0% found this document useful (0 votes)
35 views

Sysad Reviewer 2

Uploaded by

Krystan Gungon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Sysad Reviewer 2

Uploaded by

Krystan Gungon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 78

Systems

Administration
Rodelio M. Liwag
System Administration

What is Systems Administration?

The configuration and


management of the hardware,
software and operating systems
also known as our infrastructure
used to support users and
devices and the applications
they rely on to do their job.

1
System Administration

Why should one become a Systems Administrator ?


The management of hardware, software, users and devices

 Great starting point in IT


 In-demand with fantastic pay
 Learning on the job is the job.
 It is satisfying and rewarding
 Anyone can do it.

2
System Administration

Great starting point in I.T.


The Systems Administrator is
exposed to everything and
everyone. Hardware, software,
users and devices.
Plus, every team in the
organization relies on the SysAd to
ensure that the infrastructure is
operating normally day in and day
out.
3
System Administration

In-demand with fantastic pay

This career path pays extremely


well because of its importance
to day to day operation of the
organization. Its been around
the longest and will continue to
be around for a long time.

4
System Administration

Learning on the job, IS the JOB.

Every single day the System


Administrator will be problem
solving, trouble shooting,
playing with new technology,
while getting paid to do.

5
System Administration

Satisfying and Rewarding


The System Administrator is
helping people, team mates and
even himself as he configure,
build, and manage processes and
as he gains experience and level
up, he’ll begin to automate those
processes.
And that is where the fun, really
begins.
6
System Administration

Anyone can do it.

Anyone can be, THE one. It is a


field with low barrier to entry,
and there are instances of
people going from zero to
junior System Administrator in
six months.

7
System Administration

Roles and Responsibilities of a Systems Administrator


Every day is a mystery. Some days will
be quiet and peaceful. The System
Administrator will have the freedom
and flexibility to work on projects,
research new technology, automate
existing processes, or, surf the internet.
Other days will be hectic. Servers
crashing, co-workers crying, relatives
calling because the wifi crashed. The
point is, it is a diverse gig that will keep
would be SysAd on his/her toes. And
overtime, will be developing a diverse
skill set. 8
System Administration

Roles and Responsibilities of a Systems Administrator

The Network Administrator. These


guys and gals are responsible for the
organization’s network infrastructure
which consists of routers and switches
and the traffic flowing through them.

9
System Administration

Roles and Responsibilities of a Systems Administrator


The Web Administrator. These folks are
responsible for maintaining web servers. Web
server is a fancy term for a server, a machine
in our data center that hosts websites and
web services.

They are also responsible for exposing those


websites and web services externally to the
internet as well as to our internal users.
10
System Administration

Roles and Responsibilities of a Systems Administrator


The Security Administrator. These folks are
responsible for securing the organization’s
systems and networks. They are also responsible
for firewalls. Both hardware firewall living in the
inside and outside the network, as well as
software firewalls living on the machines.
You may think of them as traffic police. Or mall
police. Only instead of sitting in malls, they sit on
the organization’s network. Punching holes in the
firewall to allow applications to access certain
services within the network and local machines.
11
System Administration

Roles and Responsibilities of a Systems Administrator

The Database Administrator. They are the


ones responsible for the organization’s
database servers. And the database is
living on those servers. Databases are used
by applications to read and write data. So
these folks are responsible for ensuring
efficiency and integrity of that data.
12
System Administration

Roles and Responsibilities of a Systems Administrator


The System Administrator. These people are special.
And here’s why. All previously discussed roles and
other roles not mentioned such as developers,
standard users and power users, they all need to
through
go the system administrator usually to request
permissions via their user accounts to perform their
configuration and everyday duties. And just to
access the system in general.
Another interesting thing for Sys Admins is for
smaller companies, he/she may wear many hats.
He/she may for example be the sys admin, network
admin, and database admin all at the same time. But
for large organizations with thousands of

13
employees, the four administrative roles are held by
different people or groups of people. Everybody
NEEDS a sys admin.
System Administration

What does a System Administrator actually do ?

 Applying Operating System


updates
 Configuring Systems and
Software
 Securing access to systems and
data
 Performing backups and
restores
 Analyzing and trouble
shooting
 Assisting users and team
14
15
System Administration

Roles and Responsibilities of a Systems Administrator


Applying Operating System updates.

One of the primary responsibilities of a sys


admin is installing and configuring
operating systems.

