Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.



No description

Charlotte Neal

on 16 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Malware

Spyware Adware Malware Keyloggers There are two types of keyloggers: one is a hardware keylogger, which plugs into your keyboard; and the other is a software keylogger, a program which monitors keystrokes on your computer.

Keyloggers can be good - for example, parents can use them to monitor their children. However, they can also be used as malware to find out passwords. Wabbits These are very rare, because where other types of malware will often spread to other machines, wabbits will not. They copy themselves onto one computer multiple times, taking up memory and causing the computer to crash or freeze. What is malware? 'malicious software, such as a virus, which is specifically designed to disrupt or damage a computer system.' - Oxford English Dictionary 'software that enters a computer system without the consent of the owner and which harms the system.' - Textbook Types of malware viruses
Trojan horses
keyloggers Backdoors Backdoors install themselves onto a computer, and either hide themselves or disguise themselves as a program. They open a 'backdoor' in the computer, allowing hackers or malware to be sent in. Definitions Viruses A virus is software that breaks into a computer without the owner's consent or knowledge, and can pass onto other computers the same way. They are often attached to files and applications. Are they harmful? Not always, however most are. They change, delete or damage data in files. They can't damage the hardware, however they can damage the software that enables it to function. Can they damage hardware? How can
I avoid malware? Get some anti-virus software. Avoid visiting inappropriate websites - these often contain malware! Scan email attachments. Don't open them unless you trust the sender. Don't download software from websites that aren't genuine. WORMS Worms copy themselves and spread themselves around without a user helping them. They are not attached to any other files. They consume network resources, slow the network down and, like viruses, can damage, delete or change files. They can also provide access to the computer they're in for other malware. Trojan Horses A Trojan horse is software that appears to be viable or useful, but may allow unauthorised access to the host's computer system. This is why they are called Trojan Horses - because they look good and innocent but they damage your computer. Often they have to be controlled by another user. Rather than deleting or changing files, they often target financial information, etc. What is adware/spyware? This collects information about users without their knowledge or permission. This is software that is automatically downloaded and installed onto a computer and advertises. It is not harmful but it is a nuisance. By Charlie Neal McAfee
£40 Free
Full transcript