-criminals to
spy on you, steal your sensitive data, and gain backdoor
access to your system. These actions can include: Deleting
data , Blocking data, Modifying data, Copying data, Disrupting
the performance of computers or computer networks.
Logic Bomb
• A Logic Bomb is a piece of often-malicious code that is
intentionally inserted into software. It is activated upon
the host network only when certain conditions are
met.
• A logic bomb is a malicious program that is triggered
when a logical condition is met, such as after a number
of transactions have been processed, or on a specific
date or time, on removal of file, and so on . Malware
such as worms often contain logic bombs, behaving in
one manner, and then changing tactics on a specific
date and time.
COOKIES
• A computer “cookie” is more formally known as an HTTP cookie, a
web cookie, an Internet cookie or a browser cookie.
• The purpose of the computer cookie is to help the website keep
track of your visits and activity. This isn’t always a bad thing. For
example, many online retailers use cookies to keep track of the
items in a user’s shopping cart as they explore the site. Without
cookies, your shopping cart would reset to zero every time you
clicked a new link on the site. That would make it difficult to buy
anything online!
• A website might also use cookies to keep a record of your most
recent visit or to record your login information. Many people find
this useful so that they can store passwords on frequently used
sites, or simply so they know what they have visited or downloaded
in the past.
SPYWARE
• Spyware is loosely defined as malicious software designed to
enter your computer device, gather data about you, and
forward it to a third-party without your consent.
• Spyware can also refer to legitimate software that monitors
your data for commercial purposes like advertising. However,
malicious spyware is explicitly used to profit from stolen data.
• Whether legitimate or based in fraud, spyware’s surveillance
activity leaves you open to data breaches and misuse of your
private data. Spyware also affects network and device
performance, slowing down daily user activities.
ADWARE
Adware, or also called advertising supported software, is software that
displays unwanted advertisements on your computer. Adware programs
will tend to serve you pop-up ads, can change your browser’s homepage,
add spyware and just bombard your device with advertisements. Adware
is a more succinct name for potentially unwanted programs.
• Adware uses the browser to collect your web browsing history in order to
’target’ advertisements that seem tailored to your interests. At their most
innocuous, adware infections are just annoying. For example, adware
barrages you with pop-up ads that can make your Internet experience
markedly slower and more labor intensive.
• How to tell if you have an Adware infection
 Slow computer
 Bombarded with Ads
 Constant crashing
 Browser homepage changes

More Related Content

PPT
Spyware report
PPTX
Spyware
PPTX
spyware
PPTX
spyware
PPTX
Internet Security in Web 2.0
PPTX
Malware
Spyware report
Spyware
spyware
spyware
Internet Security in Web 2.0
Malware

What's hot (20)

PPTX
Ethical hacking trojans, worms and spyware
PPT
Spyware
PPT
Spyware
PPTX
Ethical hacking introduction to ethical hacking
PPT
spyware
PPTX
PACE-IT, Security+3.1: Types of Malware
PPT
S P Y W A R E4 S I K
PPTX
Spyware presentation by mangesh wadibhasme
PPTX
Spyware risk it's time to get smart
PPT
System-Security-acit-Institute
PPTX
Ethical hacking anti virus
PPTX
Spyware and key loggers
PPTX
Spyware, spying software, computer spying
PPTX
Type of Malware and its different analysis and its types !
PPT
Aiman
PPTX
Spyware by Sahibe Alam
PPTX
Introduction to Malwares
PDF
What is a malware attack?
PDF
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
PPT
P R I V A C Y!!!
Ethical hacking trojans, worms and spyware
Spyware
Spyware
Ethical hacking introduction to ethical hacking
spyware
PACE-IT, Security+3.1: Types of Malware
S P Y W A R E4 S I K
Spyware presentation by mangesh wadibhasme
Spyware risk it's time to get smart
System-Security-acit-Institute
Ethical hacking anti virus
Spyware and key loggers
Spyware, spying software, computer spying
Type of Malware and its different analysis and its types !
Aiman
Spyware by Sahibe Alam
Introduction to Malwares
What is a malware attack?
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
P R I V A C Y!!!
Ad

Similar to Types of attack -Part3 (Malware Part -1) (20)

PPTX
Spyware-A online threat to privacy
PPTX
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
PPTX
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
PPTX
Malware ppt final.pptx
PPT
CyberSecurity presentation for basic knowledge about this topic
PPT
Ch # 10 computer security risks and safe guards
PPTX
NETWORK SECURITY THREATS - POWERPOINT PRESENTATION
PPTX
viruses.pptx
PPTX
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
PPTX
Cybersecurity Training
PPTX
Malware, Hacker Techniques, and Wireshark.pptx
PPTX
CYBER SAFETY COMP PPT.pptx
PPTX
Computer virus
PPTX
Computer security ethics_and_privacy
PPTX
Malware program by mohsin ali dahar khairpur
PPT
Computer Securityyyyyyyy - Chapter 2.ppt
PPTX
Types of Malware (CEH v11)
DOCX
Chapter 10.0
PPTX
Computer Virus ppt.pptx
PPTX
SECURITY THREATS.pptx SECURITY THREATS.pptx
Spyware-A online threat to privacy
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
Malware ppt final.pptx
CyberSecurity presentation for basic knowledge about this topic
Ch # 10 computer security risks and safe guards
NETWORK SECURITY THREATS - POWERPOINT PRESENTATION
viruses.pptx
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
Cybersecurity Training
Malware, Hacker Techniques, and Wireshark.pptx
CYBER SAFETY COMP PPT.pptx
Computer virus
Computer security ethics_and_privacy
Malware program by mohsin ali dahar khairpur
Computer Securityyyyyyyy - Chapter 2.ppt
Types of Malware (CEH v11)
Chapter 10.0
Computer Virus ppt.pptx
SECURITY THREATS.pptx SECURITY THREATS.pptx
Ad

