You are on page 1of 8

• A malicious software

• Any kind of unwanted program.


• Installs without your consent on your PC.
•It includes virus, worms, trojans, rootkits,
backdoor.
•It is created by people to intentionally
damage computers.
 To partially control the user’s PC
 To track the user’s activity

 To capture important data, financial details

 To commit fraud

 To blackmail and ask for

ransom
1) Trojan horse
 A malicious program that is disguised as useful and legitimate software.

2) Virus
 Self-replicating program that spreads by inserting copies of itself into other
executable code or documents.

3) Worm
 Self-replicating program, similar to virus, but is self-contained (does not
need to be part of another program). Spreads by exploiting service
vulnerabilities.

4) Backdoor
 Software that allows access to a computer system bypassing the normal
authentication procedures.

5) Rootkit
 A stealthy type of software, typically malicious, designed to hide the
existence of certain processes or programs from normal methods of
detection.
 They generally spread via email attachments and
internet downloads.
 They run without you being aware about them.
 It can damage your software, hardware and files.
 They both multiply and spread themselves to
other computers to cause damage.

How are Trojans and


Worms different?

 Trojans get into your PC via a program and then cause


damage, whereas a worm gets into your PC via email
and cause damage or effect functioning by multiplying.
 Never open an email from an unknown user.
 Do not click on email links until you are completely
aware about what it contains.
 Use a good anti-virus and Antispyware software and
keep it up to date.
 Update your PC regularly.
 Do not install without knowing.
 Antivirus software is a computer program that detects,
prevents, and takes action to disinfect or remove
malicious software programs, such as viruses and
worms.
Thank You

You might also like