0% found this document useful (0 votes)
42 views

Rizal Technological University - Boni

This document discusses different types of malware: viruses spread by infecting host files and replicating; botnets are collections of infected devices hackers can control to launch distributed denial of service attacks and steal credentials; adware displays unwanted pop-ups and ads and can introduce other malware; phishing involves disguising as trustworthy entities to steal information; worms spread rapidly across networks through email and file transfers; spyware secretly collects users' personal information; Trojan horses hide as legitimate software to enable hackers' access; and ransomware locks systems until a ransom is paid. The report emphasizes updating systems and backups to reduce ransomware risks.

Uploaded by

Roi Villegas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

Rizal Technological University - Boni

This document discusses different types of malware: viruses spread by infecting host files and replicating; botnets are collections of infected devices hackers can control to launch distributed denial of service attacks and steal credentials; adware displays unwanted pop-ups and ads and can introduce other malware; phishing involves disguising as trustworthy entities to steal information; worms spread rapidly across networks through email and file transfers; spyware secretly collects users' personal information; Trojan horses hide as legitimate software to enable hackers' access; and ransomware locks systems until a ransom is paid. The report emphasizes updating systems and backups to reduce ransomware risks.

Uploaded by

Roi Villegas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

RIZAL TECHNOLOGICAL UNIVERSITY – BONI

COLLEGE OF ENGINEERING, ARCHITECTURE AND TECHNOLOGY

Report Topic:
Malware

An Activity Submitted in Partial Fulfillment of the Requirement for the Subject


Information Assurance Security

CEIT-37-703A
ITP410

Submitted by:
Castro, Lyca
Janer, Jamaicah
Lacida, Vincent Angelo
Lopera, Shaina Mae
Lopera, Sheena Mae
Quijano, Dhaboy
Reataza, Zedrick
Villapando, Krystal Yvette

Submitted to:
Prof. Kenneth Martinez

October 2021
MALWARE
MALWARE

short for malicious software, is a blanket


term for viruses, worms, trojans and other
harmful computer programs hackers use to
wreak destruction and gain access to sensitive
information.

a software that is designed for malicious


purposes to damage, disrupt or gain
unauthorized access to your device and
inflict harm to data and people in multiple
ways like stealing private data, corrupting
files, crashing hard disks, extorting money
etc.
TYPES OF MALWARE
TYPESOFMALWARE VIRUS

How does Viruses spreads?

When the host is accepted or loaded by a


target system, the virus remains dormant until
the infected host file is activated.

Only after the host file is activated, can the


virus run, executing malicious code and
replicating to infect other files on your system
TYPESOFMALWARE BOTNET

BOTNET

a collection of internet-connected
devices infected by malware that allow
hackers to control them. Cyber criminals
use botnets to instigate botnet attacks,
which include malicious activities such as
credentials leaks, unauthorized access, data
theft and DDoS attacks
TYPESOFMALWARE BOTNET

How does Botnet attacks work?

Distributed Denial of Service (DDoS)


attacks that
cause unplanned application downtime

Validating lists of leaked credentials


(credential-
stuffing attacks) leading to account
takeovers

Web application attacks to steal data

Providing an attacker access to a device


and its connection to a network.
TYPESOFMALWARE

ADWARE

one of the better-known types of malware. It serves


pop-ups and display ads that often have no relevance
to you. Some users will put up with certain types of
adware in return for free software (games for
example). But not all adware is equal. At best,
it’s annoying and slows down your machine. At worst,
the ads link to sites where malicious downloads await
unsuspecting users. Adware can also deliver Spyware
and is often easily hacked making devices that have it
installed a soft target for hackers, phishers and
scammers.
TYPESOFMALWARE

PHISHING

the fraudulent attempt to obtain sensitive information


or data, such as usernames, passwords and credit card
details, by disguising oneself as a trustworthy entity in
an electronic communication.
TYPESOFMALWARE

WORMS

Worms get their name from the way they infect


systems. Starting from one infected machine, they
weave their way through the network, connecting to
consecutive machines in order to continue the spread
of infection. This type of malware can infect
entire networks of devices very quickly
TYPESOFMALWARE

WORMS

Many worms use multiple methods to spread across


networks, including the following:

EMAIL INSTANT MESSAGING

INTERNET P2P/FILESHARING

DOWNLOADS & NETWORKS


FTP SERVERS
TYPESOFMALWARE

SPYWARE

Spyware, as its name suggests, is designed


to spy on what a user is doing. Hiding in
the background on a computer, this type of
malware will collect information without the
user knowing, such as credit card details,
passwords and other sensitive information
TYPESOFMALWARE

What Spyware do exactly?

Spyware can be used to track and


record activity on computers and mobile devices.
Specific strains have specific behaviors; generally
speaking, cyberthieves use spyware to collect data and
personal information. Once it’s on your computer
or mobile device, spyware can carry out a distressing
array of covert operation
e.g: Keylogging
TYPESOFMALWARE

TROJAN HORSE

Just like Greek soldiers hid in a giant


horse to deliver their attack, this type of malware
hides within or disguises itself as legitimate
software. Acting discretely, it will breach security
by creating backdoors that give other malware
variants easy access.
TYPESOFMALWARE

What Trojan Horse do exactly?

Once activated, Trojans can enable cyber-


criminals to spy on you, steal your sensitive data,
and gain backdoor access to your system. These
actions can include:

 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers or
computer networks
TYPESOFMALWARE

RANSOMWARE

Also known as scareware, ransomware comes with a


heavy price. Able to lockdown networks and lock out
users until a ransom is paid, ransomware has targeted
some of the biggest organizations in the world today —
with expensive results.
TYPESOFMALWARE

To reduce the risk of ransomware attacks:

Always keep your Operating System up to date

Keep your Anti-Virus software up to date

Back-up your most important files

Don’t open attachments from unknown sources


(WannaCry was
spread via a .js attachment)

You might also like