1 00:00:08,080 --> 00:00:10,480 In the current technological era, coming 2 00:00:10,480 --> 00:00:12,320 across different computer problems 3 00:00:12,320 --> 00:00:14,320 related to malware and cyber tax is 4 00:00:14,320 --> 00:00:15,360 common. 5 00:00:15,360 --> 00:00:17,840 According to AV test institute, there are 6 00:00:17,840 --> 00:00:19,840 more than one billion malware programs 7 00:00:19,840 --> 00:00:20,960 available. 8 00:00:20,960 --> 00:00:23,039 And new malware programs are detected 9 00:00:23,039 --> 00:00:24,560 regularly. 10 00:00:24,560 --> 00:00:26,480 Hi guys, and welcome to yet another 11 00:00:26,480 --> 00:00:28,640 interesting video by simply learn but 12 00:00:28,640 --> 00:00:30,640 before we begin. If you love watching 13 00:00:30,640 --> 00:00:33,280 tech videos, subscribe to our channel and 14 00:00:33,280 --> 00:00:34,960 hit the bell icon to never miss an 15 00:00:34,960 --> 00:00:36,800 update. 16 00:00:36,800 --> 00:00:39,360 In this video, we'll understand what is a 17 00:00:39,360 --> 00:00:41,280 malware program? 18 00:00:41,280 --> 00:00:43,920 Then, we'll see what exactly are viruses 19 00:00:43,920 --> 00:00:45,520 and trojans. 20 00:00:45,520 --> 00:00:47,520 Then, we will see how they operate in a 21 00:00:47,520 --> 00:00:49,120 system. 22 00:00:49,120 --> 00:00:51,120 And then different types of viruses and 23 00:00:51,120 --> 00:00:52,800 trojan, 24 00:00:52,800 --> 00:00:54,719 and how to detect the activity of such 25 00:00:54,719 --> 00:00:56,000 programs. 26 00:00:56,000 --> 00:00:58,079 And lastly, we will see how to prevent 27 00:00:58,079 --> 00:01:00,160 our system from getting infected by such 28 00:01:00,160 --> 00:01:02,719 programs. 29 00:01:03,120 --> 00:01:05,280 Malware is a malicious software that is 30 00:01:05,280 --> 00:01:07,280 programmed to cause damage to a computer. 31 00:01:07,280 --> 00:01:10,479 System network and hardware devices. 32 00:01:10,479 --> 00:01:12,479 Many malicious programs like trojan 33 00:01:12,479 --> 00:01:14,640 viruses worms and bots which cause 34 00:01:14,640 --> 00:01:16,560 damage to the system are known as 35 00:01:16,560 --> 00:01:19,040 malware. Most of the malware programs are 36 00:01:19,040 --> 00:01:21,119 designed to steal information from the 37 00:01:21,119 --> 00:01:22,640 targeted user 38 00:01:22,640 --> 00:01:25,280 or to steal money from the target by 39 00:01:25,280 --> 00:01:27,920 stealing sensitive data. 40 00:01:27,920 --> 00:01:29,840 Let's take a look at the introduction 41 00:01:29,840 --> 00:01:32,479 for two different types of malware virus, 42 00:01:32,479 --> 00:01:35,040 and trojan. 43 00:01:36,320 --> 00:01:38,159 Firstly, let's take a look what exactly 44 00:01:38,159 --> 00:01:40,479 is a virus program. 45 00:01:40,479 --> 00:01:42,640 A computer virus is a type of malicious 46 00:01:42,640 --> 00:01:44,880 program that on execution replicates 47 00:01:44,880 --> 00:01:45,920 itself. 48 00:01:45,920 --> 00:01:48,159 They get attached to different files and 49 00:01:48,159 --> 00:01:50,320 programs, which are termed as host 50 00:01:50,320 --> 00:01:53,040 programs by inserting their code. If the 51 00:01:53,040 --> 00:01:55,600 attachment succeeds, the targeted program 52 00:01:55,600 --> 00:01:57,840 is termed as infected with a computer 53 00:01:57,840 --> 00:01:58,880 virus. 