Overview
This lecture covers various types of malware, how they operate, their methods of spreading, and best practices for prevention.
Types of Malware
- Malware is software designed to cause harm, steal data, or disrupt computer operations.
- Viruses require human activity to replicate and spread to other computers.
- Worms spread automatically between systems without human intervention and are often more dangerous than viruses.
- Ransomware encrypts your files and demands payment, usually in cryptocurrency, for a decryption key.
- Trojan horses disguise themselves as legitimate software but secretly install malware.
- Rootkits hide deep within the operating system, making detection and removal difficult.
- Keyloggers record every keystroke, often capturing usernames and passwords for attackers.
- Adware and spyware display unwanted ads and collect user data for profit.
- Bloatware is pre-installed, unnecessary software that slows down your system but is not inherently malicious.
- Logic bombs activate malicious actions when a specific event or time occurs.
Malware Spread and Infection Methods
- Multiple malware types often work together to infect a system (e.g., a worm installs a backdoor for remote access).
- Drive-by downloads can install malware without the user's knowledge just by visiting a webpage.
- Pop-ups and email links entice users to download and run malicious executables.
- Outdated operating systems and applications are vulnerable to new malware exploiting unpatched security holes.
Prevention and Best Practices
- Never click suspicious links, especially those in emails or pop-ups.
- Keep your operating system and all applications up to date with the latest security patches.
- Removing bloatware can improve system performance and reduce potential vulnerabilities.
Key Terms & Definitions
- Malware — malicious software designed to harm, steal data, or disrupt.
- Virus — malware that requires human action to spread.
- Worm — self-replicating malware that spreads without human involvement.
- Ransomware — malware that encrypts files and demands payment for their return.
- Trojan horse — malware hidden inside seemingly legitimate software.
- Rootkit — malware embedded in the operating system to avoid detection.
- Keylogger — tool that records keystrokes to steal credentials.
- Adware/Spyware — software that displays ads or spies on user data.
- Bloatware — unnecessary software pre-installed on devices.
- Logic bomb — malware triggered by a specific event or time.
Action Items / Next Steps
- Ensure your system and applications are updated regularly.
- Avoid clicking unknown or suspicious links and pop-ups.
- Remove unnecessary bloatware from your systems.