You are on page 1of 6

Malicious software

• Malicious software refers to a type of computer program designed to infect a legitimate


user's computer and inflict harm on it in
multiple ways.
• can infect computers and devices in several ways and
comes in a number of forms, just a few of which include
viruses, worms, Trojans, spyware or adware
• vital for all users to recognize and protect themselves
from malware in all of its forms
• Causes serious problem:
- gathering sensitive information
- gathering websites
Malware protection strategy
• A robust antivirus software package is the primary component of technological defenses
that every personal and business computer system should have.
• antivirus protection ensuring that it is malware free and regularly updated to recognize
the latest threats.
• malware protection should be usable.
• Robust malware protection specifically guards your finances.
Anti-malware software
• must be kept up to date, with signature files updated
at least daily
• must be configured to scan files automatically upon
access which includes
when files are downloaded and opened
• must scan web pages automatically when they are
accessed through a web
• must prevent connections to malicious websites on the Internet
(by means of blacklisting, for example)
MALWARE PROTECTION AND
PREVENTION
• Ensure that all security updates and patches are installed
• Avoid suspicious links and emails
• Look into programs before downloading
• Leverage strong, unique passwords
• Install industry-leading anti-virus software

Faronics’ Anti-Virus has been named the best anti-virus program this year,


providing all the protection users need to guard against threats.
Different Types of Malicious Software

Computer Virus
• self-replicates and attaches itself to other files/programs
• capable of executing secretly when the host program is activated
• types of Computer virus are Memory-Resident Virus, Program File Virus,
Boot Sector Virus and Email Virus
Worms
• self-replicating program which automatically executes itself
• Worms spread over a network and are capable of launching a cumbersome and destructive attack within a
short period.
Rootkit
• alters the regular functionality of an OS on a computer in a stealthy manner.
• helps the hacker to take full control of the system and acts as the system administrator on the victim’s system
• Almost all the rootkits are designed to hide their existence.
 Spyware/Adware
• Secretly records information about a user and forwards it to third parties
• Adware as the name interprets displays advertising banners while a program is running deployed to
gather confidential information.
• Basically, to spy on and gather information from a victim’s computer.
 Trojan Horses
• non-replicating program that appears legitimate
• secretly performs malicious and illicit activities when executed
• Hackers make use of trojan horses to steal a user’s password
information, destroy data or programs on the hard disk.
It is hard to detect!

You might also like