1 / 20

What Is Malware? | Malware Explained | What Is Malware And It's Types? | Malware

In this presentation on what is malware? we will get to understand malware explained, what are malware and its types? We will also know specifically about viruses and trojans, their operation process, types of malicious programs, and how to prevent a malware attack. Through this, we can protect our system from getting infected with malware programs.<br><br>The topics covered in this malware, virus, and trojan presentation are:<br>1. What Is Malware?<br>2. Virus vs Trojan: Introduction<br>3. Virus vs Trojan: Functioning<br>4. Virus vs Trojan: Types<br>5. Virus vs Trojan: Detecting Methods<br>

Simplilearn
Télécharger la présentation

What Is Malware? | Malware Explained | What Is Malware And It's Types? | Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What’sin It for You? What Is Malware? Virus vs Trojan: Introduction Virus vs Trojan: Functioning Virus vs Trojan: Types Virus vs Trojan: Detecting Methods Virus vs Trojan: Preventive Measures

  2. Created to attack critical information in the targeted system. Malware is malicious software that is programmed to cause damage to a computer system, network, and hardware devices. What Is Malware? Also to steal money from the target through illegal means.

  3. Click here to watch the video

  4. Virus vs Trojan: Introduction

  5. Virus Trojan Horse A computer virus is a form of a computer program that replicates itself on execution. They alter different computer programs by attaching its own code. Trojan looks like certified software but harms the system on installation.They create a backdoor in the system, and through this the hacker steals our information. Introduction

  6. Virus vs Trojan: Functioning

  7. Trojan Horse Virus Program Functioning The program contains a search routine, to locate new files or data to infect in the system. Falling for phishing attacks or other social sites attachments or visiting uncertified websites. The program also contains a copy routine, to copy itself into the targeted file by search routine. Embedded in software or executable files and create unauthorised access.

  8. Virus vs Trojan: Types

  9. Trojan Horse Virus Types of Program Back-Door Trojan Boot Sector Virus Macro Virus Cryxos Trojan Direct Action virus Ransom Trojan

  10. Question Time! What could be the reason behind his system’s problem? Macro Virus Ransom Trojan Back-door Trojan Jake was denied access to his system, and he couldn’t control the data and information in his system.

  11. Detecting Methods

  12. Trojan Horse Virus Detecting Methods Frequent system crashes, and slowing down of system. The system applications and operations starts to slow down. In case of a virus attack, the program steals our login details and sensitive data. Increasing random pop-ups affecting the system. The virus attacks lead to frequent system crashes. Changes in the installation of unrecognised application.

  13. Famous Cyber Attacks

  14. Trojan Horse Virus The MyDoom virus is a type of malicious program that was sighted in the year 2004. Designed to send spam emails and create a backdoor in the system, which affected over 50 million systems. The Emotettrojan is a famous trojan malware defined by the U.S. Department of Homeland Security, specifically designed to perform financial theft. Famous Attacks

  15. Preventive Measures

  16. Trojan Horse Virus Prevention Measures Use Certified Software Using certified antivirus software Avoid clicking random pop-ups Visiting safe websites Regular driver updates Using antivirus and firewalls

  17. Conclusion Virus Trojan The main objective of the program is to harm the data and information. The main objective involves stealing the system files and data. Affect the system more drastically. Less affecting area in comparison. Viruses are non-remote programs. Programmed to be remotely accessed. Have the ability to replicate itself and harm multiple files. Does not replicate itself.

  18. Join us to learn more! simplilearn.com UNITED STATES Simplilearn Solutions Pvt. Limited 201 Spear Street, Suite 1100 San Francisco, CA 94105 Phone: (415) 741-3319 INDIA Simplilearn Solutions Pvt. Limited #53/1C, 24th Main, 2nd Sector HSR Layout, Bangalore 560102 Phone: +91 8069999471 UNITED STATES Simplilearn Solutions Pvt. Limited 801 Corporate Center Drive, Suite 138 Raleigh, NC 27607 Phone: (919) 205-5565

More Related