Iis Micro Project
Iis Micro Project
INFORMATION TO IT SYETEM
Topic: MALWARE
GROP MEMBER‘s NAME AND
Enrollment no:
1. Parmar jay- 226170316084
2. Barot devarsh – 226170316008
3. Makwana mauli –226170316054
4. Patel kruti – 2261703116098
5. Fadadu krishna- 2261793116033
Project Description:
1. Viruses
2. Trojan horses
3. Worms
4. Spyware
5. Zombie
6. Phishing
7. Spam
8. Adware
9. Ransomware
1. Virus
A program or piece of code that is loaded onto your
computer without your knowledge and runs against
your wishes.
Viruses can also replicate themselves.
All computer viruses are manmade.
Viruses copy themselves to other disks to spread to
other computers.
They can be merely annoying or they can be vastly
distractive to your files.
•Examples of computer viruses are:
Macro virus
Boot virus
Logic Bomb virus
Directory virus
Resident virus
2.Trojan horses
A Trojan Horse program has the appearance of
having a useful and desired function.
A Trojan Horse neither replicates nor copies itself,
but causes damage or compromises the security of the
Computer.
A Trojan Horse must be sent by someone or carried
by another program and may arrive in the form of a
joke program or software of some sort.
These are often used to capture your logins and
passwords.
Example of Trojans Hourses
• Remote access Trojans (RATs)
• Backdoor Trojans (backdoors)
• IRC Trojans (IRCbots)
• Keylogging Trojans.
3.worm
•A computer worm is a self-replicating computer
program.
•It uses a network to send copies of itself to other
nodes (computers on the network) and it may do
so without any user intervention.
•It does not need to attach itself to an existing
program.
4.spyware
Spyware is a type of malware installed on
computers that collects information about users
without their knowledge.
The presence of spyware is typically hidden from
the user and can be difficult to detect.
Spyware programs lurk on your computer to steal
important information, like your passwords and
logins and other personal identification information
and then send it off to someone else.
5.Zombie
Zombie programs take control of your computer and use it
and its Internet connection to attack other computers
or networks or to perform other criminal activities .
6.phisging
Phishing (pronounced like the word 'fishing') is a
message that tries to trick you into providing
information like your social security number or bank
account information or logon and password for a web
site.
The message may claim that if you do not click on the
link in the message and log onto a financial web site
that your account will be blocked, or other disaster.
7.Spam
Spam is email that you did not request and do not want.
One person's spam is another's useful newsletter or sale
ad.
Spam is a common way to spread viruses, trojans, and
the like.
8.Adware
Adware (short for advertising-supported software) is a
type of malware that automatically delivers
advertisements.
Common examples of adware include pop-up ads on
websites and advertisements that are displayed by
software.
Often times software and applications offer “free”
versions that come bundled with adware.
9.Ransomware