Sunteți pe pagina 1din 27

COMPUTER

THREATS
MALWARE
( MALICIOUS SOFTWARE )
Any software used to:
• Disrupt Computer Operation
• Gather sensitive information
• Gain access to private computer systems
MALWARE
( MALICIOUS SOFTWARE )
It is an umbrella term used to refer to a variety
of forms:
• Virus • Spyware • Dialers
• Worms • Hoaxes • Etc……
• Trojan Horse • Joke Programs
• Adware • Spyware
* Each Malware is defined on how they
spread, executed or behaved.
When EXECUTED, it REPLICATES by
inserting copies of itself.
A virus runs when a user launches
an infected program.

VIRUS  Steals hard disk space or CPU time.


 Accessing private information.
 Corrupting data.
 Logging key-strokes.
A STANDALONE malware that
REPLICATES itself in order to
spread to other computers.
Unlike a virus, it doesn’t need to
attach itself to an existing
program.
Worms always cause at least some
WORMS harm to the network by
CONSUMING bandwidth.
 Increases network traffic.
 Delete files.
 Installs a “BACKDOOR”.
A NON-SELF-REPLICATING type of
malware containing malicious
code.
Conceals within a seemingly useful
application.
Malwares are classified as Trojans
if they do not inject themselves
TROJAN into other files or propagate
themselves.

HORSE  Often acts as backdoors.


 Data theft or deletion of files.
 Other harmful activities.
Usually comes from a website or a
software package which
automatically renders
advertisements.
It secretly gathers your personal
internet habits.

ADWARES  Pops up unwanted Advertisements.


A standalone program that
COVERTLY monitor activity carried
out on your system.
Sometimes, spyware is included
along with a genuine software.

SPYWARE  Steals passwords or other


confidential information.
 Monitors other computers secretly.
A program that changes or
interrupts the normal behavior of
a computer, for example, making
the click in reverse.

These are harmless programs that


JOKE are designed only to cause
PROGRAMS distraction or a nuisance
Safe and Unsafe Files
SAFE UNSAFE
.gif .bat .pif
. jpg or .jpeg .cmd .reg
.tif or .tiff .com .vbs
.mpg or .mpeg .doc .wsh
.mp3 .exe
.wav .js
HOW TO PREVENT MALWARES?
• Use Antivirus software.
• Always keep your Antivirus software up to date.
• Keep out from malicious websites/applications.
• USE COMMON SENSE. 
PAS5MORDS
PASSWORDS
PA55M0RD5
Not all passwords are effective.
Common reasons why a
password is a BAD one:
• It contains less than eight characters.
• Consists of words that appear in a
dictionary.
• Contains sequences.
• The password is a name, a special date, or
a place name.
RULES for creating a GOOD
password:
• Should be a minimum of 8 characters
long.

PASSWORDS
RULES for creating a GOOD
password:
• Should contain both letters and
numbers

PASSWORDS
RULES for creating a GOOD
password:
• Should contain both letters and
numbers

PASSWORDS123
RULES for creating a GOOD
password:

• Should be both upper and lower case.

PASSWORDS123
RULES for creating a GOOD
password:

• Should be both upper and lower case.

PaSsWoRdS123
RULES for creating a GOOD
password:
• If possible integrate symbols and
punctuation.

PaSsWoRdS123
RULES for creating a GOOD
password:
• If possible integrate symbols and
punctuation.

Pa$$w()rDs123
RULES for creating a GOOD
password:

• Add something random.

Pa$$w()rDs123
RULES for creating a GOOD
password:

• Add something random.

Pa$$w()rDs123Belat!
SENSIBLE Password use:
• Never use the same password for two
different things.
• Never disclose a password to anyone.
• Change high value password at
regular intervals.
• Never write down a password
SENSIBLE Password use:
• Be careful about copying a password
to the windows clipboard.
• Never store passwords as plain text.
• Never rely on default passwords you
have been issued.
SENSIBLE Password use:

• When using passwords online, make


sure you are using a secured website.
Ex: https:// instead of http://

S-ar putea să vă placă și