WEBVTT 00:00:08.080 --> 00:00:10.480 In the current technological era, coming 00:00:10.480 --> 00:00:12.320 across different computer problems 00:00:12.320 --> 00:00:14.320 related to malware and cyber tax is 00:00:14.320 --> 00:00:15.360 common. 00:00:15.360 --> 00:00:17.840 According to AV test institute, there are 00:00:17.840 --> 00:00:19.840 more than one billion malware programs 00:00:19.840 --> 00:00:20.960 available. 00:00:20.960 --> 00:00:23.039 And new malware programs are detected 00:00:23.039 --> 00:00:24.560 regularly. 00:00:24.560 --> 00:00:26.480 Hi guys, and welcome to yet another 00:00:26.480 --> 00:00:28.640 interesting video by simply learn but 00:00:28.640 --> 00:00:30.640 before we begin. If you love watching 00:00:30.640 --> 00:00:33.280 tech videos, subscribe to our channel and 00:00:33.280 --> 00:00:34.960 hit the bell icon to never miss an 00:00:34.960 --> 00:00:36.800 update. 00:00:36.800 --> 00:00:39.360 In this video, we'll understand what is a 00:00:39.360 --> 00:00:41.280 malware program? 00:00:41.280 --> 00:00:43.920 Then, we'll see what exactly are viruses 00:00:43.920 --> 00:00:45.520 and trojans. 00:00:45.520 --> 00:00:47.520 Then, we will see how they operate in a 00:00:47.520 --> 00:00:49.120 system. 00:00:49.120 --> 00:00:51.120 And then different types of viruses and 00:00:51.120 --> 00:00:52.800 trojan, 00:00:52.800 --> 00:00:54.719 and how to detect the activity of such 00:00:54.719 --> 00:00:56.000 programs. 00:00:56.000 --> 00:00:58.079 And lastly, we will see how to prevent 00:00:58.079 --> 00:01:00.160 our system from getting infected by such 00:01:00.160 --> 00:01:02.719 programs. 00:01:03.120 --> 00:01:05.280 Malware is a malicious software that is 00:01:05.280 --> 00:01:07.280 programmed to cause damage to a computer. 00:01:07.280 --> 00:01:10.479 System network and hardware devices. 00:01:10.479 --> 00:01:12.479 Many malicious programs like trojan 00:01:12.479 --> 00:01:14.640 viruses worms and bots which cause 00:01:14.640 --> 00:01:16.560 damage to the system are known as 00:01:16.560 --> 00:01:19.040 malware. Most of the malware programs are 00:01:19.040 --> 00:01:21.119 designed to steal information from the 00:01:21.119 --> 00:01:22.640 targeted user 00:01:22.640 --> 00:01:25.280 or to steal money from the target by 00:01:25.280 --> 00:01:27.920 stealing sensitive data. 00:01:27.920 --> 00:01:29.840 Let's take a look at the introduction 00:01:29.840 --> 00:01:32.479 for two different types of malware virus, 00:01:32.479 --> 00:01:35.040 and trojan. 00:01:36.320 --> 00:01:38.159 Firstly, let's take a look what exactly 00:01:38.159 --> 00:01:40.479 is a virus program. 00:01:40.479 --> 00:01:42.640 A computer virus is a type of malicious 00:01:42.640 --> 00:01:44.880 program that on execution replicates 00:01:44.880 --> 00:01:45.920 itself. 00:01:45.920 --> 00:01:48.159 They get attached to different files and 00:01:48.159 --> 00:01:50.320 programs, which are termed as host 00:01:50.320 --> 00:01:53.040 programs by inserting their code. If the 00:01:53.040 --> 00:01:55.600 attachment succeeds, the targeted program 00:01:55.600 --> 00:01:57.840 is termed as infected with a computer 00:01:57.840 --> 00:01:58.880 virus. 00:01:58.880 --> 00:02:00.640 Now, let's take a look at the trojan 00:02:00.640 --> 00:02:01.840 horse. 00:02:01.840 --> 00:02:04.159 Trojan horse program is a program that 00:02:04.159 --> 00:02:06.880 disguises itself as a legitimate program, 00:02:06.880 --> 00:02:09.520 but harms the system on installation. 