On the server at the data center and on


workstations at the client’s site. And also
maintaining those operating systems by
applying patches, updates and hot fixes.
16
System Administration

Roles and Responsibilities of a Systems Administrator


Configuring Systems and Software.

On the server at the data center and on


workstations at the client’s site. And also
maintaining those operating systems by
applying patches, updates and hot fixes.

And also installing and configuring the


software that are going to live on those
systems.
17
System Administration

Roles and Responsibilities of a Systems Administrator


Configuring Systems and Software.
Sys admins are also responsible for
dictating and delegating access to
both our machines and the data
within our environment.
They are also responsible for
business
continuity. Which is a fancy word for
minimizing data in the event of a
disaster.
18
System Administration

Roles and Responsibilities of a Systems Administrator

Performing daily backups and restores.


Another important responsibility for sys
admins is taking daily backups of the system.
Because if a disaster were to occur, like the
power can go out and zap all of our
systems, or a natural disaster which seem
occur much more frequently these days, we
are not at a total loss.
So when that happens, the organization can
simply restore from the most recent backup
to prevent data lost.
19
System Administration

Roles and Responsibilities of a Systems Administrator

Analyzing and Troubleshooting.


Sys admins will be analyzing and
troubleshooting their own system related
issues like a server that is acting up and is
not performing as it should and is really slow.
Sys admins need to get on to that server to
figure out why.
Or a user related issue. For example you get
a call from purchasing at 3 in the afternoon
saying they can’t login. It is the Sys admin’s
responsibility to find their account, unlock it
or reset their password.
20
System Administration

Roles and Responsibilities of a Systems Administrator

Assisting users and team


members.
Everything flows though
the
system administrator. Helping
users with their accounts and their
access. Helping team members
with their accounts and their
access, to get all of their jobs
done.
End for now
Systems
Administration
(Part 2)

Rodelio M. Liwag
System Administration

Certifications and Exams

Certification is a huge resume’


booster and extremely
important specially for those
just starting out in I.T.
They prove to employers that
you have what it takes to do
the job.
1
System Administration

Types of Certifications
Vendor Neutral Certifications. – Certifications
that DO NOT target any specific hardware or
platform or vendor. Baseline certifications
that apply to ALL vendors and technologies.

 CompTIA A+
 CompTIA Network+
 CompTIA Server+
 CompTIA Linux+
2
System Administration

Types of Certifications
Anyone wanting to get into IT should tackle
CompTIA A+ and CompTIA Network+ first.
These will give you a solid foundation that
you can work on. And later on, narrow your
scope to specific fields.

CompTIA A+ consists of two (2) exams. Think


of it as a hardware exam as it covers PC
hardware, mobile devices hardware and also
a little bit of hardware installation across all
the OS, windows, IOS, Android, OS X and
Linux.

3
System Administration

Types of Certifications

The CompTIA Network+ consists of


a single exam and covers
configuration, management and
troubleshoot of wired and wireless
network devices.

So if you are new to IT, CompTIA+


and CompTIA Network+ is where
you should start.

4
System Administration

Types of Certifications

The CompTIA Server+ covers


server architecture, storage,
networking and troubleshooting
plus disaster recovery.

The CompTIA Linux+ - Covers


common task in all the major
distributions of Linux.

5
System Administration

Types of Certifications

The CompTIA Server+ covers


server architecture, storage,
networking and troubleshooting
plus disaster recovery.

The CompTIA Linux+ - Covers


common task in all the major
distributions of Linux.

6
System Administration

Types of Certifications
Microsoft has some of the more popular Systems
Administration certifications a lot of organizations
run Windows. Windows 8, 10, 11 on the client
side. And Windows Server in their data center.

 Microsoft Certified
professional
 Microsoft Technology
Associate
 Microsoft Certified Solutions
Associate
 Microsoft Certified Solutions
Expert
 Microsoft Certified Solutions 7
System Administration

Types of Certifications

Microsoft Certified Professional (MCP). If you pass


ANY Microsoft Exam, you’re an MCP.

Microsoft Technology Associate – Exams that are


vendor specific version of CompTIA+ and
CompTIA Network+. They are foundation for
whatever role or field in IT you want to get in to.

8
System Administration

Types of Certifications

Microsoft Certified Solutions Associate. (MCSA). By


far the most popular, most desired certification by
employers. These are role-based certifications.

There is an MCSA for productivity/office. There is


an MCSA for Mobility, for Cloud, for infrastructure.

And on the Systems Administrations side. It


Actually consists of three (3) exams. One for
compute, one for networking, and one for Active
Directory.

