0% found this document useful (0 votes)
40 views

DEMO

Malware is malicious software deployed by threat actors to harm organizations and individuals. It comes in many forms, including viruses, spyware, ransomware, worms, and adware. Viruses infect files and spread to systems, encrypting or deleting data. Spyware monitors users' keystrokes to access credentials. Ransomware encrypts devices and demands payment. Worms duplicate across networks without human intervention. Adware displays unwanted advertising popups. Being aware of these threats and cautious about emails and links can help avoid malware infections.

Uploaded by

Marc Gerald
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

DEMO

Malware is malicious software deployed by threat actors to harm organizations and individuals. It comes in many forms, including viruses, spyware, ransomware, worms, and adware. Viruses infect files and spread to systems, encrypting or deleting data. Spyware monitors users' keystrokes to access credentials. Ransomware encrypts devices and demands payment. Worms duplicate across networks without human intervention. Adware displays unwanted advertising popups. Being aware of these threats and cautious about emails and links can help avoid malware infections.

Uploaded by

Marc Gerald
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Malware

Its a malicious software that is deployed by a threat actor to wreak havoc on


an organization or individual. Malware is usually found attached to emails,
embedded in fraudulent links, hidden in ads, or lying in-wait on various sites
that you might visit on the internet. The end goal of malware is to harm or
exploit computers and networks, often to steal data or money.
TYPES OF MALWARE

Spyware
Cybercriminals use spyware to monitor the activities of users. By logging the
keystrokes a user inputs throughout the day, the malware can provide access
to usernames, passwords, and personal data.

Virus
It infects other programs and can spread to your operating system, in addition
to performing its own malicious acts. A virus is attached to a file and is
executed once the file is launched. The virus will then encrypt, corrupt, delete,
or move your data and files.
Worms
A worm can duplicate itself in other devices or systems. Unlike viruses, worms
do not need human action to spread once they are in a network or system.

Ransomware
Arguably the most common form of malware, ransomware attacks encrypt a
device’s data and holds it for ransom.

Adware
commonly called “spam” — serves unwanted or malicious advertising. While
relatively harmless, it can be irritating as adware can hamper your computer’s
performance.
Direction: Read each situation and determine what types of
malware is being used.

1. Banners and ads are appearing on website that never had them before
2. An employee at a food and drink manufacturer received an email that ask
for money and if they do not give they will release the data of the
manufacturing company
3. The bank have detect that one of its computer have a key-logger
4. My computer delete all my file and corrupt all my apps
5. A company receive a email and by clicking , it resulted an infection to
computer and other computer connected to it.
Direction: write a short essay about
how you encounter malware in daily
life.
1. What do you think is
importance of being aware in
malware?
2. What should we do to
avoid malware ?
Direction: Identify the following
_________1.Its a malicious software that is deployed by a threat actor to
wreak havoc on an organization or individual.
_________2.Arguably the most common form of malware
_________3.Cybercriminals use ______ to monitor the activities of users
_________4.Commonly called “spam”
_________5. a ______ can duplicate itself in other devices or systems.
_________6. A ____ is attached to a file and is executed once the file is
launched.
_________7.This malware can provide access to usernames, passwords,
and personal data.
_________8.Encrypt a device’s data and holds it for ransom.
_________9.Do not need human action to spread once they are in a
network or system.
_________10.It infects other programs and can spread to your
operating system
ASSIGNMENT

Direction: Give atleast 1 example of each type of


malware
THANK YOU

You might also like