Malware in our live

Содержание

Слайд 2

PLAN

1. What is a malware? Types, functions and working principle
2. Ways to

PLAN 1. What is a malware? Types, functions and working principle 2.
enter malware to your computer
3. Ways to protect against malicious software

Слайд 3

What is a malware?

Malware is a software intentionally designed to cause damage

What is a malware? Malware is a software intentionally designed to cause
to a computer, server, client, or computer network.

Слайд 5

VIruses

A virus - is a self-replicating program code that is embedded in

VIruses A virus - is a self-replicating program code that is embedded
installed programs without the user's consent.

Слайд 6

VIRUSES

type of objects that they infect

Methods of infection

Selection of victims

VIRUSES type of objects that they infect Methods of infection Selection of victims

Слайд 7

Worms

is a standalone malware computer program that replicates itself in order to spread to

Worms is a standalone malware computer program that replicates itself in order
other computers.
Worms are in some way viruses, as they are based on self-replicating programs. However, worms cannot infect existing files.

Слайд 8

Trojans

By its action is the opposite of viruses and worms. It offers

Trojans By its action is the opposite of viruses and worms. It
to download under the guise of a legitimate application, but instead of the stated functionality, it does what the attackers need.
The current Trojans have evolved to such complex forms as, for example, backdoor and trojan loader.

Слайд 9

RootkitS

In the modern world, a rootkit is a special part of malicious

RootkitS In the modern world, a rootkit is a special part of
programs designed specifically to hide the presence of malicious code and its actions from the user and the installed security software. This is possible due to the tight integration of the rootkit with the operating system.

Слайд 10

BACKDOORS

is an application that allows a system administrator or an evil intruder

BACKDOORS is an application that allows a system administrator or an evil
to control your computer from a distance. Depending on the functional features of the specific backdoor, a hacker can install and run any software on the victim’s computer, save all keystrokes, download and save any files, turn on a microphone or a camera.

Слайд 11

LOADERS

Loader - a small part of the code used to further download

LOADERS Loader - a small part of the code used to further
and install the full version of the malware

Слайд 12

How malware can get on your computer?

???

How malware can get on your computer? ???

Слайд 13

E-mail with an attachment

Often, people out of curiosity open an incoming message,

E-mail with an attachment Often, people out of curiosity open an incoming
after which problems begin

Слайд 14

Web sites

As you know, there are sites whose target audience are mostly

Web sites As you know, there are sites whose target audience are
adults. These sites are inherently unreliable, and also often spread computer viruses

Слайд 15

Network

If the computer is connected to a home network, or is part

Network If the computer is connected to a home network, or is
of a large network, you can easily get the virus through no fault of your own. One of the network members receives a virus and within a few minutes is the distributor of this virus.

Слайд 16

Phishing

Data loss as a result of phishing is a frequent occurrence, but

Phishing Data loss as a result of phishing is a frequent occurrence,
it is also easy to infect a computer with viruses. When visiting fake sites, spyware programs often automatically install viruses on computers.

Слайд 17

How to avoid infecting your computer with malware?

As you can see, there

How to avoid infecting your computer with malware? As you can see,
are a lot of ways to spread computer viruses. To prevent infection, you can download any antivirus for free and install it in the system. At the same time, observe the elementary precautionary measures:
1. Use licensed antivirus
2. Check loaded programs before launch.
3. Avoid visiting sites of questionable content.
and then you can easily avoid infection.

Слайд 18

The most dangerous malware ( ͡° ͜ʖ ͡°) 

The most dangerous malware ( ͡° ͜ʖ ͡°)

Слайд 19

5. SLAMMER

TYPE: WORM
YEAR: 2003
TARGET: SQL SERVERS
DAMAGE: 1.2 BILLION
ORIGIN: USA

5. SLAMMER TYPE: WORM YEAR: 2003 TARGET: SQL SERVERS DAMAGE: 1.2 BILLION ORIGIN: USA

Слайд 20

4. CODE RED

TYPE: WORM
YEAR: 2001
TARGET: SERVERS
DAMAGE: 2.6 BILLION
ORIGIN: USA

4. CODE RED TYPE: WORM YEAR: 2001 TARGET: SERVERS DAMAGE: 2.6 BILLION ORIGIN: USA

Слайд 21

3. ILOVEYOU

TYPE: WORM
YEAR: 2000
TARGET: E-MAIL
DAMAGE: 15 BILLIONS
ORIGIN: Philippines

ILOVEYOU’S MODEL

3. ILOVEYOU TYPE: WORM YEAR: 2000 TARGET: E-MAIL DAMAGE: 15 BILLIONS ORIGIN: Philippines ILOVEYOU’S MODEL

Слайд 22

2. SOBIG.F

TYPE: WORM | TROJAN
YEAR: 2003
TARGET: E-MAIL
DAMAGE: 37 BILLIONS
ORIGIN: UNKNOWN

2. SOBIG.F TYPE: WORM | TROJAN YEAR: 2003 TARGET: E-MAIL DAMAGE: 37 BILLIONS ORIGIN: UNKNOWN

Слайд 23

MYDOOM

TYPE: WORM
YEAR: 2004
TARGET: NDN
DAMAGE: 38 BILLIONS
ORIGIN: UNKNOWN

MYDOOM TYPE: WORM YEAR: 2004 TARGET: NDN DAMAGE: 38 BILLIONS ORIGIN: UNKNOWN