Computer Worm: Shara Mae P. Manalansan Maed-Filipino

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 50

COMPUTER

WORM
Shara Mae P. Manalansan
MAEd- Filipino
I. COMPUTER WORM
A computer worm is a type
of malicious software
program whose primary
function is to infect other
computers while remaining
active on infected systems.
 A computer worm is self-replicating malware
that duplicates itself to spread to uninfected
computers. Worms often use parts of an
operating system that are automatic and
invisible to the user. It is common for worms to
be noticed only when their uncontrolled
replication consumes system resources, slowing
or halting other tasks.
 A computer worm is not to be confused
with WORM (write once, read many)
II. DIFFERENCES
BETWEEN WORMS AND
VIRUSES
VS.
 A computer worm is a form of malware, just like its
more notorious cousin, the virus. Where a worm
differs from a virus is that typically doesn’t infect or
manipulate files on its own.
 Instead, it simply clones itself over and over again
and spreads via a network (say, the internet, a local
area network at home, or a company’s intranet) to
other systems where it continues to replicate itself.
III. TYPES OF
COMPUTER WORMS
WORM HYBRID OR
COMPUTER VIRUS
Is a piece of malware that spreads like a worm, but that also
modifies program code like a virus or else carries some sort of
malicious payload, such as a virus, ransomware or some other type
of malware.
ZOMBIE OR BOT WORM
 It’s a self-replicating
malware program that resides
in current memory (RAM),
turns infected computers
zombie or bots and transmits
itself to other computers.

 It may be used to infect computers and turn them


into zombies or bots, with the infect computers
and turn them into zombies or bots, with the
internet if using them in coordinated attacks
through botnets.
E-MAIL WORM
Are usually spread as
malicious executable files
attached to what appear to
be ordinary email messages.
ETHICAL WORM
It is a computer worm
designed to propagate across
networks with the express
purpose of delivering
patches for known security
vulnerabilities.
IV. HOW COMPUTER
WORMS SPREAD
E-MAIL
One of the most common ways for
computer worms to spread is via
email spam. …In years gone by,
worms could hide in the main text
of an email, but as a modern email
clients caught on and began
blocking direct embedding circa
2010, the risk for this type of
attack is fairly low.
Back in 2000, the
“I love you”
email was able to
reach and then
attack millions of
pc.
OPERATING
SYSTEM
OPERATING SYSTEM
VULNERABILITIES
 Every operating system has its vulnerabilities (yes even macOS)
and some worms are specifically coded to take advantage of these
weak points. Perhaps the most infamous example is Conficker, a
worm first identified in 2008 which exploited vulnerability in a
network service present in may versions of Windows, including
Windows 2000, Windows XP, Windows Vista, Windows Server
2003, Windows Server 2008, and Windows Server 2008 R2 Beta
and Windows 7 Beta. At its peak, Conficker infected as many as 15
million computers.
INSTANT MESSAGING
 Worms can take on
similarly deceptive
forms in instant
messaging software and
take advantage of users
who are probably not on
high alert when using
such services.
SMARTPHONES
Globally, there were about 2.8
billion active smartphones being
used at the end of 2016, according
to data collated by market
intelligence firm Newzoo. With
these figures in mind, it should
come as little surprise that worm
creators are increasingly turning
their attention to mobile devices.
ACOMPUTER WORM
INFECTION SPREADS
WITHOUT USER
INTERACTION.
 All that is necessary is for the computer worms were
spread through infected storage media, such as floppy
diskettes, which, when mounted on a system, would
infect other storage devices connected to the victim
system. USB drives are still a common vector for
computer worms.
V. HOW TO TELL
IF YOUR
COMPUTER HAS
A WORM
 If you suspect your devices are
infected with a computer worm,
run a virus scan immediately.
Even if the scan come up
negative, continue to be
protective by following these
steps.
KEEP AN
EYE ON
YOUR HARD
DRIVE
SPACE.
When worms repeatedly replicate
themselves, they start to use up the free
space on your computer.
MONITOR
SPEED AND
PERFORMANC
E.
 Has your computer seemed a little sluggish
lately?
Are some of your programs crashing or not
running property? That could be red flag that
a worm is eating up your processing power.
BE ON THE LOOKOUT FOR
MISSING OR NEW FILES.
One function of a
computer worm
is to delete and
replace files on a
computer.
VI. HOW TO PREVENT
COMPUTER WORM
User should practice good cybersecurity
hygiene to protect themselves against being
infected with computer worms. Measures
that will help prevent the threat of
computer worm infections include:
KEEPING UP TO DATE
 Keeping up to date with operating systems
and all other software patches and updates
will help reduce the risk due to newly
discovered vulnerabilities.
USING FIREWALLS
Using firewalls will help reduce access
to systems by malicious software.
USING ANTIVIRUS
SOFTWARE
Using antivirus software will help
prevent malicious software from
running.
CAREFUL NOT TO CLICK
 Being careful not to click on attachments or
links in email or other messaging applications
that may expose systems to malicious
software.
PHISHING
 Phishing is another popular way for
hackers to spread worms (and other
type of malware). Always be extra
cautious when opening unsolicited
emails, especially those from unknown
senders that contain attachment or
dubious link.
INVEST IN A STRONG
INTERNET
 Be sure to invest in a strong internet
security to software solution that can help
block these threats. A good product should
have anti-phishing technology as well as
defenses against viruses, spyware,
ransomware, and other online threats.
ENCRYPT FILES
Encrypt files to protect sensitive data
stored on computers, servers and
mobile devices.
Although some worms are designed to do nothing
more than propagate themselves to new victim
systems, most worms are associated with viruses,
rootkits or other malicious software.
VII. HOW TO REMOVE A
COMPUTER WORM
 Removing a computer worm can be difficult. In extreme cases, the
system may need to be formatted, and all the software reinstalled.
 Used a known safe computer to download any required updates or
programs to an external storage device and then install them on the
affected machine. If it is possible to identify the computer worm
infecting the system, there may be specific instructions or tools
available to remove the infection.
 The system should be disconnected from the internet or
any network, wired or wireless, before attempting to
remove the computer worm; removable storage devices
should also be removed and scanned separately for
infections.
Once the system is disconnected from the network,
do the following:
 Update all anti-virus signatures.
 Scan the computer with the up-to-date antivirus anti-virus
software.
 Use the antivirus software to remove any malware, including
worms, that it finds and to clean infected files.
 Confirm that the operating system and all applications are up to
date and patched.
USING FIREWALLS
Using firewalls will help reduce access
to systems by malicious software.

You might also like