00:02:09.520 --> 00:02:11.440 They hide within the attachments and 00:02:11.440 --> 00:02:13.760 emails then transfer from one system to 00:02:13.760 --> 00:02:16.400 another they create bad doors into a 00:02:16.400 --> 00:02:18.800 system to allow the cyber criminal to 00:02:18.800 --> 00:02:21.520 steal our information. 00:02:21.520 --> 00:02:23.280 Let's take a look how they function 00:02:23.280 --> 00:02:27.520 after getting installed into our system. 00:02:27.520 --> 00:02:30.080 Firstly, we have virus programs the 00:02:30.080 --> 00:02:32.400 computer virus must contain two parts to 00:02:32.400 --> 00:02:34.000 infect the system. 00:02:34.000 --> 00:02:36.720 First is a surge routine which locates 00:02:36.720 --> 00:02:38.560 new files and data that is to be 00:02:38.560 --> 00:02:41.040 infected by the virus program. 00:02:41.040 --> 00:02:43.120 And the second part is known as the copy 00:02:43.120 --> 00:02:45.440 routine, which is necessary for the 00:02:45.440 --> 00:02:48.080 program to copy itself into the targeted 00:02:48.080 --> 00:02:50.560 file, which is located by the search 00:02:50.560 --> 00:02:52.400 routine now let's take a look at the 00:02:52.400 --> 00:02:54.640 trojan horse functioning 00:02:54.640 --> 00:02:56.720 for trojan horses entryway into our 00:02:56.720 --> 00:02:59.440 system is through emails that may look 00:02:59.440 --> 00:03:01.200 legitimate, but may have unknown 00:03:01.200 --> 00:03:03.680 attachments. And when such files are 00:03:03.680 --> 00:03:06.080 downloaded into the device, the trojan 00:03:06.080 --> 00:03:08.159 program gets installed and infects the 00:03:08.159 --> 00:03:09.920 system. 00:03:09.920 --> 00:03:11.840 They also infect the system on the 00:03:11.840 --> 00:03:14.159 execution of infected application or the 00:03:14.159 --> 00:03:17.599 executable file and attacks the system. 00:03:17.599 --> 00:03:19.840 Now, that we understand what virus and 00:03:19.840 --> 00:03:22.239 trojans are let's understand different 00:03:22.239 --> 00:03:25.840 types of virus androgens. 00:03:25.840 --> 00:03:27.599 Let's take a look at different types of 00:03:27.599 --> 00:03:28.959 viruses. 00:03:28.959 --> 00:03:30.720 The first one is known as the booth 00:03:30.720 --> 00:03:33.280 sector virus. This type of virus damages 00:03:33.280 --> 00:03:35.519 the booting section of the system by 00:03:35.519 --> 00:03:37.680 infecting the master bot record, which is 00:03:37.680 --> 00:03:39.680 also known as MBR. 00:03:39.680 --> 00:03:42.239 This damages the boot sector section by 00:03:42.239 --> 00:03:45.360 targeting the hard disk of the system. 00:03:45.360 --> 00:03:48.000 Then we have the macro virus. 00:03:48.000 --> 00:03:50.640 Micro virus is a type of virus that gets 00:03:50.640 --> 00:03:53.360 embedded into the document related data, 00:03:53.360 --> 00:03:56.080 and is executed when the file is opened. 00:03:56.080 --> 00:03:57.920 They also are designed to replicate 00:03:57.920 --> 00:04:00.319 themselves, and infect the system on a 00:04:00.319 --> 00:04:02.000 larger scale. 00:04:02.000 --> 00:04:04.319 And lastly, we have the direct action 00:04:04.319 --> 00:04:06.159 virus. 