9
System Administration

Types of Certifications
Microsoft Certified Solutions Expert. (MCSE) –
You just need to pass a single exam from a
list of exams within a role. Those list of exams
are known as electives and are usually very
specific, focusing on a single technology. You
pass one of those, you become an MCSE (for
a year). You’d be given a fancy Microsoft
Badge.

Microsoft Certified Solutions Developer


(MCSD). This has nothing to do with Systems
Administration as this targets developers
building mobile, web and desktop
applications.

10
System Administration

Types of Certifications

 Linux Essentials
 LPIC-1 Certified
Administrator
 LPIC-2 Certified Engineer
 Red Hat Certified Systems
Administrator.
10
System Administration

Types of Certifications

Linux Essentials – Consist of a single exam


that covers awareness and knowledge of all
the major Linux distribution like Debian,
Ubuntu, Suse, CentOS, RedHat. And also a
little bit about finding your way around the
Linux System through basic command line
operations.
LPIC-1 Certified Administrator. This is basic
Administration focused on installation and
configuration of hardware and the Linux
operating system. Packages and package
management and a little bit deeper in the
command line operations. And some
scripting. This consists of 2 exams.
11
System Administration

Types of Certifications

LPIC-2 Certified Engineer – This covers the


advance side of Systems Administration. This
covers networking services like DNS, DHCP,
SSE, Web Servers, File Servers etc. This
consist of two (2) exams.

RedHat Certified System Administrator. This is


vendor specific (RedHat) certification exam
for Linux.

12
Systems
Administration
(Part 3)

Rodelio M. Liwag
System Administration

Devices and Technologies


The biggest responsibility of a System
Administrator is managing devices; and the
technologies that lives on those devices.
Servers gets all the glory and that’s really
where most System Administrator’s
responsibility lies. Making sure a server has
purpose and that it fulfills that purpose day in
and day out.
But there are other physical devices that an
organization may need the SA to support, like
workstations, printers and scanners just to
name a few.

1
System Administration

Types of Servers
Servers. –There are many types of
servers in a data center. Rack servers,
Tower servers, Blade servers. All
these different types of enclosures Blade Server

that houses a server that provides,


power, cooling, and a much more
efficient usage of space.
Rack Server
The System Administrator can
remotely manage and configure all
of these servers from a centralized
console. Tower Server
2
3
System Administration

Server Types

 File Servers
 Web Servers
 Database Servers
 Application Servers
 Print Servers
 Mail Servers
 Virtualization Servers
4
System Administration
Server
The definition of a server and the purpose of a
server is to provide network services to its
users, to software and applications and to other
servers within its environment.

The server does not actually do anything or


have any purpose until we put something on it
in the form of software or a feature that is built
into the operating system.

Once we do get something on it, it is that


server ’s job to provide that service and its our
job as SysAdd to ensure that server continues to
provide such service.
5
System Administration

Server
A server can be dedicated to a single role (ideal),
oftentimes, you’ll see a server takes on multiple
role. An example would be a file server, that is also
an email and a web server. These are known as
multi purpose multi faceted servers.
System Administration

File Servers
The most popular type of server that you’ll
find in every environment and oftentimes
multiples in every environment is the File
Server.
This type of server is used to store content
for everybody. Users store their files.
Developers store their applications and
websites and the Administrators store
things like utilities and tools and backups.
Another big responsibility of a SysAdmin is
managing the storage devices that lives
underneath the file server. This is what is
known as the storage subsystem.
6
System Administration

Web Servers
Another popular type of server
you’d find in most organizations
today are Web Servers.

Which is used to exposed websites


externally to the Internet and
internally to the organization’s
users on the intranet (internal or
company network).
7
System Administration

Database Servers

Another popular type of server is


the Database Server. Which is
primarily used by websites and
applications to read and write data
into a structured database. This is
different from a file server which
stores unstructured data.

8
System Administration

Application Servers
Application Servers are used to host the
middle-tier components of an
application.

So the front-end of your application


which is a website or the application
running on the desktop.

There is the server-side components


which is really just the code living on the
server, and you’ve got the back which is
the database.
The Application Server is the middle-
tier.
9
System Administration

Print Servers 10
Print servers are used to expose printers
to the network so everyone can use
them. And it also gives the ability to
centrally manage the printers, the
drivers associated with them and the
print jobs that are running on them.

Printers are another hardware device


that SysAdmins are highly responsible
for.
System Administration

Mail Servers

Mail servers are used to store


process and deliver emails.