54 00:01:58,880 --> 00:02:00,640 Now, let's take a look at the trojan 55 00:02:00,640 --> 00:02:01,840 horse. 56 00:02:01,840 --> 00:02:04,159 Trojan horse program is a program that 57 00:02:04,159 --> 00:02:06,880 disguises itself as a legitimate program, 58 00:02:06,880 --> 00:02:09,520 but harms the system on installation. 59 00:02:09,520 --> 00:02:11,440 They hide within the attachments and 60 00:02:11,440 --> 00:02:13,760 emails then transfer from one system to 61 00:02:13,760 --> 00:02:16,400 another they create bad doors into a 62 00:02:16,400 --> 00:02:18,800 system to allow the cyber criminal to 63 00:02:18,800 --> 00:02:21,520 steal our information. 64 00:02:21,520 --> 00:02:23,280 Let's take a look how they function 65 00:02:23,280 --> 00:02:27,520 after getting installed into our system. 66 00:02:27,520 --> 00:02:30,080 Firstly, we have virus programs the 67 00:02:30,080 --> 00:02:32,400 computer virus must contain two parts to 68 00:02:32,400 --> 00:02:34,000 infect the system. 69 00:02:34,000 --> 00:02:36,720 First is a surge routine which locates 70 00:02:36,720 --> 00:02:38,560 new files and data that is to be 71 00:02:38,560 --> 00:02:41,040 infected by the virus program. 72 00:02:41,040 --> 00:02:43,120 And the second part is known as the copy 73 00:02:43,120 --> 00:02:45,440 routine, which is necessary for the 74 00:02:45,440 --> 00:02:48,080 program to copy itself into the targeted 75 00:02:48,080 --> 00:02:50,560 file, which is located by the search 76 00:02:50,560 --> 00:02:52,400 routine now let's take a look at the 77 00:02:52,400 --> 00:02:54,640 trojan horse functioning 78 00:02:54,640 --> 00:02:56,720 for trojan horses entryway into our 79 00:02:56,720 --> 00:02:59,440 system is through emails that may look 80 00:02:59,440 --> 00:03:01,200 legitimate, but may have unknown 81 00:03:01,200 --> 00:03:03,680 attachments. And when such files are 82 00:03:03,680 --> 00:03:06,080 downloaded into the device, the trojan 83 00:03:06,080 --> 00:03:08,159 program gets installed and infects the 84 00:03:08,159 --> 00:03:09,920 system. 85 00:03:09,920 --> 00:03:11,840 They also infect the system on the 86 00:03:11,840 --> 00:03:14,159 execution of infected application or the 87 00:03:14,159 --> 00:03:17,599 executable file and attacks the system. 88 00:03:17,599 --> 00:03:19,840 Now, that we understand what virus and 89 00:03:19,840 --> 00:03:22,239 trojans are let's understand different 90 00:03:22,239 --> 00:03:25,840 types of virus androgens. 91 00:03:25,840 --> 00:03:27,599 Let's take a look at different types of 92 00:03:27,599 --> 00:03:28,959 viruses. 93 00:03:28,959 --> 00:03:30,720 The first one is known as the booth 94 00:03:30,720 --> 00:03:33,280 sector virus. This type of virus damages 95 00:03:33,280 --> 00:03:35,519 the booting section of the system by 96 00:03:35,519 --> 00:03:37,680 infecting the master bot record, which is 97 00:03:37,680 --> 00:03:39,680 also known as MBR. 98 00:03:39,680 --> 00:03:42,239 This damages the boot sector section by 99 00:03:42,239 --> 00:03:45,360 targeting the hard disk of the system. 100 00:03:45,360 --> 00:03:48,000 Then we have the macro virus. 