2. Discuss
different types of threats and malicious program (malware) that can damage a computer, mobile device or disrupt any system.
Search for
information on current known malware program. Based on the information that you
have found, create a table to list different types of malware, what it does,
and how it can be repaired or removed. These information is useful for you to
prevent any malware from damage your computer system.
TYPES OF MALWARE
|
DESCRIPTION
|
WAYS OF REPAIRING
|
WORMS
|
A
malware computer program that can self-replicate in order to spread to other
computers. Some of worms might delete and encrypt files or send documents via
e-mail.
|
1.Download
and extract the Autoruns program by Sysinternal to C:/Autoruns
2.Reboot into Safe Mode 3.Navigate to the C:/Autoruns folder and double click o autoruns.exe 4.Click on the option menu and enable the following options: -include empty location -verify code signatures -hide signed Microsoft entries 5.Refresh the start-ups list using these new settings
6.Look
through the filename that you want to remove
7.To delete
the entry that is associated with the malware, right click on the entry and
select delete. Hence it will
removed from Registry.
8.Reboot
into normal mode when done with removing malware entries
|
ROOTKIT
|
Is a type
of malicious software designed to remotely access or control a computer
without being detected by users or security programs.
|
Once a
rootkit has been installed it is possible for the malicious party behind the
rootkit to remotely execute files, access/steal information, modify system
configurations, after software, install concealed malware, or control the
comyter as part of a bootnet.
|
BOT
|
A
software that uses your computer without your knowledge to send spam, host a
phishing site, or steal your identity by monitoring your keystrokes
|
To
safeguard against malicious bots:
Install security software Configure your software’s settings to update automatically. Increase the security Settings on your browser Limit your rights when online. Never click on attachments unless you can verify the source. Ensure that your system is patched with the most current Microsoft Windows Update. Set your computer’s security settings to update automatically |
VIRUSES
|
It can be
used for identity theft, slow down computer significantly, erase information
and destroy vital data.
|
Use
anti-virus program to remove a virus from computer
|
Contributed by Muhammad Tauffiq Bin Khirham (A1300609)
Aiman Hakim Bin Hashim (A1300053)