SlideShare una empresa de Scribd logo
1 de 9
As a risk or a threat in social media in
               marketing
   What is malware?
   Avoid malware
   How to detect malware
   How to get rid of malware
   Computer viruses
   Different types of viruses
   Litterature
   Malware is short for malicious software
   It’s usually includes viruses and spyware that
    infects your computer or smartphone
   Malwares can be very troublesome and can
    even crash computers
   Criminals use malware for identity theft
   The easiest way is to keep your antivirus and
    firewall up to date
   Don’t open “trash mail” or visit any suspicious
    websites
   Back up your data
   By monitoring your computer you will be able
    to identify a possible malware
   Especially if your computer is acting slow,
    crashes or displays repeated error messages
   Other signs might be new unwanted toolbars,
    new icons on your desktop or changes in your
    internet homepage
   Virus-protection programs on the computer
    can handle most of the usual malwares
   For more complicated malware it’s good to
    take your computer to a ”tech support” or a
    manufacturer
   You can also report malwares to the federal
    trade commission
   Computer viruses can be used as malware
   The computer virus is a small software that
    ”piggybacks on a program.
   There are different types of viruses: viruses, e-
    mail viruses, trojan horses and worms
   Viruses: Each time an infected program runs, the virus runs
    too, and it infects other programs while it’s conscious
   E-mail viruses: E-mail viruses travels as an attachment to a
    e-mail. It also replicates by sending itself to other e-mail
    addresses
   Trojan horses: Is a computer program. It’s usually disguised
    as another program(for ex. a game). It can erase your hard
    disk. Trojan horses doesn’t replicate automatically
   Worms: Worms are small pieces of software that uses
    security holes and computer networks to reduplicate. They
    are often very advanced and scans network for security
    holes
   http://www.onguardonline.gov/articles/0011
    -malware, 17.10.12
   http://computer.howstuffworks.com/virus.ht
    m, 17.10.12
   http://en.wikipedia.org/wiki/Malware,17.10.
    12

Más contenido relacionado

La actualidad más candente

Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!amoY91
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagarNitish Nagar
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its preventiondavidmmc
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
KNOW THE ENEMY
KNOW THE ENEMYKNOW THE ENEMY
KNOW THE ENEMYpcsmalvern
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 

La actualidad más candente (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Sowmya
SowmyaSowmya
Sowmya
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware and security
Malware and securityMalware and security
Malware and security
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Network Security
Network SecurityNetwork Security
Network Security
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its prevention
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
KNOW THE ENEMY
KNOW THE ENEMYKNOW THE ENEMY
KNOW THE ENEMY
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
What is malware
What is malwareWhat is malware
What is malware
 

Destacado (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
iCollect Q&A
iCollect Q&AiCollect Q&A
iCollect Q&A
 
แบบนิเทศการสอน
แบบนิเทศการสอนแบบนิเทศการสอน
แบบนิเทศการสอน
 
Mathematical Sets
Mathematical Sets Mathematical Sets
Mathematical Sets
 
iSTUDENT
iSTUDENTiSTUDENT
iSTUDENT
 
Fmcsa presentation12 13-11
Fmcsa presentation12 13-11Fmcsa presentation12 13-11
Fmcsa presentation12 13-11
 
Present perfect continuous
Present perfect continuousPresent perfect continuous
Present perfect continuous
 
FIIB Leadership Program 2013-14-Shreesti Ghosh
FIIB Leadership Program 2013-14-Shreesti GhoshFIIB Leadership Program 2013-14-Shreesti Ghosh
FIIB Leadership Program 2013-14-Shreesti Ghosh
 
Functional Testing - Carlos Vences
Functional Testing - Carlos VencesFunctional Testing - Carlos Vences
Functional Testing - Carlos Vences
 
Measurements and metrics 10 11
Measurements and metrics 10 11Measurements and metrics 10 11
Measurements and metrics 10 11
 
Facebook
FacebookFacebook
Facebook
 
Emc new1
Emc new1Emc new1
Emc new1
 
Over posting
Over postingOver posting
Over posting
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Australian Baby Bargains
Australian Baby BargainsAustralian Baby Bargains
Australian Baby Bargains
 
LEAPIN
LEAPINLEAPIN
LEAPIN
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Marriages Sets & Upsets
Marriages Sets & UpsetsMarriages Sets & Upsets
Marriages Sets & Upsets
 
Imc presentation
Imc presentationImc presentation
Imc presentation
 
Rural Minnesota Journal: Who Lives in Minnesota?
Rural Minnesota Journal: Who Lives in Minnesota?Rural Minnesota Journal: Who Lives in Minnesota?
Rural Minnesota Journal: Who Lives in Minnesota?
 

Similar a Malware (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Virus project
Virus projectVirus project
Virus project
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Everything You Need to Know About Computer Worms.pdf
Everything You Need to Know About Computer Worms.pdfEverything You Need to Know About Computer Worms.pdf
Everything You Need to Know About Computer Worms.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus
VirusVirus
Virus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 

Más de HHSome

Assignment4
Assignment4Assignment4
Assignment4HHSome
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social mediaHHSome
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionageHHSome
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonHHSome
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessHHSome
 
Censorship
CensorshipCensorship
CensorshipHHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to preziHHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingHHSome
 
Phishing
PhishingPhishing
PhishingHHSome
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Personal information
Personal informationPersonal information
Personal informationHHSome
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsHHSome
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick krammHHSome
 

Más de HHSome (16)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Personal information
Personal informationPersonal information
Personal information
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Malware

  • 1. As a risk or a threat in social media in marketing
  • 2. What is malware?  Avoid malware  How to detect malware  How to get rid of malware  Computer viruses  Different types of viruses  Litterature
  • 3. Malware is short for malicious software  It’s usually includes viruses and spyware that infects your computer or smartphone  Malwares can be very troublesome and can even crash computers  Criminals use malware for identity theft
  • 4. The easiest way is to keep your antivirus and firewall up to date  Don’t open “trash mail” or visit any suspicious websites  Back up your data
  • 5. By monitoring your computer you will be able to identify a possible malware  Especially if your computer is acting slow, crashes or displays repeated error messages  Other signs might be new unwanted toolbars, new icons on your desktop or changes in your internet homepage
  • 6. Virus-protection programs on the computer can handle most of the usual malwares  For more complicated malware it’s good to take your computer to a ”tech support” or a manufacturer  You can also report malwares to the federal trade commission
  • 7. Computer viruses can be used as malware  The computer virus is a small software that ”piggybacks on a program.  There are different types of viruses: viruses, e- mail viruses, trojan horses and worms
  • 8. Viruses: Each time an infected program runs, the virus runs too, and it infects other programs while it’s conscious  E-mail viruses: E-mail viruses travels as an attachment to a e-mail. It also replicates by sending itself to other e-mail addresses  Trojan horses: Is a computer program. It’s usually disguised as another program(for ex. a game). It can erase your hard disk. Trojan horses doesn’t replicate automatically  Worms: Worms are small pieces of software that uses security holes and computer networks to reduplicate. They are often very advanced and scans network for security holes
  • 9. http://www.onguardonline.gov/articles/0011 -malware, 17.10.12  http://computer.howstuffworks.com/virus.ht m, 17.10.12  http://en.wikipedia.org/wiki/Malware,17.10. 12