More from SHUBHA CHATURVEDI (20)

PPT
Shell and its types in LINUX
PPT
Unix and its Components
PPT
Linux Advantages and Disadvantages
PPT
Linux Features
PPT
Architecture of Linux
PPT
Introduction and history of linux
PPTX
Block Cipher and Operation Modes
PPT
Block Cipher and its Design Principles
POTX
Stream Ciphers
PPT
Symmetric Key Algorithm
PPTX
Product Cipher
PPTX
Transposition cipher techniques
PPTX
Polygraphic Substitution Cipher - Part 2
PPTX
Polygraphic Substitution Cipher -Part 1
PPT
Homophonic Substitution Cipher
PPT
Polyalphabetic Substitution Cipher
PPT
Monoalphabetic Substitution Cipher
PPT
Classical encryption techniques
PPT
Types of attack -Part3 (Malware Part -2)
PPT
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
Shell and its types in LINUX
Unix and its Components
Linux Advantages and Disadvantages
Linux Features
Architecture of Linux
Introduction and history of linux
Block Cipher and Operation Modes
Block Cipher and its Design Principles
Stream Ciphers
Symmetric Key Algorithm
Product Cipher
Transposition cipher techniques
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher -Part 1
Homophonic Substitution Cipher
Polyalphabetic Substitution Cipher
Monoalphabetic Substitution Cipher
Classical encryption techniques
Types of attack -Part3 (Malware Part -2)
CLASSICAL ENCRYPTION TECHNIQUE- PART 1

Recently uploaded (20)

PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
Climate Change and Its Global Impact.pptx
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
English Textual Question & Ans (12th Class).pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
HVAC Specification 2024 according to central public works department
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
Complications of Minimal Access-Surgery.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
FORM 1 BIOLOGY MIND MAPS and their schemes
Climate Change and Its Global Impact.pptx
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Journal of Dental Science - UDMY (2021).pdf
English Textual Question & Ans (12th Class).pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
Empowerment Technology for Senior High School Guide
HVAC Specification 2024 according to central public works department
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Complications of Minimal Access-Surgery.pdf

Types of attack -Part3 (Malware Part -1)

  • 1. TYPES OF ATTACK (PART 3) MALWARE Part 1 Prof. Neeraj Bhargava Mrs. Shubha Chaturvedi Department of Computer Science, School of Engineering & System Sciences MDS University Ajmer, Rajasthan
  • 2. What is Malware? It’s a malicious code or program planted on our computer by an attacker to gain control over our computer, network, and data –without our knowledge for causes harm. Malware is short for MALicious softWARE and a generic term covering a range of software programs, and types of programs designed to attack, degrade or prevent the intended use of computer whether it is a virus, worms, Trojan Horse, Logic Bomb, Cookies, Adware, Spyware, Crimeware, Spam, Trapdoor, Keyloggers etc.
  • 4. COMPUTER VIRUS A computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.
  • 5. COMPUTER WORM A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  • 6. Trojan Horse • A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include: Deleting data , Blocking data, Modifying data, Copying data, Disrupting the performance of computers or computer networks.
  • 7. Logic Bomb • A Logic Bomb is a piece of often-malicious code that is intentionally inserted into software. It is activated upon the host network only when certain conditions are met. • A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date or time, on removal of file, and so on . Malware such as worms often contain logic bombs, behaving in one manner, and then changing tactics on a specific date and time.
  • 8. COOKIES • A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie or a browser cookie. • The purpose of the computer cookie is to help the website keep track of your visits and activity. This isn’t always a bad thing. For example, many online retailers use cookies to keep track of the items in a user’s shopping cart as they explore the site. Without cookies, your shopping cart would reset to zero every time you clicked a new link on the site. That would make it difficult to buy anything online! • A website might also use cookies to keep a record of your most recent visit or to record your login information. Many people find this useful so that they can store passwords on frequently used sites, or simply so they know what they have visited or downloaded in the past.
  • 9. SPYWARE • Spyware is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. • Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising. However, malicious spyware is explicitly used to profit from stolen data. • Whether legitimate or based in fraud, spyware’s surveillance activity leaves you open to data breaches and misuse of your private data. Spyware also affects network and device performance, slowing down daily user activities.
  • 10. ADWARE Adware, or also called advertising supported software, is software that displays unwanted advertisements on your computer. Adware programs will tend to serve you pop-up ads, can change your browser’s homepage, add spyware and just bombard your device with advertisements. Adware is a more succinct name for potentially unwanted programs. • Adware uses the browser to collect your web browsing history in order to ’target’ advertisements that seem tailored to your interests. At their most innocuous, adware infections are just annoying. For example, adware barrages you with pop-up ads that can make your Internet experience markedly slower and more labor intensive. • How to tell if you have an Adware infection  Slow computer  Bombarded with Ads  Constant crashing  Browser homepage changes