1 / 11

Malware

Malware. And how you can handle it. Malware. Software that works without the victim’s permission. Trojan horses Spyware Adware Rootkits Viruses Worms. Trojan horses. Like the ancient Greek legend. Look harmless but then do damage. Adware. Spyware.

tan
Download Presentation

Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malware And how you can handle it

  2. Malware Software that works without the victim’s permission. Trojan horses Spyware Adware Rootkits Viruses Worms

  3. Trojan horses Like the ancient Greek legend. Look harmless but then do damage.

  4. Adware Spyware • A program hidden on your computer that essentally spies on you and can track key presses to possibly obtain passwords or account numbers • A program which automatically displays advertisements on a computer without user request

  5. Rootkits Runs secretly. Allows the invader access to files and folders on the infected computer. Can be used by law enforcement officials to search a suspect’s computer.

  6. Viruses • Are obtained through downloading an attachment on an email from a stranger or downloading a program or file from an non-trusted website. • Cause damage to files on a computer including vital operating system components.

  7. Worms Worms duplicate themselves until the amount of them is too much for the computer to handle and the computer eventually shuts down. Can duplicate within a computer or over a network or the internet to cripple servers.

  8. Anti-malware programs Help protect against cyber-attacks like viruses and worms by either preventing them from getting onto your computer or destroying them once they’re on your computer.

  9. Anti-malware programs

  10. Professional help Geek Squad Staples Tech help Local computer technicians Tech support

More Related