00:04:06.159 --> 00:04:08.080 This type of virus gets attached to 00:04:08.080 --> 00:04:10.720 executable files, which on execution 00:04:10.720 --> 00:04:12.879 activates the virus program and infects 00:04:12.879 --> 00:04:15.760 the system. Once the infection of the 00:04:15.760 --> 00:04:18.799 file is completed, they exit the system 00:04:18.799 --> 00:04:21.359 which is also the reason it is known as 00:04:21.359 --> 00:04:23.520 a non-resident virus. 00:04:23.520 --> 00:04:25.199 Let's take a look at different types of 00:04:25.199 --> 00:04:27.360 trojans. 00:04:27.360 --> 00:04:29.520 The first type of trojan is the backdoor 00:04:29.520 --> 00:04:30.800 trojan. 00:04:30.800 --> 00:04:32.800 They are designed to create a backdoor 00:04:32.800 --> 00:04:34.880 in the system on execution of an 00:04:34.880 --> 00:04:36.720 infected program. 00:04:36.720 --> 00:04:39.360 They provide remote access of our system 00:04:39.360 --> 00:04:41.360 to the hacker. This way, the cyber 00:04:41.360 --> 00:04:43.759 criminal can steal our system data and 00:04:43.759 --> 00:04:46.000 may use it for illegal activities. Next, 00:04:46.000 --> 00:04:47.280 we have 00:04:47.280 --> 00:04:49.440 quick source trojan. 00:04:49.440 --> 00:04:51.199 They enter the system by clicking the 00:04:51.199 --> 00:04:53.440 random pop-ups which we come across on 00:04:53.440 --> 00:04:54.720 the internet. 00:04:54.720 --> 00:04:56.400 They attempt a user to give their 00:04:56.400 --> 00:04:58.320 personal details for different 00:04:58.320 --> 00:05:00.720 transactions or schemes, 00:05:00.720 --> 00:05:03.199 which may provide remote access of a 00:05:03.199 --> 00:05:05.919 system to the cyber criminal. 00:05:05.919 --> 00:05:08.240 And the last trojan type is ransom 00:05:08.240 --> 00:05:09.280 trojan. 00:05:09.280 --> 00:05:11.360 This type of trojan program after 00:05:11.360 --> 00:05:14.000 entering the system blocks the user from 00:05:14.000 --> 00:05:15.120 accessing 00:05:15.120 --> 00:05:17.759 its own system. And also affects the 00:05:17.759 --> 00:05:19.759 system functioning 00:05:19.759 --> 00:05:22.080 the cyber criminal demands a ransom from 00:05:22.080 --> 00:05:24.800 the targeted user for the removal of the 00:05:24.800 --> 00:05:27.199 trojan program from the device. 00:05:27.199 --> 00:05:28.880 Now, that we understand some details 00:05:28.880 --> 00:05:31.199 regarding viruses and trojan, let's solve 00:05:31.199 --> 00:05:32.880 a question. 00:05:32.880 --> 00:05:35.440 The question is Jake was denied access 00:05:35.440 --> 00:05:37.280 to his system, and he wasn't able to 00:05:37.280 --> 00:05:39.120 control the data and information in his 00:05:39.120 --> 00:05:41.039 system. 00:05:41.039 --> 00:05:42.080 Now, 00:05:42.080 --> 00:05:44.160 the actual question is what could be the 00:05:44.160 --> 00:05:46.560 reason behind his system's problem? 00:05:46.560 --> 00:05:49.520 Option A: macro virus, Option B: ransom 00:05:49.520 --> 00:05:52.560 trojan, Option C: backward version. 00:05:52.560 --> 00:05:55.840 Give your answers in the comment section. 00:05:55.840 --> 00:05:58.080 Now, let's understand how to detect the 00:05:58.080 --> 00:06:00.240 activity of viruses and trojan in our 00:06:00.240 --> 00:06:02.400 system 00:06:02.400 --> 00:06:04.639 to detect virus or trojan activity in a 00:06:04.639 --> 00:06:06.800 system, we can refer to the following 00:06:06.800 --> 00:06:07.680 points 00:06:07.680 --> 00:06:09.440 for viruses. We have 00:06:09.440 --> 00:06:11.680 slowing down of the system and frequent 00:06:11.680 --> 00:06:13.680 application freeze shows that the 00:06:13.680 --> 00:06:15.840 infection of the virus is present in the 00:06:15.840 --> 00:06:17.360 system. 