Computer Science: Cyber Security

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Cyber Security

Malware
Malware
Malware poses a major
threat to keeping data safe
and secure on a computer.
Various types of malware
exist, but this chapter will
focus on the following in
particular:
Virus
Viruses are self-replicating programs
designed to corrupt or delete files,
disrupt computer functionality, and
fill up storage with unnecessary
data. They require an infected host
program or operating system to
execute and cause harm, relying on
triggers to initiate their destructive
actions.
How to
prevent Virus
Protect yourself from viruses by
being cautious with email
attachments, avoiding dubious
websites and non-original
software. Follow standard safety
practices, such as not opening
emails from unknown sources.
Always run an up-to-date virus
scanner and maintain a secure
system with regular updates and a
reliable firewall.
Worms
Worms are independent malware that self-
replicate, aiming to spread across computers
and corrupt networks. Unlike viruses, they
don't require a host program to activate and
move freely within applications. Worms
exploit network security flaws to propagate,
bypassing the need to target specific files.
Often transmitted via email attachments, a
single user opening an infected email can lead
to the widespread infection of an entire
network.
How to prevent Worms
To guard against worms, implement
the same protective measures as with
viruses, including the use of up-to-date
antivirus programs. Worms pose a
unique challenge as they can
autonomously spread within a network
without any user action, in contrast to
viruses that necessitate user initiation
for propagation.
Trojan Horse
A Trojan horse is a deceptive program, often
masquerading as legitimate software, but
containing harmful instructions. It replaces or
integrates with genuine software to inflict
damage on the user's computer system.
Trojans require user execution, typically
arriving as email attachments or from infected
websites. For instance, they might be disguised
as fake anti-virus programs prompting users to
take action. Once activated, Trojans grant
cybercriminals access to sensitive information
like IP addresses and passwords. Spyware,
including keyloggers, and ransomware are
frequently deployed on a user's system
through Trojan horse malware.
How to prevent
trojan horse
Because they rely on tricking
end-users, firewalls and
other security systems
are often useless since the
user can overrule them and
initiate the running of
the malware.
SPYWARE
• Definition: Spyware is discreet software monitoring a
user's computer activities.

• Purpose: Gathers and transmits information to


cybercriminals, focusing on personal data like bank
details.

• Detection and Removal: Addressed through anti-


spyware software.

• Risk: Exploits system vulnerabilities beyond infiltration.

• Alert: Discovery of spyware signals a potential security


weakness exploitable by more dangerous malware.
Adware
• Type: Adware is a form of malware.

• Least Dangerous Form: Floods end-users with unwanted advertising.

• Examples: Redirects browsers to promotional websites, appears as pop-ups, or integrates into the browser's
toolbar.

• Potential Impacts:

• Highlights weaknesses in a user's security defenses.

• Difficult to remove: Often defeats most anti-malware software due to uncertainty about its harmful nature.

• Browser hijacking: Can create its own default search requests.


Ransomware
• Definition: Ransomware is a program that encrypts data on a user's computer,
essentially holding the data hostage until a ransom is paid.
• Process: Cybercriminal encrypts data.
• Waits for ransom payment.
• Upon payment, a decryption key is sometimes provided.
• Impact: Significant damage to companies and individuals reported.
• Locks the computer screen, demanding payment for access restoration.
Ransomware
• Infection Methods:
• Installation via Trojan horse or through social engineering.
• Execution:
• Encrypts files immediately or waits to determine an affordable ransom.
• Prevention:
• Usual methods such as avoiding phishing are preventive.
• Once executed, reversing the damage is nearly impossible.
• Mitigation:
• Regular backups of key files are crucial to avoid paying a ransom.
Wrapping it all up
Malware, like spyware, adware, and ransomware, can be sneaky and cause problems. But,
if we learn about these digital threats, stay careful online, and use good computer habits,
we can keep our information safe. It's like a little digital self-defense. Thank you for
listening, and let's all be cyber-smart out there!

You might also like