Cyber Hygiene
By L. John
What is Malicious Software
Malicious Software
• Malicious software, often referred to as
malware, encompasses a wide range of
software designed to harm, disrupt, or gain
unauthorized access to computers,
networks, or devices.
Malware can cause
• System slowdowns
• data loss
Malware can cause
• unauthorized access to sensitive information
• financial harm
Malware can cause
• or even complete system failure
Protective measures
• Protection measures like antivirus
software, firewalls, regular updates,
and cautious browsing habits are
essential to mitigate the risks
associated with malicious software.
Anti-Virus software
• What is anti virus?
Prevent
Scan
Detect
Delete
Anti-Virus software
• Once installed, most antivirus software runs
automatically in the background to provide real-time
protection against virus attacks.
What is a virus
• It is a file or code, typically
delivered over a network, that
infects, explores, steals or
conducts virtually any behavior
an attacker wants.
What is a Trojan
• In computing, a Trojan horse is
any malware that misleads users
of its true intent by disguising
itself as a standard program.
What is Worm
• The worm can both run and
spread itself to other computers.
Because a worm has the ability
to automatically propagate
itself, you can get a worm in
your computer just because it is
on the same network as another
infected device.
What is Adware
• It a type of malware that displays
unwanted advertisements on
your computer or device.
• Adware is commonly activated
unknowingly when users are
trying to install legitimate
applications that adware is
bundled with.
What is Spyware
• Spyware is software with
malicious behavior that aims to
gather information about a
person or organization and send
it to another entity in a way that
harms the user by violating their
privacy
What is Ransomware
• Ransomware is a type of
cryptovirological malware
that permanently block
access to the victim's
personal data unless a
ransom is paid.
What is a botnet
• Botnets can be used to perform
Distributed Denial-of-Service
attacks, steal data, send spam,
and allow the attacker to access
the device and its connection.
What are Keyloogers
• A keylogger or keystroke
logger/keyboard capturing is a
form of malware or hardware that
keeps track of and records your
keystrokes as you type. It takes
the information and sends it to a
hacker using a command-and-
control server.
What are drive-by attacks
• Simply visiting an infected website may be sufficient for the
malware to be downloaded and run on a computer.
Precautions to take
Install Antivirus Software
• Use a reputable antivirus
software and keep it updated
regularly to detect and
remove malware
Update Software Regularly
• Keep your operating system,
applications and security software
updated to patch any
vulnerabilities that hackers could
exploit.
Exercise Caution Online
• Be wary of clicking on
suspicious links,
downloading attachments
from unknown sources, or
visiting untrustworthy
websites
Use strong Passwords
• Create complex and
unique passwords for
your accounts and
consider using a
password manager for
added security
Enable Firewall Protection
• Activate your
device’s firewall
to block
unauthorized
access to your
network
Backup data
• Regularly
Backup your
important data
to an external
Drive or a
secure cloud
storage service
Avoid Public Wi-Fi for Sensitive Activities
• Refrain from accessing
sensitive information
when using public Wi-
Fi networks as they
can be vulnerable to
attacks
Enable Two factor Authentication
• Add an extra
layer of
Security to
your accounts
by using 2FA
Wherever
Possible
Educate yourself
• Stay informed
about common
phishing tactics
and malware
scams to recognize
and avoid potential
threats.
Limit Administrative Priviledges
• Restrict administrative
privileges on your
devices to prevent
malware from making
significant system
changes