DEMO
DEMO
Spyware
Cybercriminals use spyware to monitor the activities of users. By logging the
keystrokes a user inputs throughout the day, the malware can provide access
to usernames, passwords, and personal data.
Virus
It infects other programs and can spread to your operating system, in addition
to performing its own malicious acts. A virus is attached to a file and is
executed once the file is launched. The virus will then encrypt, corrupt, delete,
or move your data and files.
Worms
A worm can duplicate itself in other devices or systems. Unlike viruses, worms
do not need human action to spread once they are in a network or system.
Ransomware
Arguably the most common form of malware, ransomware attacks encrypt a
device’s data and holds it for ransom.
Adware
commonly called “spam” — serves unwanted or malicious advertising. While
relatively harmless, it can be irritating as adware can hamper your computer’s
performance.
Direction: Read each situation and determine what types of
malware is being used.
1. Banners and ads are appearing on website that never had them before
2. An employee at a food and drink manufacturer received an email that ask
for money and if they do not give they will release the data of the
manufacturing company
3. The bank have detect that one of its computer have a key-logger
4. My computer delete all my file and corrupt all my apps
5. A company receive a email and by clicking , it resulted an infection to
computer and other computer connected to it.
Direction: write a short essay about
how you encounter malware in daily
life.
1. What do you think is
importance of being aware in
malware?
2. What should we do to
avoid malware ?
Direction: Identify the following
_________1.Its a malicious software that is deployed by a threat actor to
wreak havoc on an organization or individual.
_________2.Arguably the most common form of malware
_________3.Cybercriminals use ______ to monitor the activities of users
_________4.Commonly called “spam”
_________5. a ______ can duplicate itself in other devices or systems.
_________6. A ____ is attached to a file and is executed once the file is
launched.
_________7.This malware can provide access to usernames, passwords,
and personal data.
_________8.Encrypt a device’s data and holds it for ransom.
_________9.Do not need human action to spread once they are in a
network or system.
_________10.It infects other programs and can spread to your
operating system
ASSIGNMENT