0% found this document useful (0 votes)
57 views

Iis Micro Project

This document discusses a micro project on malware done by 5 students. It defines malware as hostile software used to disrupt systems or access private information. Common types of malware discussed include viruses, Trojan horses, worms, spyware, zombies, phishing, spam, adware, and ransomware. Viruses replicate while Trojan horses masquerade as useful programs. Worms self-replicate over networks without user intervention.

Uploaded by

Krishna Fadadu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Iis Micro Project

This document discusses a micro project on malware done by 5 students. It defines malware as hostile software used to disrupt systems or access private information. Common types of malware discussed include viruses, Trojan horses, worms, spyware, zombies, phishing, spam, adware, and ransomware. Viruses replicate while Trojan horses masquerade as useful programs. Worms self-replicate over networks without user intervention.

Uploaded by

Krishna Fadadu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
You are on page 1/ 20

Micro project

INFORMATION TO IT SYETEM
Topic: MALWARE
GROP MEMBER‘s NAME AND
Enrollment no:
1. Parmar jay- 226170316084
2. Barot devarsh – 226170316008
3. Makwana mauli –226170316054
4. Patel kruti – 2261703116098
5. Fadadu krishna- 2261793116033


Project Description:

Short for malicious software.


• A is software used or created to disrupt
computer
operation, gather sensitive information, or gain
access to private computer systems.
• It can appear in the form of code, scripts, active
content, and other software.
• 'Malware' is a general term used to refer to a
variety
of forms of hostile, intrusive, or annoying software
Use Of malware:
• Many early infectious programs, including the first
Internet Worm, were written as experiments or pranks.
•Today, malware is used primarily to steal sensitive
personal, financial, or business information for the
benefit of others.
• Malware is sometimes used broadly against
government or corporate websites to gather guarded
information, or to disrupt their operation in general.
• However, malware is often used against individuals to
gain personal information such as social security
numbers, bank or credit card numbers, and so on.
Type of Malwre

1. Viruses
2. Trojan horses
3. Worms
4. Spyware
5. Zombie
6. Phishing
7. Spam
8. Adware
9. Ransomware
1. Virus
A program or piece of code that is loaded onto your
computer without your knowledge and runs against
your wishes.
 Viruses can also replicate themselves.
 All computer viruses are manmade.
 Viruses copy themselves to other disks to spread to
other computers.
 They can be merely annoying or they can be vastly
distractive to your files.
•Examples of computer viruses are:
 Macro virus
 Boot virus
 Logic Bomb virus
 Directory virus
 Resident virus
2.Trojan horses
 A Trojan Horse program has the appearance of
having a useful and desired function.
 A Trojan Horse neither replicates nor copies itself,
but causes damage or compromises the security of the
Computer.
A Trojan Horse must be sent by someone or carried
by another program and may arrive in the form of a
joke program or software of some sort.
 These are often used to capture your logins and
passwords.
Example of Trojans Hourses
• Remote access Trojans (RATs)
• Backdoor Trojans (backdoors)
• IRC Trojans (IRCbots)
• Keylogging Trojans.
3.worm
•A computer worm is a self-replicating computer
program.
•It uses a network to send copies of itself to other
nodes (computers on the network) and it may do
so without any user intervention.
•It does not need to attach itself to an existing
program.
4.spyware
 Spyware is a type of malware installed on
computers that collects information about users
without their knowledge.
 The presence of spyware is typically hidden from
the user and can be difficult to detect.
 Spyware programs lurk on your computer to steal
important information, like your passwords and
logins and other personal identification information
and then send it off to someone else.
5.Zombie
 Zombie programs take control of your computer and use it
and its Internet connection to attack other computers
or networks or to perform other criminal activities .
6.phisging
 Phishing (pronounced like the word 'fishing') is a
message that tries to trick you into providing
information like your social security number or bank
account information or logon and password for a web
site.
 The message may claim that if you do not click on the
link in the message and log onto a financial web site
that your account will be blocked, or other disaster.
7.Spam

 Spam is email that you did not request and do not want.
 One person's spam is another's useful newsletter or sale
ad.
 Spam is a common way to spread viruses, trojans, and
the like.
8.Adware
 Adware (short for advertising-supported software) is a
type of malware that automatically delivers
advertisements.
 Common examples of adware include pop-up ads on
websites and advertisements that are displayed by
software.
 Often times software and applications offer “free”
versions that come bundled with adware.
9.Ransomware

 Ransomware is a form of malware that essentially holds a


computer system captive while demanding a ransom.
 The malware restricts user access to the computer
either by encrypting files on the hard drive or locking
down the system and displaying messages that are
intended to force the user to pay the malware creator
to remove the restrictions and regain access to their
computer.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy