Want to create interactive content? It’s easy in Genially!
MALWARE PRESENTATION
Tiago Miguel de Sousa Silva
Created on May 9, 2023
English presentation about malware. This includes a full list of malware types with their respective description, explanation and, in some cases, including an example.
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Geniaflix Presentation
View
Vintage Mosaic Presentation
View
Shadow Presentation
View
Newspaper Presentation
View
Zen Presentation
View
Audio tutorial
View
Pechakucha Presentation
Transcript
Common Threats and attacks
Cybersecurity
Malware
INDEX
Worm
Malware
Code Red Worm
Timeline
Ransomware
Timeline
Cybersecurity
Other malware
Virus
Thanks
Trojan Horse
malware
What is malware?
Malware is short for malicious software or malicious code. It is a code or softwaree that is specifically designed to: - Damage- Disrupt- Steal- Inflict some other "bad" or illegitimate action on data, hosts, or networks. It is importante to know about malware because threat actors and online criminals frequently try to trick users into installing malware to help exploit security gaps.
Cybersecurity
+INFO
1988
1971
A program called "ANIMAL" is generally considered the world's first example.
Worm
Virus
1975
"The Morris Worm" was the first worm malicious program released in the internet.
This type of virus would spread through human interaction via the copying of floppy disks.
Trojan Horse
1989+
With the advancement of the internet and all that it brings with it new malware is bound to appear.
According to Becker's Hospital Review, this is the first ransomware appearence.
Other malware
Cybersecurity
Today
1989
Other malwares like Spyware, Adware and Scareware exist to harm users all over the globe.
New malware
Ransomware
Cybersecurity
For example, when someone connects an infected USB drive to their PC, the virus will enter the PC. The virus may then infect a new USB drive, and spread to new PCs.
virus
What's a virus?
A virus is a type of malware that spreads by inserting a copy of itself into another program. After the program is run, viruses then spread from one computer to another, infecting the computers.
+INFO
trojan horse
What's a Trojan Horse?
Trojan horse malware is software that appears to be legitimate, but it contains malicious code which exploits the privileges of the user that runs it. Often, Trojans are found attached to online games. Users are commonly tricked into loading and executing the Trojan horse on their systems. While playing the game, the user will not notice a problem. In the background, the Trojan horse has been installed on the user’s system. The malicious code from the Trojan horse continues operating even after the game has been closed.
Cybersecurity
+INFO
Cybersecurity
Most worm attacks consist of the following three components: - Enabling vulnerability - Propagation mechanism- Payload
worm
What's a worm?
Computer worms are similar to viruses because they replicate and can cause the same type of damage. Specifically, worms replicate themselves by independently exploiting vulnerabilities in networks. Worms can slow down networks as they spread from system to system.
+INFO
Cybersecurity
Code red worm
The Code Red Worm infection
Worms are responsible for some of the most devastating attacks on the internet. In 2001, the Code Red worm had initially infected 658 servers. Within 19 hours, the worm had infected over 300,000 servers.
+INFO
Ransomware
What's a ransomware?
Currently, the most dominating malware is ransomware. Ransomware is malware that denies access to the infected computer system or its data. The cybercriminals then demand payment to release the computer system. Ransomware frequently uses an encryption algorithm to encrypt system files and data. The majority of known ransomware encryption algorithms cannot be easily decrypted, leaving victims with little option but to pay the asking price.
Cybersecurity
+INFO
01
02
03
Spyware
Adware
Phishing
What's a Spyware?
What's a Adware?
What's Phishing?
Cybersecurity
Used to gather information about a user and send the information to another entity without the user’s consent.
Displays annoying pop-ups to generate revenue for its author.
Attempts to convince people to divulge sensitive information.
THANK YOU!
Done and presented by Tiago Silva