Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading content…
Loading…
Transcript

Types of Computer Threats

Brian Mercado

Different Types of Threats

Different Types of Computer Threats

1. Worms

2. Computer Viruses

3. Bots and Botnets

4. Trojan Horses

5. Rootkit

6. Ransomware

7. Adware and Scams

8. Spyware

9. Spam and Phishing

Worms

Worms

Worms are spread via software vulnerabilities or phishing attacks. Once a worm has installed itself into your computer’s memory, it starts to infect the whole machine and in some cases… your whole network.

Rootkit

Rootkit

Spyware

Spyware secretly records your online activity, harvesting your data and collecting personal information such as usernames, passwords and surfing habits.

Spyware

Bots and Botnets

Bots and Botnets

A bot is a computer that’s been infected with malware so it can be controlled remotely by a hacker.

That bot (aka a zombie computer), can then be used to launch more attacks or to become part of a collection of bots (aka a botnet).

Viruses

Unlike worms, viruses need an already-infected active operating system or program to work. Viruses are typically attached to an executable file or a word document.

Computer Viruses

Spam and Phishing

Spam and Phishing

Phishing is a type of social engineering attack, rather than a type of malware. But is a common method of cyber attack. Phishing is successful since the emails sent, text messages and web links created look like they’re from trusted sources. They’re sent by criminals to fraudulently acquire personal and financial information.

Adware and Scams

Adware is one of the better-known types of malware. It serves pop-ups and display ads that often have no relevance to you.

Adware and Scams

Ransomware

Ransomware denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.

Ransomware

Trojan Horses

Trojan Horses

Just as it sounds, a Trojan Horse is a malicious program that disguises itself as a legitimate file. Because it looks trustworthy, users download it and… hey presto, in storms the enemy.

Learn more about creating dynamic, engaging presentations with Prezi