SlideShare a Scribd company logo
Information Security
Malicious Software, physical threats, legal and ethical issues in
information security
Malicious Software
• The words “Malicious Software” coin the word “Malware” and the
meaning remains the same. Malicious Software refers to any
malicious program that causes harm to a computer system or
network. Malicious Malware Software attacks a computer or network
in the form of viruses, worms, trojans, spyware, adware or rootkits.
• Their mission is often targeted at accomplishing unlawful tasks such
as robbing protected data, deleting confidential documents or add
software without the user consent.
Malwares
• Various forms of malware are listed below −
• Virus − A virus is a program that creates copies of itself and inserts these copies into other computer
programs, data files, or into the boot sector of the hard-disk. Upon successful replication, viruses cause
harmful activity on infected hosts such as stealing hard-disk space or CPU time.
• Worm − A worm is a type of malware which leaves a copy of itself in the memory of each computer in its
path.
• Trojan − Trojan is a non-self-replicating type of malware that contains malicious code, which upon
execution results in loss or theft of data or possible system harm.
• Adware − Adware, also known as freeware or pitchware, is a free computer software that contains
commercial advertisements of games, desktop toolbars, and utilities. It is a web-based application and it
collects web browser data to target advertisements, especially pop-ups.
• Spyware − Spyware is infiltration software that anonymously monitors users which enables a hacker to
obtain sensitive information from the user's computer. Spyware exploits users and application
vulnerabilities that is quite often attached to free online software downloads or to links that are clicked by
users.
• Rootkit − A rootkit is a software used by a hacker to gain admin level access to a computer/network which
is installed through a stolen password or by exploiting a system vulnerability without the victim's
knowledge.
Preventive Measures
• The following measures can be taken to avoid presence of malware in a system −
• Ensure the operating system and applications are up to date with
patches/updates.
• Never open strange e-mails, especially ones with attachments.
• When you download from the internet, always check what you install. Do not
simply click OK to dismiss pop-up windows. Verify the publisher before you install
application.
• Install anti-virus software.
• Ensure you scan and update the antivirus programs regularly.
• Install firewall.
• Always enable and use security features provided by browsers and applications.
Anti-Malware Software
• The following software help remove the malwares from a system −
• Microsoft Security Essentials
• Microsoft Windows Defender
• AVG Internet Security
• Spybot - Search & Destroy
• Avast! Home Edition for personal use
• Panda Internet Security
• MacScan for Mac OS and Mac OS X
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Legal and
ethical issues
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)
Information Security (Malicious Software)

More Related Content

PPTX
Information security ist lecture
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPTX
Introduction to cyber security
PPT
Computer security overview
 
PPT
Counter Measures Of Virus
PPTX
Basic practices for information & computer security
PPTX
Viruses & security threats
Information security ist lecture
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Virus and its CounterMeasures -- Pruthvi Monarch
Introduction to cyber security
Computer security overview
 
Counter Measures Of Virus
Basic practices for information & computer security
Viruses & security threats

What's hot (20)

PPTX
Computer security threats & prevention
PPT
intruders types ,detection & prevention
PPTX
23 network security threats pkg
PPTX
Computer security basics
PPTX
BAIT1003 Chapter 11
PPT
Basic Security Computere
PPTX
Computer security and
PPT
Lect13 security
PPTX
Cryptography and Network security # Lecture 3
PPTX
Cyber Security # Lec 2
PDF
Linux Security best Practices with Fedora
PPT
Ch04 Network Vulnerabilities and Attacks
PPTX
Security
PPTX
Lecture 10 intruders
PPT
Introduction To Computer Security
PPTX
Security concepts
PPTX
Security Basics
PPTX
Cryptography and Network Security # Lecture 2
PPTX
Threats to information security
PPT
Intruders
Computer security threats & prevention
intruders types ,detection & prevention
23 network security threats pkg
Computer security basics
BAIT1003 Chapter 11
Basic Security Computere
Computer security and
Lect13 security
Cryptography and Network security # Lecture 3
Cyber Security # Lec 2
Linux Security best Practices with Fedora
Ch04 Network Vulnerabilities and Attacks
Security
Lecture 10 intruders
Introduction To Computer Security
Security concepts
Security Basics
Cryptography and Network Security # Lecture 2
Threats to information security
Intruders
Ad

Similar to Information Security (Malicious Software) (20)