101 00:03:48,000 --> 00:03:50,640 Micro virus is a type of virus that gets 102 00:03:50,640 --> 00:03:53,360 embedded into the document related data, 103 00:03:53,360 --> 00:03:56,080 and is executed when the file is opened. 104 00:03:56,080 --> 00:03:57,920 They also are designed to replicate 105 00:03:57,920 --> 00:04:00,319 themselves, and infect the system on a 106 00:04:00,319 --> 00:04:02,000 larger scale. 107 00:04:02,000 --> 00:04:04,319 And lastly, we have the direct action 108 00:04:04,319 --> 00:04:06,159 virus. 109 00:04:06,159 --> 00:04:08,080 This type of virus gets attached to 110 00:04:08,080 --> 00:04:10,720 executable files, which on execution 111 00:04:10,720 --> 00:04:12,879 activates the virus program and infects 112 00:04:12,879 --> 00:04:15,760 the system. Once the infection of the 113 00:04:15,760 --> 00:04:18,799 file is completed, they exit the system 114 00:04:18,799 --> 00:04:21,359 which is also the reason it is known as 115 00:04:21,359 --> 00:04:23,520 a non-resident virus. 116 00:04:23,520 --> 00:04:25,199 Let's take a look at different types of 117 00:04:25,199 --> 00:04:27,360 trojans. 118 00:04:27,360 --> 00:04:29,520 The first type of trojan is the backdoor 119 00:04:29,520 --> 00:04:30,800 trojan. 120 00:04:30,800 --> 00:04:32,800 They are designed to create a backdoor 121 00:04:32,800 --> 00:04:34,880 in the system on execution of an 122 00:04:34,880 --> 00:04:36,720 infected program. 123 00:04:36,720 --> 00:04:39,360 They provide remote access of our system 124 00:04:39,360 --> 00:04:41,360 to the hacker. This way, the cyber 125 00:04:41,360 --> 00:04:43,759 criminal can steal our system data and 126 00:04:43,759 --> 00:04:46,000 may use it for illegal activities. Next, 127 00:04:46,000 --> 00:04:47,280 we have 128 00:04:47,280 --> 00:04:49,440 quick source trojan. 129 00:04:49,440 --> 00:04:51,199 They enter the system by clicking the 130 00:04:51,199 --> 00:04:53,440 random pop-ups which we come across on 131 00:04:53,440 --> 00:04:54,720 the internet. 132 00:04:54,720 --> 00:04:56,400 They attempt a user to give their 133 00:04:56,400 --> 00:04:58,320 personal details for different 134 00:04:58,320 --> 00:05:00,720 transactions or schemes, 135 00:05:00,720 --> 00:05:03,199 which may provide remote access of a 136 00:05:03,199 --> 00:05:05,919 system to the cyber criminal. 137 00:05:05,919 --> 00:05:08,240 And the last trojan type is ransom 138 00:05:08,240 --> 00:05:09,280 trojan. 139 00:05:09,280 --> 00:05:11,360 This type of trojan program after 140 00:05:11,360 --> 00:05:14,000 entering the system blocks the user from 141 00:05:14,000 --> 00:05:15,120 accessing 142 00:05:15,120 --> 00:05:17,759 its own system. And also affects the 143 00:05:17,759 --> 00:05:19,759 system functioning 144 00:05:19,759 --> 00:05:22,080 the cyber criminal demands a ransom from 145 00:05:22,080 --> 00:05:24,800 the targeted user for the removal of the 146 00:05:24,800 --> 00:05:27,199 trojan program from the device. 147 00:05:27,199 --> 00:05:28,880 Now, that we understand some details 148 00:05:28,880 --> 00:05:31,199 regarding viruses and trojan, let's solve 149 00:05:31,199 --> 00:05:32,880 a question. 150 00:05:32,880 --> 00:05:35,440 The question is Jake was denied access 151 00:05:35,440 --> 00:05:37,280 to his system, and he wasn't able to 152 00:05:37,280 --> 00:05:39,120 control the data and information in his 153 00:05:39,120 --> 00:05:41,039 system. 