Слайд 2PLAN
1. What is a malware? Types, functions and working principle
2. Ways to
![PLAN 1. What is a malware? Types, functions and working principle 2.](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-1.jpg)
enter malware to your computer
3. Ways to protect against malicious software
Слайд 3What is a malware?
Malware is a software intentionally designed to cause damage
![What is a malware? Malware is a software intentionally designed to cause](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-2.jpg)
to a computer, server, client, or computer network.
Слайд 5VIruses
A virus - is a self-replicating program code that is embedded in
![VIruses A virus - is a self-replicating program code that is embedded](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-4.jpg)
installed programs without the user's consent.
Слайд 6VIRUSES
type of objects that they infect
Methods of infection
Selection of victims
![VIRUSES type of objects that they infect Methods of infection Selection of victims](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-5.jpg)
Слайд 7Worms
is a standalone malware computer program that replicates itself in order to spread to
![Worms is a standalone malware computer program that replicates itself in order](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-6.jpg)
other computers.
Worms are in some way viruses, as they are based on self-replicating programs. However, worms cannot infect existing files.
Слайд 8Trojans
By its action is the opposite of viruses and worms. It offers
![Trojans By its action is the opposite of viruses and worms. It](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-7.jpg)
to download under the guise of a legitimate application, but instead of the stated functionality, it does what the attackers need.
The current Trojans have evolved to such complex forms as, for example, backdoor and trojan loader.
Слайд 9RootkitS
In the modern world, a rootkit is a special part of malicious
![RootkitS In the modern world, a rootkit is a special part of](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-8.jpg)
programs designed specifically to hide the presence of malicious code and its actions from the user and the installed security software. This is possible due to the tight integration of the rootkit with the operating system.
Слайд 10BACKDOORS
is an application that allows a system administrator or an evil intruder
![BACKDOORS is an application that allows a system administrator or an evil](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-9.jpg)
to control your computer from a distance. Depending on the functional features of the specific backdoor, a hacker can install and run any software on the victim’s computer, save all keystrokes, download and save any files, turn on a microphone or a camera.
Слайд 11LOADERS
Loader - a small part of the code used to further download
![LOADERS Loader - a small part of the code used to further](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-10.jpg)
and install the full version of the malware
Слайд 12How malware can get on your computer?
???
![How malware can get on your computer? ???](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-11.jpg)
Слайд 13E-mail with an attachment
Often, people out of curiosity open an incoming message,
![E-mail with an attachment Often, people out of curiosity open an incoming](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-12.jpg)
after which problems begin
Слайд 14Web sites
As you know, there are sites whose target audience are mostly
![Web sites As you know, there are sites whose target audience are](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-13.jpg)
adults. These sites are inherently unreliable, and also often spread computer viruses
Слайд 15Network
If the computer is connected to a home network, or is part
![Network If the computer is connected to a home network, or is](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-14.jpg)
of a large network, you can easily get the virus through no fault of your own. One of the network members receives a virus and within a few minutes is the distributor of this virus.
Слайд 16Phishing
Data loss as a result of phishing is a frequent occurrence, but
![Phishing Data loss as a result of phishing is a frequent occurrence,](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-15.jpg)
it is also easy to infect a computer with viruses. When visiting fake sites, spyware programs often automatically install viruses on computers.
Слайд 17How to avoid infecting your computer with malware?
As you can see, there
![How to avoid infecting your computer with malware? As you can see,](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-16.jpg)
are a lot of ways to spread computer viruses. To prevent infection, you can download any antivirus for free and install it in the system. At the same time, observe the elementary precautionary measures:
1. Use licensed antivirus
2. Check loaded programs before launch.
3. Avoid visiting sites of questionable content.
and then you can easily avoid infection.
Слайд 18The most dangerous malware ( ͡° ͜ʖ ͡°)
![The most dangerous malware ( ͡° ͜ʖ ͡°)](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-17.jpg)
Слайд 195. SLAMMER
TYPE: WORM
YEAR: 2003
TARGET: SQL SERVERS
DAMAGE: 1.2 BILLION
ORIGIN: USA
![5. SLAMMER TYPE: WORM YEAR: 2003 TARGET: SQL SERVERS DAMAGE: 1.2 BILLION ORIGIN: USA](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-18.jpg)
Слайд 204. CODE RED
TYPE: WORM
YEAR: 2001
TARGET: SERVERS
DAMAGE: 2.6 BILLION
ORIGIN: USA
![4. CODE RED TYPE: WORM YEAR: 2001 TARGET: SERVERS DAMAGE: 2.6 BILLION ORIGIN: USA](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-19.jpg)
Слайд 213. ILOVEYOU
TYPE: WORM
YEAR: 2000
TARGET: E-MAIL
DAMAGE: 15 BILLIONS
ORIGIN: Philippines
ILOVEYOU’S MODEL
![3. ILOVEYOU TYPE: WORM YEAR: 2000 TARGET: E-MAIL DAMAGE: 15 BILLIONS ORIGIN: Philippines ILOVEYOU’S MODEL](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-20.jpg)
Слайд 222. SOBIG.F
TYPE: WORM | TROJAN
YEAR: 2003
TARGET: E-MAIL
DAMAGE: 37 BILLIONS
ORIGIN: UNKNOWN
![2. SOBIG.F TYPE: WORM | TROJAN YEAR: 2003 TARGET: E-MAIL DAMAGE: 37 BILLIONS ORIGIN: UNKNOWN](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-21.jpg)
Слайд 23MYDOOM
TYPE: WORM
YEAR: 2004
TARGET: NDN
DAMAGE: 38 BILLIONS
ORIGIN: UNKNOWN
![MYDOOM TYPE: WORM YEAR: 2004 TARGET: NDN DAMAGE: 38 BILLIONS ORIGIN: UNKNOWN](/_ipx/f_webp&q_80&fit_contain&s_1440x1080/imagesDir/jpg/1027981/slide-22.jpg)