1 of 21

Computer Malware

CB/VII/2021

1 of 21

Subject: Computer Studies

Grade: VII

Topic: Computer Malware

2 of 21

WHAT IS A COMPUTER MALWARE?

  • Software used to disrupt the working of a computer system
  • combination of two words : malicious software
  • can be in the form of a
    • code
    • script
    • executable file or
    • link or a file sent over an email

Computer Malware

CB/VII/2021

2 of 21

3 of 21

Types of Malware�

Computer Malware

CB/VII/2021

3 of 21

4 of 21

Computer Virus

A computer virus is a program which when executed, replicates (creates copies of itself) and infects all the other files of the computer .

Computer Malware

CB/VII/2021

4 of 21

5 of 21

Computer Virus

Computer Malware

CB/VII/2021

5 of 21

6 of 21

WORMS

  • It infects a computer and then replicates itself from one system to the other without the help of its original file.
  • Can be sent email or instant messages
  • Spreads without a trigger or human

interaction

Computer Malware

CB/VII/2021

6 of 21

7 of 21

TROJAN HORSE

  • A Trojan horse is a malicious program in disguise.
  • It appears to perform a useful function and tricks a user into installing it.
  • Can be disguised as an
    • Antivirus software
    • Drawing or Gaming application

Computer Malware

CB/VII/2021

7 of 21

8 of 21

Adware

  • displays advertisements in the form of pop-ups or windows that cannot be closed
  • collects your browsing history information without your permission
  • redirects user to web pages that contain product promotions

Computer Malware

CB/VII/2021

8 of 21

9 of 21

Spyware

  • aims to spy by keeping track of the user’s internet activities.
  • affects computer performance by
  • installing additional software
  • redirecting web browser searches
  • changing computer settings
  • reducing connection speed
  • changing homepage
  • disrupting network connection ability

Computer Malware

CB/VII/2021

9 of 21

10 of 21

Ransomware

  • blocks users access to confidential or sensitive information stored on his computer
  • encrypts files stored on the hard drive or locks the computer system
  • used to threaten the victim to publish his sensitive information on his computer online or delete it until the ransom is paid

Computer Malware

CB/VII/2021

10 of 21

11 of 21

Rootkit

  • provides access to different areas of an operating system
  • allows the entry of other types of malware into the system
  • works in the background so that the user is unable to identify any kind of suspicious activity in his system

Computer Malware

CB/VII/2021

11 of 21

12 of 21

Symptoms of a malware attack

  • speed of the system reduces
  • constantly receiving annoying ads
  • files become bigger in size, reducing disk space
  • existing files get modified or damaged
  • system frequently hangs, crashes or restarts

Computer Malware

CB/VII/2021

12 of 21

13 of 21

Symptoms of a malware attack

  • existing files get modified or damaged
  • sudden increase in system’s internet activity
  • homepage of browser changes without permission
  • new toolbars, extensions or plugins pop up on your browser
  • antivirus stops working or gets disabled

Computer Malware

CB/VII/2021

13 of 21

14 of 21

Anti Malware

  • used to prevent, detect and remove malware

Computer Malware

CB/VII/2021

14 of 21

15 of 21

Antivirus Software�

Computer Malware

CB/VII/2021

15 of 21

16 of 21

Anti Spyware Program

Computer Malware

CB/VII/2021

16 of 21

17 of 21

Anti Spam Program

Computer Malware

CB/VII/2021

17 of 21

18 of 21

Firewall and Intrusion Detection System

Computer Malware

CB/VII/2021

18 of 21

19 of 21

Prevention against Malware

  • Install and update anti-malware software
  • Keep your OS, network, desktop and device software up to date
  • Do not use open Wi-Fi networks for financial transactions
  • Avoid installing programs from unknown sources
  • Never double an email attachment that contains an executable file(.exe)

Computer Malware

CB/VII/2021

19 of 21

20 of 21

Prevention against Malware

  • Use email programs that have built-in spam filters
  • Take regular backups to avoid data loss
  • Scan pen drives, CD’s before copying data from them
  • Avoid using same password for multiple accounts
  • Use a combination of Uppercase, Lowercase, numbers and special characters to create strong passwords

Computer Malware

CB/VII/2021

20 of 21

21 of 21

Thank You!

Computer Malware

CB/VII/2021

21 of 21