0% found this document useful (0 votes)
43 views4 pages

Understanding Malware: Types & Protection

Malware is harmful software designed to damage or control devices, capable of stealing information or causing operational issues. Common types include adware, spyware, viruses, worms, trojans, ransomware, and cryptojacking, each with unique characteristics and methods of spreading. Protection against malware involves using strong passwords, antivirus software, and safe browsing practices, while cryptography can enhance security by encrypting data and verifying software authenticity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views4 pages

Understanding Malware: Types & Protection

Malware is harmful software designed to damage or control devices, capable of stealing information or causing operational issues. Common types include adware, spyware, viruses, worms, trojans, ransomware, and cryptojacking, each with unique characteristics and methods of spreading. Protection against malware involves using strong passwords, antivirus software, and safe browsing practices, while cryptography can enhance security by encrypting data and verifying software authenticity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd

What is Malware?

Malware is software that is made to harm or control your devices like computers, phones, or tablets.
It can steal your personal information, delete important files, or spy on what you do without you
knowing. People make malware for different reasons like making money, causing problems, or
sharing political messages. Malware can attack at any time, and it does not need a special time to
strike. It won’t break your device, but it can damage your data and make your device not work
properly.
Common Types of Malware:
• Adware – Shows unwanted ads, and sometimes looks like a real app.
• Spyware – Secretly watches you and sends your information to hackers.
• Viruses – Attach to programs and spread by infecting other files.
• Worms – Copy themselves and spread on their own without the user doing anything.
• Trojans – Look like helpful programs but secretly give hackers access.
• Ransomware – Locks your files and asks for money to unlock them.
• Cryptojacking – Uses your device secretly to create cryptocurrency.
How to Stay Safe from Malware:
• Don’t click on links from unknown websites.
• Use strong passwords and turn on two-factor authentication.
• Use a password manager.
• Don’t open attachments in spam emails or strange pop-up ads.
• Only install apps from trusted sources.
• Keep your device and apps updated.
• Remove apps you don’t need.
• Use antivirus software like Malwarebytes.
What is a Virus?
A computer virus is harmful software that spreads by copying itself. It adds its code to other
programs and starts when you use those programs. Once it’s active, the virus can damage your
computer by deleting files, stealing data, or sending more malware. Viruses often look like safe
programs to trick people into opening them.
Types of Viruses:
• File Infector Virus – Joins with program files and spreads when you use the program.
• Macro Virus – Affects apps like Word or Excel and spreads when you open files.
• Boot Sector Virus – Hides in the start-up part of a disk and activates when your device starts.
• Polymorphic Virus – Changes its appearance each time it spreads, making it harder to find.
• Metamorphic Virus – Changes its code completely when it spreads, hiding from detection.
• Resident Virus – Stays in memory and works even if the main file is deleted.
• Non-Resident Virus – Works only when the infected file is used.
• Trojan Horse – Looks like a safe app but secretly harms the system.
Viruses can spread through email attachments, downloads, USBs, websites, networks, or fake links
on social media. They stay hidden until the infected program is opened. Some viruses don’t cause
much damage, but others can destroy files or even cost you money.
What is a Worm?
A worm is another type of malware. It spreads in many ways, like through phishing emails with bad
links or files, or targeted attacks called spear-phishing. Worms can also spread through networks by
copying themselves to other systems or using bugs in software. They can also spread through file-
sharing sites, social media, chat apps, and USB drives.
Famous Worms Over Time:
• Morris Worm – One of the first worms known worldwide.
• Bagle – Sent itself through emails and had many versions.
• Blaster – Targeted old Windows systems.
• Conficker – Used Windows problems to infect millions of computers.
• ILOVEYOU – Spread very quickly and caused billions in damages.
• Mydoom – The fastest-spreading email worm in 2004.
• Ryuk – A type of ransomware that acted like a worm.
• SQL Slammer – Caused big internet problems with denial-of-service attacks.
• Storm Worm – Spread using fake news and created botnets.
• Stuxnet – A complex worm made for cyberattacks.
What is the Difference Between a Virus and a Worm?
A virus needs a program to attach to. It waits for the user to open a file or turn on macros. Then it
spreads by infecting other files and slowing down the computer. A worm doesn’t need help. It
spreads by itself, often quickly, through networks or the internet.
In Short:
• A virus needs a host program and user action to spread.
• A worm spreads by itself, without needing the user to do anything.
Even if a worm enters through a file, it can continue spreading without that file. It can use bugs in
software to sneak in, and the user won’t even notice. But a virus only starts spreading when the user
runs the infected program.
How to Protect Against Viruses and Worms:
To stop worms:
• Keep your software updated.
• Use firewalls and intrusion detection systems (IDS).
• Install antivirus software.
• Separate your network into parts to stop spreading.
• Turn off services and ports you don’t need.
• Teach users to avoid risky behavior online.
To stop viruses:
• Use antivirus and behavior-based protection.
• Use safe lists for allowed apps.
• Filter email messages and use safe browsing tools.
• Back up your data often.
• Teach users to spot scams or social engineering attacks.
Using both security tools and teaching users how to be safe helps stop worms and viruses.
Can Cryptography Help Malware? Why?
Yes, malware can use cryptography (secret codes) to protect itself and hide from antivirus
programs.
1. To hide code – The malware uses encryption to hide what it does. It unlocks itself after
entering your system.
2. To keep changing – Some malware (like polymorphic and metamorphic) changes its code
every time it spreads, so it’s hard for antivirus tools to detect it.
3. To hide messages – Some malware uses encrypted communication to talk to hacker servers,
making it hard to see what it's doing.
4. To check for changes – Malware may use special codes (hashing) to check if security
software has changed it. If yes, it can stop or fix itself.
In short, cryptography helps malware stay hidden, avoid detection, and protect its actions
from being blocked.
Can Cryptography Protect Us from Viruses and Worms?
1. Unless they know the key, encrypted data is useless to a virus or worm that gets into your
machine. This means:
• Passwords, pictures, and documents stay secure and unreadable.
• File-stealing malware won’t be able to understand or use the stolen files.
• If you have backed up and protected your data, ransomware loses its power.
2. Developers can use cryptography to create digital signatures for software. This lets users:
• Confirm the software's authenticity and make sure it hasn't been changed.
• Avoid installing fake or harmful programs (like Trojans).
• Feel confident in updates and apps from trusted sources.
3. Securing Communication
Using cryptographic tools like SSL/TLS helps:
• Protect your information from being intercepted by malware while browsing.
• Stop worms from spreading through fake websites or downloads.
• Keep your emails, messages, and files private and safe from others.
4. File Integrity Hashing
Hashing functions in cryptography can:
• Verify if any files on your computer have been changed or corrupted.
• Notify you if malware tries to change system files or processes.
• Help antivirus software quickly find infected files.
5. Safe Authentication
Cryptography lets you:
• Use multi-factor authentication (MFA), making it harder for malware to get your account
information.
• Create secure, encrypted passwords.
• Make it very difficult for viruses or worms to figure out your login details.
Sources:
• [Link]
• [Link]
• [Link]
• [Link]
• [Link]

You might also like