Computer Malware

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 32

LEVEL

1
W O R M
LEVEL
2
H O R S E
LEVEL
3
S P Y
LEVEL
4
V I R U S
LEVEL
5
P A S SWO R D
You have completed all levels!
Lesson 10
Office Productivity
SOURCE: benshar malbacias, Mar 11, 2016
 This are self-replicating programs
that attach to other computer files
and spread from one computer to
another.

 They usually infect executable and


document files such as Word documents
and Excel spreadsheets.
 ILOVEYOU
 Melissa
 Brain
File infected Virus loads Virus “infects”
with virus is itself to the other files by
loaded to computer adding its code to
computer memory the files

Newly infected files


Virus executes
are transmitted to
other tasks,
other computers,
like overwrite
via USB flash drives
files
or by e-mail

The virus repeats the


infection process
 They have the ability to spread
themselves from one computer to
another.
 Once inside the computer, worms
can do various of things:
◦ Delete files
◦ Install programs
◦ Send documents
 Morris
 Code Red
 So Big
 SQL Slammer
 My Doom
 Masquerade as useful programs to
trick the user into installing them
to the system.
 Once installed, the Trojan horse
will provide an entrance or
backdoor, to the system where it was
installed, giving that control of
that system to the authors of the
malware.
 Erase
 Corrupt
 Overwrite files
 Spread other programs like
viruses, log key strokes and
spy on the user or gather
information such as credit card
numbers.
 Back Orifice
 NetBus
 GateCrasher
 Programs that work in secret like
Trojan horses, which may be
installed into the system without
the knowledge of the user.

 It is designed to gather
information about the user of the
computer where they are installed.
 They may also have the capability
to change the configuration of a
computer.

 It takes special software to


remove spyware and Trojan horses
from the computer, like Spyware
Doctor

You might also like