0% found this document useful (0 votes)
18 views

Malware

The document provides an overview of various types of malware, including viruses, worms, ransomware, and trojans, along with their characteristics and methods of propagation. It also discusses cybersecurity tools such as firewalls and antivirus software, and highlights key points about the history of malware. Additionally, it includes one-liners summarizing important concepts related to malware and cybersecurity.

Uploaded by

sahil4leafclover
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Malware

The document provides an overview of various types of malware, including viruses, worms, ransomware, and trojans, along with their characteristics and methods of propagation. It also discusses cybersecurity tools such as firewalls and antivirus software, and highlights key points about the history of malware. Additionally, it includes one-liners summarizing important concepts related to malware and cybersecurity.

Uploaded by

sahil4leafclover
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

IBPS RRB PO/ Clerk

Mains 2024
Computer Awareness
Malware
By : Kavita Negi
1
Malware
• Viruses : A computer virus infects devices and replicates itself across systems. Viruses require human
intervention to propagate. Viruses can modify computer functions and applications; copy, delete and
exfiltrate data etc.

• Worm : A computer worm self-replicates and infects other computers without human intervention. This
malware inserts itself in devices via security vulnerabilities or malicious links or files. Worms often go
unnoticed by users, usually disguised as legitimate work files.

• Ransomware : Ransomware locks or encrypts files or devices and forces victims to pay a ransom in
exchange for reentry.

• Trojan horses : A Trojan horse is malicious software that appears legitimate to users. Trojans rely on
social engineering techniques to invade devices.

• Keyloggers : A keylogger is surveillance malware that monitors keystroke patterns. Threat actors use
keyloggers to obtain victims' usernames and passwords and other sensitive data.
Malware
• Spyware : Spyware is malware that downloads onto a device without the user's knowledge. It steals
users' data to sell to advertisers and external users. Spyware can track credentials and obtain bank details
and other sensitive data.

• Fileless malware : Fileless malware resides in computer memory.

• Adware : Adware is software that displays or downloads unwanted advertisements, typically in the
form of banners or pop-ups. It collects web browser history and cookies to target users with specific
advertisements.

• Rootkit : A rootkit is a type of malware designed to give hackers access to and control over a target
device. Once they gain unauthorized access to computers, rootkits enable cybercriminals to steal
personal data and financial information, install malware or use computers as part of a botnet to circulate
spam and participate in DDoS (distributed denial of service) attacks.

• Logic Bomb : A logic bomb is a piece of malware that’s designed to execute when certain conditions
are met. Logic bombs don’t execute initially.
Malware
• Time Bomb : A time bomb is a piece of malware that’s designed to execute at a predetermined time.

• Spoofing : In cybersecurity, ‘spoofing’ is when fraudsters pretend to be someone or something else to


win a person’s trust. The motivation is usually to gain access to systems, steal data, steal money, or
spread malware.

• Sniffing : Sniffing is a process of monitoring and capturing all data packets passing through given
network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic.
Attackers use sniffers to capture data packets containing sensitive information such as password,
account information etc.

• Phishing : Phishing is when attackers send scam emails (or text messages) that contain links to
malicious websites. The websites may contain malware (such as ransomware) which can sabotage
systems and organisations.
Malware
• Smishing : Smishing is a social engineering attack that uses fake mobile text messages to trick people
into downloading malware, sharing sensitive information or sending money to cybercriminals.
The term “smishing” is a combination of “SMS”—or “short message service,” the technology behind
text messages—and “phishing.”

• Vishing : Vishing, short for voice phishing, uses fraudulent phone calls to trick victims into providing
sensitive information, like login credentials, credit card numbers, or bank details.

• Pharming is when a legitimate website’s traffic is redirect


-ed to a fake site for malicious purposes. This is usually
done with malware or DNS spoofing.
Cyber Security Tools

• Firewall : A firewall is a network security device that prevents unauthorized access to a network.
Firewall is combination of Hardware and Software.

• Anti Virus : Antivirus software (antivirus program) is a security program designed to prevent, detect,
search and remove viruses. Once installed, most antivirus software runs automatically in the background
to provide real-time protection against virus attacks.

• Antimalware : Antimalware is designed to protect a computer from malware, which is intended to


disrupt the operation of a computer system or gain unauthorized access.

• Encryption tool : An Encryption Tool is a software application that is designed to hide data by
rendering it unreadable without the proper keys or passwords.

• Strong Password
Key Points
❑ First Ransomware : AIDS Trojan
• year : 1989
• Launch by : Joseph L. Popp
• Other example of ransomware : WannaCry, Locky, CryptoWall etc

❑ First Virus : Creeper


• Founder : Bob Thomas
• Created in : 1971
• Other Examples of virus : CryptoLocker, ILOVEYOU, MyDoom etc

❑ First Boot Sector Virus : Brain


• Founder : Basit and Amjad Farooq Alvi (Alvi Brothers from Pakistan)
• Created in : 1986 for IBM Personal Computer

❑ What is the most famous computer virus : ILOVEYOU


• Also known as Love Bug. Year : 2000
• It started spreading as an email message with the subject line "ILOVEYOU" and the attachment
"LOVE-LETTER-FOR-YOU. TXT. vbs".
One-liner
• Malware : Malicious Software
• A Malware that copies itself and infects your computer and files : Virus
• A virus that can delete anti virus : Retrovirus
• A virus that spread in application Software : Macro Virus
• Pattern that can be used to identify a virus : Virus Signature
• A malware that self replicates and sends itself to other computers in your network : Worm
• When cybercriminals try to get sensitive information from you, like Credit card details : Phishing
• Software that pretends to be useful but is really malware : Trojan horse
• IP Address, DNS , Email related crime : Spoofing
• Unsolicited Bulk Email called : Spam (Unwanted Junk mass e-mail )
• A person who got illegal access to a computer system : Hacker
• It is a hole in software left by designer : Trap door
• Software that steals or destroy data of a computer : Malware
• Agreement between software developer and software user is called : End User Licensee Agreement (EULA)
• Name the vertical software used in banks : Finacle (developed by Infosys).
• Error is software is called : Bug
• Changes made in existing software : Update
• Delete old version and install new version : Upgrade
One-liner
• Which among these are utility software :
1) Anti – Virus 2) Disk Cleanup 3) Disk Defragmenter 4) All of these

• Software that is available for trail basis is called : Shareware


Example : Antivirus

• Software that tries users to buy a program or service by making pop-ups : Nagware

• It is illegal reproduction and distribution of software applications : Piracy

• The act of disguising a communication from an unknown source as being from, trusted source : Spoofing

• Type of hackers, also known as crackers, hack to gain unauthorised access to a system and harm its
operations or steal sensitive information : Black Hat Hacker
Share your feedback with us at
[email protected]

You might also like