SlideShare uma empresa Scribd logo
1 de 10
A computer worm is a standalone malware computer
 program that replicates itself in order to spread to other
 computers. Often, it uses a computer network to spread
 itself, relying on security failures on the target computer
 to access it. Unlike a computer virus, it does not need to
attach itself to an existing program. Worms almost always
 cause at least some harm to the network, even if only by
  consuming bandwidth, whereas viruses almost always
corrupt or modify files on a targeted computer. It's Kind of
                  like a virus, but not exactly.
• Each day, worms are becoming a more common
  occurrence on the Internet. As the incidents
  increase, we must be thinking proactively in order to
  lessen the negative effects these worms have on the
  Internet community. It is important to remember that
  the livelihood of many businesses is based on an
  Internet presence. The monetary losses incurred by
  businesses relating to these worms are hard to
  measure. Some estimate losses for each
  occurrence to be around $1 billion. 1 The true value
  of damages may never be known.
• Viruses can occur in games of all sort,
  people can find you username and
  search you on Google> or if you have
  an instagram!!!!!! if your following
  them, they can search you on Google
  and find out where you live, so don't
  put your location!!
• A computer virus is a computer program that
  can replicate itself and spread from one
  computer to another. The term "virus" is also
  commonly, but erroneously, used to refer to
  other types of malware, including but not
  limited to adware and spyware programs that
  do not have a reproductive ability. Malware
  includes computer viruses, computer worms,
  Trojan horses, most rootkits, spyware,
  dishonest adware and other malicious or
  unwanted software, including true viruses.
• Viruses can cause computer "break downs"
  which can turn off your computer completely,
  this can be caused by people or random links
  that cause viruses! People can hack your
  computer when your logged on to FaceBook,
  Twitter etc.. and hack your account so they
  can your pictures if you keep it private, some
  people can stalk you until you leave so they
  can get to the computer and cause a virus so
  they "own" your computer!
•   Your system will suddenly
    slow down.
•   You will see activity on your
    screen that you did not
    cause.
•   Data files become corrupted
    or are missing.
•   Unexpected changes to the
    content of files.
•   The program doesn’t run or
    it functions incorrectly.
•   Certain features aren’t
    available anymore.
• A Trojan horse, or Trojan, is a malicious application
  that masquerades as a legitimate file or helpful
  program but whose real purpose is, for example, to
  grant a hacker unauthorized access to a computer.
  Trojans do not attempt to inject themselves into
  other files like a computer virus. Trojan horses may
  steal information, or harm their host computer
  systems. Trojans may use drive-by-downloads or
  install via online games or internet-driven
  applications in order to reach target computers. The
  term is derived from the Trojan Horse story in Greek
  Mythology because Trojan horses employ a form of
  “social engineering,” presenting themselves as
  harmless, useful gifts, in order to persuade victims
  to install them on their computers.
• 1: Microsoft Process
  Explorer is an excellent way
  to determine it!!
• 2: Trend Micro’s HiJackThis
• 3: Kaspersky’s
  GetSystemInfo
• 4:Microsoft Baseline
  Security Analyzer
• 5: Secunia inspection
  scanners
• 6: Antivirus Programs
• 7: Microsoft’s malicious
  Software Removal Tool
• 8: SUPERAntiSpyware
• 9: Malwarebyte’s Anti-
  Malware
• 10: GMER
Definitions…
• GMER: An application that detects and removes
  rootkits.
• Masquerades: IPMASQ or MASQ are other
  names for this. allows one or more computers in
  a network without assigned IP addresses to
  communicate with the Internet using the Linux
  server’s assigned IP address.
• IP: Internet protocol, the method by which
  information is sent between any two computers
  on the Internet.
Definitions…
• GMER: An application that detects and removes
  rootkits.
• Masquerades: IPMASQ or MASQ are other
  names for this. allows one or more computers in
  a network without assigned IP addresses to
  communicate with the Internet using the Linux
  server’s assigned IP address.
• IP: Internet protocol, the method by which
  information is sent between any two computers
  on the Internet.

Mais conteúdo relacionado

Mais procurados

Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez JohnnAlvarez
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prezStudio Sheen
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1Sameep Sood
 

Mais procurados (20)

Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Internet threats
Internet threatsInternet threats
Internet threats
 
C 7
C 7C 7
C 7
 
Spyware
SpywareSpyware
Spyware
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
spyware
spywarespyware
spyware
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
MALWARE
MALWAREMALWARE
MALWARE
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
spyware
spywarespyware
spyware
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1
 

Semelhante a Virus trojanworm

Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)SHUBHA CHATURVEDI
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 

Semelhante a Virus trojanworm (20)

Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer virus
Computer virusComputer virus
Computer virus
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Malicious
MaliciousMalicious
Malicious
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Cyber security
Cyber securityCyber security
Cyber security
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Information security
Information securityInformation security
Information security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
computer security
computer securitycomputer security
computer security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 

Virus trojanworm

  • 1. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. It's Kind of like a virus, but not exactly.
  • 2. • Each day, worms are becoming a more common occurrence on the Internet. As the incidents increase, we must be thinking proactively in order to lessen the negative effects these worms have on the Internet community. It is important to remember that the livelihood of many businesses is based on an Internet presence. The monetary losses incurred by businesses relating to these worms are hard to measure. Some estimate losses for each occurrence to be around $1 billion. 1 The true value of damages may never be known.
  • 3. • Viruses can occur in games of all sort, people can find you username and search you on Google> or if you have an instagram!!!!!! if your following them, they can search you on Google and find out where you live, so don't put your location!!
  • 4. • A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses.
  • 5. • Viruses can cause computer "break downs" which can turn off your computer completely, this can be caused by people or random links that cause viruses! People can hack your computer when your logged on to FaceBook, Twitter etc.. and hack your account so they can your pictures if you keep it private, some people can stalk you until you leave so they can get to the computer and cause a virus so they "own" your computer!
  • 6. Your system will suddenly slow down. • You will see activity on your screen that you did not cause. • Data files become corrupted or are missing. • Unexpected changes to the content of files. • The program doesn’t run or it functions incorrectly. • Certain features aren’t available anymore.
  • 7. • A Trojan horse, or Trojan, is a malicious application that masquerades as a legitimate file or helpful program but whose real purpose is, for example, to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by-downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek Mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
  • 8. • 1: Microsoft Process Explorer is an excellent way to determine it!! • 2: Trend Micro’s HiJackThis • 3: Kaspersky’s GetSystemInfo • 4:Microsoft Baseline Security Analyzer • 5: Secunia inspection scanners • 6: Antivirus Programs • 7: Microsoft’s malicious Software Removal Tool • 8: SUPERAntiSpyware • 9: Malwarebyte’s Anti- Malware • 10: GMER
  • 9. Definitions… • GMER: An application that detects and removes rootkits. • Masquerades: IPMASQ or MASQ are other names for this. allows one or more computers in a network without assigned IP addresses to communicate with the Internet using the Linux server’s assigned IP address. • IP: Internet protocol, the method by which information is sent between any two computers on the Internet.
  • 10. Definitions… • GMER: An application that detects and removes rootkits. • Masquerades: IPMASQ or MASQ are other names for this. allows one or more computers in a network without assigned IP addresses to communicate with the Internet using the Linux server’s assigned IP address. • IP: Internet protocol, the method by which information is sent between any two computers on the Internet.