Module 7: Malware Threats └── 1. Malware Overview ├── Definition ├── Common Types │ ├── Viruses │ │ ├── Infectious code │ │ └── Spreads by attaching to files │ ├── Worms │ │ └── Self-replicating │ ├── Trojans │ │ └── Disguised as legitimate software │ ├── Rootkits │ │ └── Hides presence of malware │ ├── Backdoors │ │ └── Provides unauthorized access │ ├── Botnets │ │ └── Network of infected devices │ ├── Ransomware │ │ └── Encrypts data for ransom │ ├── Spyware │ │ └── Gathers information secretly │ ├── Adware │ │ └── Displays unwanted ads │ └── Keyloggers │ └── Records keystrokes └── 2. Malware Entry Points ├── Instant Messenger Applications ├── Portable Hardware Media ├── Browser and Email Software Bugs ├── Insecure Patch Management └── Rogue/Unverified Software └── 3. Malware Symptoms ├── Unusual computer behavior ├── Slow performance ├── Unexpected pop-ups ├── Data loss └── Unauthorized access └── 4. Malware Analysis ├── Static Analysis │ └── Examining the code without execution └── Dynamic Analysis └── Observing the behavior during execution └── 5. Malware Detection Tools ├── Antivirus Software ├── Anti-malware Tools ├── Intrusion Detection Systems (IDS) └── Network Analyzers └── 6. Malware Prevention Techniques ├── Regular software updates ├── Strong password policies ├── User education and awareness ├── Secure configurations └── Regular backups └── 7. Malware Removal Techniques ├── Using antivirus software ├── Manual removal ├── System restoration └── Professional assistance