154 00:05:41,039 --> 00:05:42,080 Now, 155 00:05:42,080 --> 00:05:44,160 the actual question is what could be the 156 00:05:44,160 --> 00:05:46,560 reason behind his system's problem? 157 00:05:46,560 --> 00:05:49,520 Option A: macro virus, Option B: ransom 158 00:05:49,520 --> 00:05:52,560 trojan, Option C: backward version. 159 00:05:52,560 --> 00:05:55,840 Give your answers in the comment section. 160 00:05:55,840 --> 00:05:58,080 Now, let's understand how to detect the 161 00:05:58,080 --> 00:06:00,240 activity of viruses and trojan in our 162 00:06:00,240 --> 00:06:02,400 system 163 00:06:02,400 --> 00:06:04,639 to detect virus or trojan activity in a 164 00:06:04,639 --> 00:06:06,800 system, we can refer to the following 165 00:06:06,800 --> 00:06:07,680 points 166 00:06:07,680 --> 00:06:09,440 for viruses. We have 167 00:06:09,440 --> 00:06:11,680 slowing down of the system and frequent 168 00:06:11,680 --> 00:06:13,680 application freeze shows that the 169 00:06:13,680 --> 00:06:15,840 infection of the virus is present in the 170 00:06:15,840 --> 00:06:17,360 system. 171 00:06:17,360 --> 00:06:20,400 Then, we have the viruses can also steal 172 00:06:20,400 --> 00:06:22,800 sensitive data including passwords, 173 00:06:22,800 --> 00:06:24,240 account details, 174 00:06:24,240 --> 00:06:26,800 which may lead to unexpected log out 175 00:06:26,800 --> 00:06:28,800 from the accounts or corruption of the 176 00:06:28,800 --> 00:06:30,400 sensitive data. 177 00:06:30,400 --> 00:06:32,880 And lastly, we have frequent system 178 00:06:32,880 --> 00:06:35,360 crashes due to virus infection which 179 00:06:35,360 --> 00:06:38,000 damages the operating system. 180 00:06:38,000 --> 00:06:40,000 For trojan, we have frequent system 181 00:06:40,000 --> 00:06:42,319 crashes and system also faces slow 182 00:06:42,319 --> 00:06:44,080 reaction time. 183 00:06:44,080 --> 00:06:46,240 Then, we have there are more random 184 00:06:46,240 --> 00:06:48,400 pop-ups from the system which may 185 00:06:48,400 --> 00:06:50,479 indicate trojan activity. 186 00:06:50,479 --> 00:06:52,800 And lastly, we have modification in the 187 00:06:52,800 --> 00:06:54,800 system application and change of the 188 00:06:54,800 --> 00:06:56,960 desktop appearance can be also due to 189 00:06:56,960 --> 00:07:00,000 the infection of a trojan program. 190 00:07:00,000 --> 00:07:02,479 Next, let's take a look at a famous cyber 191 00:07:02,479 --> 00:07:06,720 attack for virus and a trojan horse. 192 00:07:07,520 --> 00:07:09,280 For virus, we have 193 00:07:09,280 --> 00:07:11,840 the my doom virus which was identified 194 00:07:11,840 --> 00:07:14,880 in the ER 2004, which affected over 50 195 00:07:14,880 --> 00:07:17,599 million systems by creating a network of 196 00:07:17,599 --> 00:07:19,680 sending spam emails, 197 00:07:19,680 --> 00:07:22,400 which was to gain backdoor access into 198 00:07:22,400 --> 00:07:24,160 our systems. 199 00:07:24,160 --> 00:07:26,560 Next for the trojan horse, we have the 200 00:07:26,560 --> 00:07:28,639 emote trojan program 201 00:07:28,639 --> 00:07:30,800 which is specifically designed for 202 00:07:30,800 --> 00:07:33,199 financial theft and for stealing bank 203 00:07:33,199 --> 00:07:35,599 related information. 