0% found this document useful (0 votes)
26 views20 pages

Report (Viruses, Worms&TrojanHorses)

This document discusses three common types of malware: viruses, worms, and Trojan horses. It describes their key characteristics and how they infect systems. Viruses typically spread by attaching to files while worms propagate autonomously across networks. Trojan horses masquerade as legitimate software to trick users. The document outlines example types for each category and their potential impacts, such as data loss or theft. It concludes with recommendations for mitigation like antivirus software, patching systems, and user education.

Uploaded by

Clarence Rabino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views20 pages

Report (Viruses, Worms&TrojanHorses)

This document discusses three common types of malware: viruses, worms, and Trojan horses. It describes their key characteristics and how they infect systems. Viruses typically spread by attaching to files while worms propagate autonomously across networks. Trojan horses masquerade as legitimate software to trick users. The document outlines example types for each category and their potential impacts, such as data loss or theft. It concludes with recommendations for mitigation like antivirus software, patching systems, and user education.

Uploaded by

Clarence Rabino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Viruses,

Worms
and
Trojan Horses
Viruses: Threats and Protection
Computer viruses are malicious
software programs designed to infect
and harm computers, similar to
biological viruses that infect living
organisms. They have been a persistent
threat in the digital world since the
advent of computers.
Characteristics of Computer Viruses:
1. Infectious: Like biological viruses, computer viruses can
replicate and spread from one computer to another.
2. Destructive Intent: Many computer viruses are designed to
corrupt or destroy data, disrupt system operations, or steal
sensitive information.
3. Hidden Payload: Viruses often have hidden code or
payloads that activate under specific conditions or triggers.
4. Camouflage: They can hide within seemingly harmless files
or programs, making them difficult to detect.
Common Types of Computer Viruses:
1. File Infector Viruses: These attach themselves to
executable files and spread when the infected file is run.
2. Boot Sector Viruses: These infect the master boot record
(MBR) of a computer's hard drive or removable storage.
3. Macro Viruses: Typically spread via documents with
macros (e.g., Word or Excel files) and can execute malicious
code.
4. Worms: Self-replicating malware that spreads across
networks without needing a host file.
Impact of Computer Viruses:
• Loss of data, system crashes, and disruption of
normal operations.
• Theft of sensitive information such as passwords and
financial data.
• Financial losses due to downtime, data recovery, and
cybersecurity measures.
Protection and Prevention:
1. Antivirus Software: Install reputable antivirus
software to scan and detect viruses.
2. Regular Updates: Keep your operating system and
software up-to-date to patch vulnerabilities.
3. Email Safety: Be cautious with email attachments
and links, as many viruses are spread through phishing
emails.
Protection and Prevention:
4. Firewalls: Use firewalls to monitor incoming and
outgoing network traffic.
5. Backup: Regularly backup important data to avoid
loss in case of an infection.
6. User Awareness: Educate users about safe online
practices and the dangers of downloading or clicking on
unknown sources.
Worms: Digital Menace and Mitigation
Computer worms are a type of
malicious software that can self-
replicate and spread independently,
causing significant harm to computer
networks and systems. Unlike viruses,
worms do not require a host program
to attach to and can propagate rapidly.
Characteristics of Computer Worms:
1. Self-Replication: Worms can create copies of themselves to
infect multiple computers or devices.
2. Network Propagation: They spread through computer
networks, exploiting vulnerabilities or using various methods
like email, instant messaging, or file sharing.
3. Autonomous: Unlike viruses, worms are self-contained and
can execute without user interaction.
4. Payload: Worms often carry a payload that can include
malicious actions like data destruction, data theft, or creating
backdoors for hackers.
Common Types of Computer Worms:
1. Email Worms: Spread through email attachments or links,
often exploiting vulnerabilities in email clients.
2. Network Worms: Exploit vulnerabilities in network
protocols or services to spread across interconnected systems.
3. Instant Messaging Worms: Propagate through instant
messaging platforms, taking advantage of user trust.
4. USB Worms: Spread via infected USB drives and can target
computers with autorun features.
Impact of Computer Worms:
• Network congestion and slowdowns due to rapid
replication.
• Data loss, corruption, or theft.
• Unauthorized access to compromised systems.
• Disruption of critical services and functions.
Mitigation and Prevention:
1. Patch Management: Regularly update operating systems
and software to patch vulnerabilities that worms exploit.
2. Firewalls and Intrusion Detection Systems: Employ network
security measures to detect and block worm traffic.
3. Antivirus and Antimalware Software: Install and update
these tools to identify and remove worms.
4. User Training: Educate users about safe online practices,
including not opening suspicious email attachments or clicking
on unknown links.
Mitigation and Prevention:
5. Email Filtering: Use email filtering systems to detect and
quarantine potentially harmful email attachments.
6. Network Segmentation: Isolate critical network segments
to prevent worm propagation.
7. USB Device Control: Implement policies to restrict the use
of external devices and scan them for malware before use.
Trojan Horses: Deceptive Threats in
the Digital Realm
Trojan Horses, often referred to
simply as Trojans, are a class of
malicious software that disguise
themselves as legitimate programs or
files to gain access to and compromise
computer systems. Named after the
mythological wooden horse used by the
Greeks to infiltrate Troy, these digital
threats are one of the oldest and most
common forms of malware.
Characteristics of Trojan Horses:
1. Deception: Trojans masquerade as trustworthy or useful
software to trick users into downloading or executing them.
2. No Self-Replication: Unlike worms or viruses, Trojans do not
self-replicate. They rely on user actions to spread.
3. Payload: Trojans carry a malicious payload that can range
from data theft and system damage to providing backdoor
access for cybercriminals.
4. Diverse Types: Trojans come in various forms, including
Remote Access Trojans (RATs), Keyloggers, and Banking
Trojans, each tailored for specific malicious purposes.
Common Types of Trojan Horses:
1. RATs (Remote Access Trojans): Provide attackers with unauthorized
access to the infected computer, enabling them to control it remotely.
2. Keyloggers: Record keystrokes and mouse clicks, allowing
cybercriminals to capture sensitive information like login credentials.
3. Banking Trojans: Target online banking users to steal financial
information and conduct fraudulent transactions.
4. Downloader Trojans: Download and install other malware
components onto the infected system.
5. Backdoor Trojans: Create a secret backdoor into the system,
enabling unauthorized access for malicious purposes.
Impact of Trojan Horses:
• Unauthorized access to sensitive information, including
personal data, financial details, and login credentials.
• System and data corruption or destruction.
• Theft of intellectual property or business secrets.
• Installation of additional malware, such as ransomware or
spyware.
Mitigation and Prevention:
1. Antivirus and Antimalware Software: Regularly
update and use reputable security software to detect
and remove Trojans.
2. Software Updates: Keep operating systems and
applications up-to-date to patch vulnerabilities.
3. Email and Web Browsing Security: Be cautious when
opening email attachments or clicking on suspicious
links.
Mitigation and Prevention:
4. User Education: Train users to recognize common
social engineering tactics and avoid downloading files
from untrusted sources.
5. Firewalls: Use firewalls to monitor and filter
incoming and outgoing network traffic.
6. Access Control: Implement least privilege access,
limiting user permissions to reduce the potential
impact of a Trojan infection.
Thank
You,

Hillary Roda
Ashvin Magnaye
Clarence Rabino

You might also like