Week-6 (2)
Week-6 (2)
MALICIOUS
SOFTWARE
State your experience
where your
computer/device got
infected with a virus
and what did you do?
MALICIOUS
SOFTWARE
The term 'Malicious
Software' is the origin of
the word 'Malware,' and the
meaning remains the same.
MALICIOUS CODE
Malicious Software refers
to any malicious program
that causes harm to a
computer system or network.
Malicious Malware Software
attacks a computer or
network in the form of
viruses, worms, trojans,
spyware, adware or rootkits
MALICIOUS
SOFTWARE
ATTACK
An attacker inserts
malicious code into a
user's system to disrupt or
disable the operating
system or any other
application and destroy the
important information
stored.
TYPES OF
MALICIOUS
SOFTWARE
COMPUTER VIRUS
A computer virus is malicious software that
self-replicates and attaches itself to other
files/programs. It can execute secretly when the
host program/file is activated.
COMPUTER VIRUS (TWO TYPES)
• Non-resident Virus
• Resident Virus
NON-RESIDENT VIRUS
Non-resident viruses are any viruses that do not
live in the computer’s memory.
Resident viruses
can come from
corrupted drives or
disks, or from
suspicious links or
downloads.
WORMS
A computer worm is a
self-replicating computer
virus. It uses a network to
send copies of itself to other
nodes and do so without any
user intervention.
WORMS DO NOT
Delete system's files, modify
existing files, install Trojan
horses, record or transmit
decrypted passwords, capture
super user privileges.
I LOVE YOU VIRUS
COMMON NAME:
LOVE LETTER
OPERATING SYSTEM:
MICROSOFT
AFFECTED: WINDOWS
WRITTEN IN:
VBSCRIPT
I LOVE YOU
VIRUS
I LOVE YOU VIRUS
ILOVEYOU, sometimes referred to as Love Letter, was
a computer worm that attacked tens of millions of
Windows personal computers on and after 6 May 2000
local time in the Philippines when it started
spreading as an email message with the subject line
"ILOVEYOU" and the attachment "LOVE-LETTER-FOR-
YOU.txt.vbs".
WHO WAS RESPONSIBLE FOR CREATING
AND DISTRIBUTING IT?
Young Filipino computer programmer named
Onel de Guzman
WORMS
REFERENCES • https://www.spiceworks.com/it-security/security-
general/articles/what-is-adware/
• https://www.geeksforgeeks.org/difference-between-
adware-and-spyware/
• https://softwarelab.org/what-is-spyware/
• https://sectigostore.com/blog/spyware-examples-4-
real-life-examples-that-shook-2021/
• https://gridinsoft.com/spyware
• https://www.malwarebytes.com/rootkit
• https://www.fortinet.com/resources/cyberglossary/root
kit