204 00:07:35,599 --> 00:07:37,759 Next, we have few points for how to 205 00:07:37,759 --> 00:07:40,319 prevent virus entry or trojan attack for 206 00:07:40,319 --> 00:07:42,800 a system. 207 00:07:42,960 --> 00:07:45,520 The most basic way of virus protection 208 00:07:45,520 --> 00:07:47,919 is to using antivirus and do regular 209 00:07:47,919 --> 00:07:49,199 viruses can 210 00:07:49,199 --> 00:07:50,960 this will prevent virus entry in the 211 00:07:50,960 --> 00:07:52,960 system, and also having more than one 212 00:07:52,960 --> 00:07:54,960 antivirus provides much better 213 00:07:54,960 --> 00:07:57,199 protectionm 214 00:07:57,199 --> 00:07:59,759 then avoid visiting uncertified websites 215 00:07:59,759 --> 00:08:02,240 can also prevent virus entry into our 216 00:08:02,240 --> 00:08:04,639 systemm 217 00:08:05,680 --> 00:08:07,039 then we have 218 00:08:07,039 --> 00:08:09,440 using regular driver updates and system 219 00:08:09,440 --> 00:08:12,080 updates to prevent virus entry for 220 00:08:12,080 --> 00:08:15,199 trojan. We have using certified softwares 221 00:08:15,199 --> 00:08:17,759 from legal sites to prevent any trojan 222 00:08:17,759 --> 00:08:20,080 activity in our system, 223 00:08:20,080 --> 00:08:22,479 and also avoid clicking random pop-ups 224 00:08:22,479 --> 00:08:25,039 that we often see on the internet 225 00:08:25,039 --> 00:08:28,160 and lastly using antivirus and firewalls 226 00:08:28,160 --> 00:08:30,560 for protection against trojan horses is 227 00:08:30,560 --> 00:08:33,199 a good habit, 228 00:08:33,839 --> 00:08:35,360 Now, that we have reached the end of the 229 00:08:35,360 --> 00:08:38,320 video, let's take a look what we learnt 230 00:08:38,320 --> 00:08:41,200 for the first part. We saw the main 231 00:08:41,200 --> 00:08:43,200 objective of the virus is to harm the 232 00:08:43,200 --> 00:08:45,920 data and information in a system whereas 233 00:08:45,920 --> 00:08:47,839 for the trojan, we have stealing of the 234 00:08:47,839 --> 00:08:50,480 data files and information 235 00:08:50,480 --> 00:08:53,040 effect of viruses is more drastic in 236 00:08:53,040 --> 00:08:56,640 comparison to the trojan horses. 237 00:08:56,959 --> 00:08:58,880 Then we have viruses which are 238 00:08:58,880 --> 00:09:01,680 non-remote programs whereas trojan 239 00:09:01,680 --> 00:09:03,839 horses are remote accessed. 240 00:09:03,839 --> 00:09:05,200 And lastly, 241 00:09:05,200 --> 00:09:07,440 viruses have the ability to replicate 242 00:09:07,440 --> 00:09:10,080 itself to harm multiple files whereas 243 00:09:10,080 --> 00:09:11,920 trojan does not have the 244 00:09:11,920 --> 00:09:13,680 replication ability. 245 00:09:13,680 --> 00:09:15,600 If you have any questions, you can ask 246 00:09:15,600 --> 00:09:17,600 them on the comment section. Thank you 247 00:09:17,600 --> 00:09:20,760 for watching. 248 00:09:22,080 --> 00:09:23,920 Hi there. If you like this video, 249 00:09:23,920 --> 00:09:25,600 subscribe to the simply learn YouTube 250 00:09:25,600 --> 00:09:28,240 channel, and click here to watch similar 251 00:09:28,240 --> 00:09:30,399 videos to nerd up and get certified. 252 00:09:30,399 --> 00:09:33,720 Click here.