11
System Administration

Virtualization Servers

Virtualization server are used to


cut down the amount of hardware
in the data center. One Server
can host many servers and
operating systems.

12
Systems
Administration
(Part 4)

Rodelio M. Liwag
Storage Devices
Storage Devices 1
Another very important piece
hardware that Systems Administrator is
of
responsible for are Storage Devices.
And they are arguably just as important
as servers mainly because they are
usually attached to them.
This is a look at the many types of
storage devices available to Systems
Administrator like HDDs, SSDs, DAS,
NAS, SAN and also the technologies that
drives these devices and where they fit in
a network topology.
2
Storage Devices
Locally Attached Storage
Hard Disk Drives (HDD) have been
around forever since the 1950s so
they are ancient technology.

Sixty plus years and still, widely used


today. They are also referred to as
magnetic or mechanical disk. And
that is because they used magnetism
to store data on a rotating platter.

They are big and slow compared to


SSDs. But their major advantage is
that they can store large amount of
data cheaply. And that is why they
are still around today
3
Storage Devices
Locally Attached Storage
Solid State Drives (SSD) Use flash
storage that contains no moving
parts whatsoever as data is stored
on a microchip in the drive.

A common configuration in
desktops and laptops is to use SSD
as system or boot drive for
operating system and installed
applications. The larger capacity
HDDs is used for everything else.

The primary advantage of SSD over


HDD is speed.
4
Storage Devices

Business Level Storage

 Direct-Attached
Storage (DAS)
 Network-
Attached
Storage (NAS)
 Storage Area Network
(SAN)
5
Storage Devices
Direct-Attached Storage
Direct-Attached Storage (DAS)- Is a low-
cost, low maintenance solution, where a
storage subsystem is either a part of or,
directly attached to, the servers.

This could be anything from a stack of


HDDs and SSDs inside of the machine or
in its own enclosure externally connected
to the machine.

It is great for small businesses that do not


have the I.T. staff or the budget to handle
the more complex storage solutions.
6
Storage Devices
Network-Attached Storage
NAS – When the storage sub-system
moves to the network itself and
connected directly to the network switch.
NAS is dedicated to file sharing and
storage and packed with all the bells and
whistles to support it. For example, the
biggest reliability features built into them
is RAID. And it is supported at the
hardware level.

RAID stands for redundant array of


inexpensive disk and is designed to NAS’ Main benefits are RELIABILITY and
protect us from data loss if we were to SCALABILITY. With the downside being they are
directly attached to the network and can results in
lose one of those disks due to a failure or network congestion slowing the network for
everybody else.
a disaster.
Storage Area Network
7
Storage Devices

SAN – A storage area network gives us


the best of both worlds. The performance
of a DAS with the scalability of a NAS. In
this architecture, the storage devices are
still directly connected to a switch. But
they are connected to a special high-
speed switch known as a fiber channel
switch. And that gives them their own
high speed network known as a SAN.

The upside is that they are incredibly fast


and scalable. The downside is that they
are expensive and complex. That is why
they are generally used in enterprise
environments.
8
Storage Devices Software Defined Storage

Software-defined storage (SDS) is a


storage architecture that separates storage
software from its hardware. Unlike
traditional network-attached storage
(NAS) or storage area network (SAN)
systems, SDS is generally designed to
perform on any industry-standard or x86
system, removing the software’s
dependence on proprietary hardware. For
example Microsoft has Storage Spaces
(desktop) and Storage Spaces Direct
(enterprise and data center) which is built
into every version of Windows
Storage Spaces
9
Storage Devices

Storage Spaces allows us to create a huge


pool from our physical disks.

For example if we have six hard disk


drives and we want to create an E drive
and a D drive. Once we create that pool,
we have all of those storage combined
into one.

If those were 1 terabyte disk, we will


have six terabytes to work with. We can
then create the E and D drive as a virtual
disk.

Storage Spaces Direct ONLY works on


Systems
Administration
(Part 5)

Rodelio M. Liwag
Networking

There is a good amount of


Networking
1
crossover between the
Administrator ’s role and
Systems
Network
the Administrator ’s role.
As a Systems Administrator one
must be familiar with both the
physical side of the network,
is the hardware that makes up the
(that
network, switches and routers and
firewalls) as well as the logical
of
sidethe network, which is how
configure
one and manage them
through software. An example of
which is IP addressing.
2
Networking
Networking Scenario
Imagine for a moment that you are a Systems
Administrator and it is just another day on the job.
You go to work, you have lunch, you get back and
you feel like surfing the internet to check your
social media feed just for a minute before you get
back to it. But, the internet doesn’t work.

