Presentation is loading. Please wait.

Presentation is loading. Please wait.

Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari027354 Hazira Hamiza

Similar presentations


Presentation on theme: "Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari027354 Hazira Hamiza"— Presentation transcript:

1 Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari027354 Hazira Hamiza Mustapa@Mustapha026980

2

3 Malware (malicious software), is software used to:  disrupt computer operation  gather sensitive information  gain access to private computer systems.

4 It can appear in the form of :  Code  Scripts  active content  other software.

5  In US law, malware = computer contaminant  Malware is different from defective software:  It is legitimate software but contains harmful bugs  some disguised as genuine software

6  Today, malware is used to:  steal sensitive information of personal, financial, or business importance by black hat hackers with harmful intentions.  used broadly against government or corporate websites  used against individuals to gain personal information

7  2 categories: 1) Dependent (those that need a host program). 2) Independent.

8  Parasitic: fragments of programs that cannot exist independently of some actual application program  Examples: Viruses, logic bombs, and backdoors.

9  It is a self-contained program  that can be scheduled and run by the operating system.  Examples: Worms and bot programs.

10

11  the use of electronic messaging systems to send unsolicited bulk messages (example: advertising) indiscriminately.

12  instant messaging spam  Usenet newsgroup spam  Web search engine spam  spam in blogs, wiki spam  online classified ads spam  mobile phone messaging spam  Internet forum spam  junk fax transmissions  social networking spam  social spam  television advertising and file sharing spam

13

14  standalone malware computer program that replicates itself in order to spread to other computers.

15  Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.  Unlike a computer virus, it does not need to attach itself to an existing program.

16

17  a type of malware that replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive

18  often perform some type of harmful activity on infected hosts, such as : stealing hard disk space or CPU time accessing private information corrupting data displaying political or humorous messages spamming their contacts logging their keystrokes.

19  However, not all viruses carry a destructive payload or attempt to hide  they are self-replicating computer programs which install themselves without the user's consent

20  http://en.wikipedia.org/wiki/Malware  http://en.wikipedia.org/wiki/Spam_(elec tronic)  http://en.wikipedia.org/wiki/Computer_ worm  http://en.wikipedia.org/wiki/Computer_ virus

21


Download ppt "Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari027354 Hazira Hamiza"

Similar presentations


Ads by Google