You are on page 1of 22

Malware and Spyware

CBS2203
2
What is Malware?

Can be defined as “Malicious computer executable”


◦ Annoying software or program codes
Running a code without user’s consent
◦ “If you let somebody else execute code on your computer, then it is not
your own computer”
Not only virus or worm
Sometimes known as computer contaminant
Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021
3
Types of Malware

 Viruses and Worms


 Spyware
 Bots, Trojans and Keyloggers
◦ Backdoors and DoS attacks

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


4
Virus

 A computer virus is a program that can replicate itself and spread from one
computer to another.
 A virus tries to infect a carrier, which in turn relies on the carrier to spread the
virus around.

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


5
Virus contd..

1. Direct infection: Virus can infect files every time a user opens that specific infected
program, document or file.
2. Fast Infection: Is when a virus infects any file that is accessed by the program that is
infected.
3. Slow infection: Is when the virus infects any new or modified program, file or
document.
4. Sparse Infection: Is the process of randomly infecting files, etc. on the computer.
5. RAM-resident infection: Is when the infection buries itself in your computer’s random
access memory.

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


6
Trojans

 Trojan horse: Is a program or software designed to look like a useful or legitimate file.
 Once the program is installed and opened it steals information or deletes data.
 Trojan horses compared to other types of malware is that it usually runs only once and
then is done functioning
 Another distribution of Trojans is by infecting a server that hosts websites.
 Example: Netural Zlob Trojan(Study)

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


7
Worms

 Worms and viruses get interchanged commonly in the media.


 In reality a worm is more dangerous than a virus.
 User Propagation vs. Self Propagation
 Worm is designed to replicate itself and disperse throughout the user’s network.
 Email Worms and Internet Worms are the two most common worm.

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


8
TYPES OF WORMS

 E-mail Worm
 Internet Worm

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


9
Email Worm

 Email worm goes into a user’s contact/address book and chooses every
user in that contact list.
 It then copies itself and puts itself into an attachment; then the user
will open the attachment and the process will start over again!
 Example: I LOVE YOU WORM

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


10
Internet Worms

 A internet worm is designed to be conspicuous to the user


 The worms scans the computer for open internet ports that the
worm can download itself into the computer
 Once inside the computer the worms scans the internet to infect
more computers.

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


11
Spyware

 Growth of Internet helped spawn spyware


 Largely fueled by the prospect of monetary gain
 Not spreads like viruses, instead packaged with user installed
software (mostly p2p programs)
 Least virulent forms causes sluggish systems, slow Web browsing,
annoying pop-ups
 More dangerous spyware tracks browsing habits or sensitive
information
Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021
12
Bots and Trojans

 Bots makers infect multiple systems


◦ Creates massive botnets that can be used to launch Distributed Denial
of Service attacks
 Trojan is a way to secretly install a piece of malware on a system
◦ It could be adware or a keylogger
◦ It sneakes onto a system and delivers an unexpected and potentially
devastating payload

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


13
Flaws and Vulnerabilities

 Homogeneity – e.g. when all computers in a network run the same OS, if you
can break that OS, you can break into any computer running it.
 Defects – Most systems containing errors which may be exploited by malware.
 Unconfirmed code – Code from a floppy disk, CD-ROM or USB device may
be executed without the user’s agreement.
 Over-privileged users – some systems allow all users to modify their internal
structures.
 Over-privileged code – Most popular systems allow code executed by a user
all rights of that user.
Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021
14
Antivirus Programs

 Antivirus programs: Are designed to detect malware trying to enter the user’s system.
 There are several ways an antivirus program can track malware entering the computer.
 Antivirus Software can use:
1. Signature based detection
2. Heuristics
3. Cloud Antivirus
4. Network Firewall

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


15
Signature-Based Detection

 Most common way an antivirus finds malware on a computer


 Database of virus signatures
 Constant Updates
 Not 100% foolproof

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


16
Heuristics

• Detection of malware is done by monitoring files and how certain


programs try to reform the files on the system.
• When a modification takes place the antivirus alerts the user and tries
to elevate the problem.

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


17
Cloud Antivirus

 New form of antivirus program


 The virus scanning is done from a remote location(not on the computer).
 Why this is so popular is because it relieves the physical computer resources.
 Constant functionality (Nonstop scanning)
 Security Issues

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


18
Network Firewall

 Operating systems way of protecting the user from unknown programs


 Not technically a antivirus program
 Monitors the TCP/IP ports programs tries to access

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


19
How can we protect ourselves

 Use an antivirus program and keep it up to date!


• Yes they only protect from know malicious code out there, but it’s
still something!

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


20
Operating System’s Security

 Keep your Operating System up to date!


• Windows is one of the most hacked OS on the market.
• The updates are mostly focused on security patches

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


21
Become An Informed User!

 Become aware of what you are doing on the internet!


• Don’t click on pop up ads!

 Keep up to date on current issues happening on the web!

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021


22

Thanks!

Information Security Policy By Mal. Anas Aliyu Usman 12/28/2021

You might also like