What happened, and how do you go about fixing


it? It could be so many things. Is it the firewall, did
something change ? Did a higher up admin block
your access, or your news feed ? Is it a switch or a
router, some kind of networking device problem?
Is it your machine, or is it a networking service like
DHCP or DNS?
3
Storage Devices
IP Addressing
The very first thing you should learn
about networking, is IP addressing and
the TCP/P protocol. TCP/IP is the
transmission control protocol, IP is the
Internet protocol.

Think of that as a packet that wraps the


data that flows across the wires for all
of our devices to communicate.

These devices are identified on the


network via its IP address. Which is a
32-bit number that uniquely identifies
a host or device on a TCP/IP network.
IP Addressing
4
Networking

Every single device whether it’s a


desktop a workstation, a mobile device
and even routers have an IP addresses,
servers as well.

You can actually see your IP address by


running a handy utility known as IP
config. If you run it (via terminal or
command prompt), it will return all IP
information for each network device
attached to your machine.
5
Networking
Understanding IP Address
The IP address is your machine’s unique
identifier in the network. The subnet
mask tells you to which network you
belong to.

The default gateway is how your machine


will get outside of the local area network
to places like the internet.

The default gateway is usually a router


on your local network that has the
intelligence built in to send traffic beyond
the local network out to the Internet.
6
Networking
The PING utility
Another handy utility that Network Administrator should
be familiar with is PING. Ping is a command line (or
terminal) utility to test connectivity between machines on
the local network and even out to the internet.

When there is no Internet connectivity, this is a good


place to start to try to isolate the problem.

In summary, IP addressing is a lot like sending a letter to a


friend or family member that lives far away. You write the
letter, you put it in an envelope, and you write their
address on it to make sure that it gets delivered to that
location. That is exactly what IP address is in our network.
7
Networking
Switches
A switch is what facilitates
communication between a local
network. All of our devices are
connected to a switch and all that traffic
goes through the switch to get to its
destination from its source.

There’s actually two type of unmanaged


and managed. Unmanaged switches
work out of the box and cannot be
configured. Managed switches can be
configure and gives admin greater
control of the switch.
Routers
8
Networking

Routers are a lot like switches


and they connect multiple
networks together and have the
ability to forward traffic outside
of the local network.

And oftentimes they come with a


built in firewall and all kinds of
features to control traffic.
Access Point
9
Networking

Access point is a traffic related


networking device that allow us to
extend the reach of our local
network to support mobile devices.
Firewall
10
Networking

Firewalls monitor incoming and outgoing


traffic. We configure security rules on
these firewalls to allow or block specific
kinds of traffic. In home networks, the
firewall is usually built into the router.

In a business environment, we have


dedicated devices that sits at the
perimeter of our network and are usually
the first line of defense against any
malicious behavior. i.e. hacking. We also
have software firewalls that are built in to
operating systems that operate much like
hardware firewalls and gives us another
line of defense.
DHCP
11
Networking

DHCP or Dynamic Host Configuration


Protocol. Its job is to provide automatic
assignment of IP addresses and allows
a System Administrator to centrally
administer of IP addresses across all the
devices on our network.

DHCP is widely used in almost every


networks today. In home networks,
DHCP is a function of the router, is built
into them and is configured to work out
of the box. In business networks you
need to install, configure and manage
DHCP on its own server.
DNS
12
Networking

DNS or Domain Name System is


responsible for translating IP addresses to
host names and host names into IP
addresses.

Computers understand IP addresses,


humans understand names. Computers
communicate (in the network) via IP
addresses. So, whenever we want to look
up a website, say google.com, we type
that into our browser, the browser needs
to figure out what machine is hosting
google.com and it uses DNS to translate
that name to an IP address.
Computer threats are malicious actions or activities that target computer
systems, networks, and data, with the intent to compromise their integrity,
availability, or confidentiality. These threats can come in various forms and
can have different motivations. Here are some common types of computer
threats:
1.Malware: Malware is a broad category of malicious software designed to harm, disrupt, or gain unauthorized access to
computer systems. Common forms of malware include viruses, worms, Trojans, spyware, and ransomware.

2.Viruses: Computer viruses are programs that attach themselves to legitimate files and replicate when those files are executed.
They can spread from one computer to another through infected files or email attachments.

3.Worms: Worms are self-replicating programs that can spread across networks and systems without any user intervention.
They can consume network bandwidth and degrade system performance.

