You are on page 1of 33

Cyber Hygiene

By L. John
What is Malicious Software
Malicious Software

• Malicious software, often referred to as


malware, encompasses a wide range of
software designed to harm, disrupt, or gain
unauthorized access to computers,
networks, or devices.
Malware can cause

• System slowdowns

• data loss
Malware can cause

• unauthorized access to sensitive information

• financial harm
Malware can cause

• or even complete system failure


Protective measures

• Protection measures like antivirus


software, firewalls, regular updates,
and cautious browsing habits are
essential to mitigate the risks
associated with malicious software.
Anti-Virus software
• What is anti virus?

Prevent
Scan

Detect
Delete
Anti-Virus software

• Once installed, most antivirus software runs


automatically in the background to provide real-time
protection against virus attacks.
What is a virus

• It is a file or code, typically


delivered over a network, that
infects, explores, steals or
conducts virtually any behavior
an attacker wants.
What is a Trojan

• In computing, a Trojan horse is


any malware that misleads users
of its true intent by disguising
itself as a standard program.
What is Worm
• The worm can both run and
spread itself to other computers.
Because a worm has the ability
to automatically propagate
itself, you can get a worm in
your computer just because it is
on the same network as another
infected device.
What is Adware
• It a type of malware that displays
unwanted advertisements on
your computer or device.
• Adware is commonly activated
unknowingly when users are
trying to install legitimate
applications that adware is
bundled with.
What is Spyware

• Spyware is software with


malicious behavior that aims to
gather information about a
person or organization and send
it to another entity in a way that
harms the user by violating their
privacy
What is Ransomware

• Ransomware is a type of
cryptovirological malware
that permanently block
access to the victim's
personal data unless a
ransom is paid.
What is a botnet

• Botnets can be used to perform


Distributed Denial-of-Service
attacks, steal data, send spam,
and allow the attacker to access
the device and its connection.
What are Keyloogers

• A keylogger or keystroke
logger/keyboard capturing is a
form of malware or hardware that
keeps track of and records your
keystrokes as you type. It takes
the information and sends it to a
hacker using a command-and-
control server.
What are drive-by attacks

• Simply visiting an infected website may be sufficient for the


malware to be downloaded and run on a computer.
Precautions to take
Install Antivirus Software

• Use a reputable antivirus


software and keep it updated
regularly to detect and
remove malware
Update Software Regularly

• Keep your operating system,


applications and security software
updated to patch any
vulnerabilities that hackers could
exploit.
Exercise Caution Online

• Be wary of clicking on
suspicious links,
downloading attachments
from unknown sources, or
visiting untrustworthy
websites
Use strong Passwords

• Create complex and


unique passwords for
your accounts and
consider using a
password manager for
added security
Enable Firewall Protection

• Activate your
device’s firewall
to block
unauthorized
access to your
network
Backup data

• Regularly
Backup your
important data
to an external
Drive or a
secure cloud
storage service
Avoid Public Wi-Fi for Sensitive Activities

• Refrain from accessing


sensitive information
when using public Wi-
Fi networks as they
can be vulnerable to
attacks
Enable Two factor Authentication

• Add an extra
layer of
Security to
your accounts
by using 2FA
Wherever
Possible
Educate yourself

• Stay informed
about common
phishing tactics
and malware
scams to recognize
and avoid potential
threats.
Limit Administrative Priviledges

• Restrict administrative
privileges on your
devices to prevent
malware from making
significant system
changes

You might also like