Download - Malware

Transcript
Page 1: Malware

MalwareAnd how you can handle it

Page 2: Malware

Malware Trojan

horses Spyware Adware Rootkits Viruses Worms

Software that works without the victim’s permission.

Page 3: Malware

Trojan horses

Like the ancient Greek legend. Look harmless but then do damage.

Page 4: Malware

AdwareSpyware A program hidden

on your computer that essentally spies on you and can track key presses to possibly obtain passwords or account numbers

A program which automatically

displays advertisements on

a computer without user request

Page 5: Malware

Rootkits Runs secretly. Allows the invader access to files and

folders on the infected computer. Can be used by law enforcement

officials to search a suspect’s computer.

Page 6: Malware

Viruses Are obtained through downloading an

attachment on an email from a stranger or downloading a program or file from an non-trusted website.

Cause damage to files on a computer including vital operating system components.

Page 7: Malware

Worms Worms duplicate themselves until the

amount of them is too much for the computer to handle and the computer eventually shuts down.

Can duplicate within a computer or over a network or the internet to cripple servers.

Page 8: Malware

Anti-malware programs Help protect against cyber-attacks

like viruses and worms by either preventing them from getting onto your computer or destroying them once they’re on your computer.

Page 9: Malware

Anti-malware programs

Page 10: Malware

Professional help Geek Squad Staples Tech help Local computer technicians Tech support

Page 11: Malware

Top Related