4.Trojans (Trojan Horses): Trojans appear to be legitimate software but contain malicious code. They can create backdoors for
hackers, steal sensitive data, or carry out other harmful actions.

5.Ransomware: Ransomware encrypts a user's files or entire system, making them inaccessible. Attackers demand a ransom
from the victim to provide the decryption key.
6.Spyware: Spyware is designed to secretly collect information about a user's activities, such as browsing habits, keystrokes,
and login credentials. This information is then sent to third parties without the user's consent.

7.Adware: Adware displays unwanted advertisements to users and often comes bundled with legitimate software. While not as
malicious as other threats, it can be annoying and impact system performance.

8.Phishing: Phishing attacks involve tricking users into revealing sensitive information like passwords, credit card numbers, or
personal data by posing as a trustworthy entity via email, websites, or other means.
1.Social Engineering: Social engineering attacks manipulate individuals into revealing confidential information or performing
actions that compromise security. These attacks often exploit human psychology rather than technical vulnerabilities.

2.Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks: DoS attacks overload a system or network to make
it unavailable to users. DDoS attacks involve multiple compromised systems attacking a target simultaneously to overwhelm it.

3.Zero-Day Exploits: These are attacks that target vulnerabilities in software or hardware that are not yet known to the vendor or
have not been patched. They are called "zero-day" because there are zero days of protection before a fix becomes available.

4.Insider Threats: Insider threats occur when individuals within an organization misuse their access to compromise systems, steal
data, or engage in other malicious activities.

5.Botnets: Botnets are networks of compromised computers, known as "bots" or "zombies," controlled by a central entity. They are
often used for activities such as spam distribution, DDoS attacks, or cryptocurrency mining.

6.Rootkits: Rootkits are stealthy forms of malware that gain unauthorized access to a system and modify its operating system to
hide their presence. They are difficult to detect and remove.

7.Drive-By Downloads: These attacks occur when a user unintentionally downloads malicious software while visiting a
compromised website or clicking on a deceptive link.
Malware, short for "malicious software," refers to any software or code
intentionally designed to harm, exploit, or compromise computer systems,
networks, and user data. Malware can take various forms and serve
different malicious purposes. Here are some common types of malware:
1.Viruses: Viruses are malicious programs that attach themselves to legitimate files or programs and can replicate when those files
are executed. They are designed to spread from one computer to another, often causing damage or corruption of files and
applications.

2.Worms: Worms are self-replicating malware that can spread across networks and systems without user intervention. They
typically exploit vulnerabilities in network services to propagate and can consume network bandwidth and slow down system
performance.

3.Trojans (Trojan Horses): Trojans disguise themselves as legitimate software or files to deceive users into installing them. Once
activated, they can perform various malicious actions, such as creating backdoors, stealing data, or spying on the victim.

4.Ransomware: Ransomware encrypts a user's files or entire system, making them inaccessible. Cybercriminals then demand a
ransom payment in exchange for the decryption key. Ransomware attacks can lead to data loss and financial damage.

5.Spyware: Spyware secretly monitors a user's activities and collects information, such as keystrokes, login credentials, and
browsing habits. This stolen information is often sent to third parties without the user's knowledge or consent.

6.Adware: Adware displays unwanted advertisements to users, often in the form of pop-up ads or banners. While not as malicious
as other malware types, adware can be intrusive and negatively affect system performance.
1.Keyloggers: Keyloggers record a user's keystrokes on their keyboard, capturing sensitive data like passwords and
credit card numbers. Cybercriminals can then use this information for fraudulent purposes.

2.Botnets: Botnets are networks of compromised computers, often controlled by a central entity or hacker. They can be
used for various malicious purposes, including sending spam emails, launching Distributed Denial of Service (DDoS)
attacks, or mining cryptocurrencies.

3.Rootkits: Rootkits are stealthy malware that gain unauthorized access to a system and modify its operating system to
hide their presence. Rootkits are challenging to detect and remove, making them especially dangerous.

4.Backdoors: Backdoors are hidden entry points into a system, allowing unauthorized access. They are often created
by malware or malicious actors to maintain access to a compromised system.

5.Fileless Malware: Fileless malware operates in memory and doesn't rely on traditional files or executables. This
makes it harder to detect using traditional antivirus methods.

6.Polymorphic Malware: Polymorphic malware can change its code or appearance each time it infects a new system,
making it difficult for antivirus programs to identify and remove.

You might also like