And how you can handle it. Trojan horses Spyware Adware Rootkits Viruses Worms Software that...

11
Malware And how you can handle it

Transcript of And how you can handle it. Trojan horses Spyware Adware Rootkits Viruses Worms Software that...

Page 1: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

MalwareAnd how you can handle it

Page 2: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

Malware Trojan

horses Spyware Adware Rootkits Viruses Worms

Software that works without the victim’s permission.

Page 3: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

Trojan horses

Like the ancient Greek legend. Look harmless but then do damage.

Page 4: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

AdwareSpyware A program hidden

on your computer that essentally spies on you and can track key presses to possibly obtain passwords or account numbers

A program which automatically

displays advertisements on

a computer without user request

Page 5: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

Rootkits Runs secretly. Allows the invader access to files and

folders on the infected computer. Can be used by law enforcement

officials to search a suspect’s computer.

Page 6: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

Viruses Are obtained through downloading an

attachment on an email from a stranger or downloading a program or file from an non-trusted website.

Cause damage to files on a computer including vital operating system components.

Page 7: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

Worms Worms duplicate themselves until the

amount of them is too much for the computer to handle and the computer eventually shuts down.

Can duplicate within a computer or over a network or the internet to cripple servers.

Page 8: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

Anti-malware programs Help protect against cyber-attacks

like viruses and worms by either preventing them from getting onto your computer or destroying them once they’re on your computer.

Page 9: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

Anti-malware programs

Page 10: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.

Professional help Geek Squad Staples Tech help Local computer technicians Tech support

Page 11: And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.