PPT
Malicious
PPTX
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
PPTX
Virus and malware presentation
PPTX
Malicious software and software security
PPTX
Malware ppt final.pptx
PPT
anti_virus
PDF
How To Protect From Malware
PPTX
12 Malware very useful Presentation for others
PPTX
Computer Virus ppt.pptx
PPTX
Trojan horse
PPTX
lecture-11-30052022-103626am.pptx
ODP
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
PPTX
Malware program by mohsin ali dahar khairpur
PDF
CH1- Introduction to malware analysis-v2.pdf
PDF
Security and Viruses
PPT
Venture name Basics
PPT
PPT
PPT
Venture name Basics
PPT
Sangeetha Venture
Malicious
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
Virus and malware presentation
Malicious software and software security
Malware ppt final.pptx
anti_virus
How To Protect From Malware
12 Malware very useful Presentation for others
Computer Virus ppt.pptx
Trojan horse
lecture-11-30052022-103626am.pptx
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Malware program by mohsin ali dahar khairpur
CH1- Introduction to malware analysis-v2.pdf
Security and Viruses
Venture name Basics
Venture name Basics
Sangeetha Venture
Ad

More from Zara Nawaz (10)

PPTX
Translation Look Aside buffer
PPTX
information security (network security methods)
PPTX
information security(Public key encryption its characteristics and weakness, ...
PPTX
information security(Feistal Cipher)
PPTX
Information security (Symmetric encryption, cryptography, crypto-analysis)
PPTX
information security(authentication application, Authentication and Access Co...
PPTX
information security (Audit mechanism, intrusion detection, password manageme...
PPTX
Information Security (Firewall)
PPT
Lecture01 algorithm analysis
PPTX
Information Security (Digital Signatures)
Translation Look Aside buffer
information security (network security methods)
information security(Public key encryption its characteristics and weakness, ...
information security(Feistal Cipher)
Information security (Symmetric encryption, cryptography, crypto-analysis)
information security(authentication application, Authentication and Access Co...
information security (Audit mechanism, intrusion detection, password manageme...
Information Security (Firewall)
Lecture01 algorithm analysis
Information Security (Digital Signatures)

Recently uploaded (20)

PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Complications of Minimal Access Surgery at WLH
PDF
advance database management system book.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
1_English_Language_Set_2.pdf probationary
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Introduction to Building Materials
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Complications of Minimal Access Surgery at WLH
advance database management system book.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Hazard Identification & Risk Assessment .pdf
Final Presentation General Medicine 03-08-2024.pptx
1_English_Language_Set_2.pdf probationary
Computing-Curriculum for Schools in Ghana
Unit 4 Skeletal System.ppt.pptxopresentatiom
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Introduction to Building Materials
Practical Manual AGRO-233 Principles and Practices of Natural Farming
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Final Presentation General Medicine 03-08-2024.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Indian roads congress 037 - 2012 Flexible pavement
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE

Information Security (Malicious Software)

  • 1. Information Security Malicious Software, physical threats, legal and ethical issues in information security
  • 2. Malicious Software • The words “Malicious Software” coin the word “Malware” and the meaning remains the same. Malicious Software refers to any malicious program that causes harm to a computer system or network. Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits. • Their mission is often targeted at accomplishing unlawful tasks such as robbing protected data, deleting confidential documents or add software without the user consent.
  • 3. Malwares • Various forms of malware are listed below − • Virus − A virus is a program that creates copies of itself and inserts these copies into other computer programs, data files, or into the boot sector of the hard-disk. Upon successful replication, viruses cause harmful activity on infected hosts such as stealing hard-disk space or CPU time. • Worm − A worm is a type of malware which leaves a copy of itself in the memory of each computer in its path. • Trojan − Trojan is a non-self-replicating type of malware that contains malicious code, which upon execution results in loss or theft of data or possible system harm. • Adware − Adware, also known as freeware or pitchware, is a free computer software that contains commercial advertisements of games, desktop toolbars, and utilities. It is a web-based application and it collects web browser data to target advertisements, especially pop-ups. • Spyware − Spyware is infiltration software that anonymously monitors users which enables a hacker to obtain sensitive information from the user's computer. Spyware exploits users and application vulnerabilities that is quite often attached to free online software downloads or to links that are clicked by users. • Rootkit − A rootkit is a software used by a hacker to gain admin level access to a computer/network which is installed through a stolen password or by exploiting a system vulnerability without the victim's knowledge.
  • 4. Preventive Measures • The following measures can be taken to avoid presence of malware in a system − • Ensure the operating system and applications are up to date with patches/updates. • Never open strange e-mails, especially ones with attachments. • When you download from the internet, always check what you install. Do not simply click OK to dismiss pop-up windows. Verify the publisher before you install application. • Install anti-virus software. • Ensure you scan and update the antivirus programs regularly. • Install firewall. • Always enable and use security features provided by browsers and applications.
  • 5. Anti-Malware Software • The following software help remove the malwares from a system − • Microsoft Security Essentials • Microsoft Windows Defender • AVG Internet Security • Spybot - Search & Destroy • Avast! Home Edition for personal use • Panda Internet Security • MacScan for Mac OS and Mac OS X