00:06:17.360 --> 00:06:20.400 Then, we have the viruses can also steal 00:06:20.400 --> 00:06:22.800 sensitive data including passwords, 00:06:22.800 --> 00:06:24.240 account details, 00:06:24.240 --> 00:06:26.800 which may lead to unexpected log out 00:06:26.800 --> 00:06:28.800 from the accounts or corruption of the 00:06:28.800 --> 00:06:30.400 sensitive data. 00:06:30.400 --> 00:06:32.880 And lastly, we have frequent system 00:06:32.880 --> 00:06:35.360 crashes due to virus infection which 00:06:35.360 --> 00:06:38.000 damages the operating system. 00:06:38.000 --> 00:06:40.000 For trojan, we have frequent system 00:06:40.000 --> 00:06:42.319 crashes and system also faces slow 00:06:42.319 --> 00:06:44.080 reaction time. 00:06:44.080 --> 00:06:46.240 Then, we have there are more random 00:06:46.240 --> 00:06:48.400 pop-ups from the system which may 00:06:48.400 --> 00:06:50.479 indicate trojan activity. 00:06:50.479 --> 00:06:52.800 And lastly, we have modification in the 00:06:52.800 --> 00:06:54.800 system application and change of the 00:06:54.800 --> 00:06:56.960 desktop appearance can be also due to 00:06:56.960 --> 00:07:00.000 the infection of a trojan program. 00:07:00.000 --> 00:07:02.479 Next, let's take a look at a famous cyber 00:07:02.479 --> 00:07:06.720 attack for virus and a trojan horse. 00:07:07.520 --> 00:07:09.280 For virus, we have 00:07:09.280 --> 00:07:11.840 the my doom virus which was identified 00:07:11.840 --> 00:07:14.880 in the ER 2004, which affected over 50 00:07:14.880 --> 00:07:17.599 million systems by creating a network of 00:07:17.599 --> 00:07:19.680 sending spam emails, 00:07:19.680 --> 00:07:22.400 which was to gain backdoor access into 00:07:22.400 --> 00:07:24.160 our systems. 00:07:24.160 --> 00:07:26.560 Next for the trojan horse, we have the 00:07:26.560 --> 00:07:28.639 emote trojan program 00:07:28.639 --> 00:07:30.800 which is specifically designed for 00:07:30.800 --> 00:07:33.199 financial theft and for stealing bank 00:07:33.199 --> 00:07:35.599 related information. 00:07:35.599 --> 00:07:37.759 Next, we have few points for how to 00:07:37.759 --> 00:07:40.319 prevent virus entry or trojan attack for 00:07:40.319 --> 00:07:42.800 a system. 00:07:42.960 --> 00:07:45.520 The most basic way of virus protection 00:07:45.520 --> 00:07:47.919 is to using antivirus and do regular 00:07:47.919 --> 00:07:49.199 viruses can 00:07:49.199 --> 00:07:50.960 this will prevent virus entry in the 00:07:50.960 --> 00:07:52.960 system, and also having more than one 00:07:52.960 --> 00:07:54.960 antivirus provides much better 00:07:54.960 --> 00:07:57.199 protectionm 00:07:57.199 --> 00:07:59.759 then avoid visiting uncertified websites 00:07:59.759 --> 00:08:02.240 can also prevent virus entry into our 00:08:02.240 --> 00:08:04.639 systemm 00:08:05.680 --> 00:08:07.039 then we have 00:08:07.039 --> 00:08:09.440 using regular driver updates and system 00:08:09.440 --> 00:08:12.080 updates to prevent virus entry for 00:08:12.080 --> 00:08:15.199 trojan. We have using certified softwares 00:08:15.199 --> 00:08:17.759 from legal sites to prevent any trojan 00:08:17.759 --> 00:08:20.080 activity in our system, 00:08:20.080 --> 00:08:22.479 and also avoid clicking random pop-ups 00:08:22.479 --> 00:08:25.039 that we often see on the internet 00:08:25.039 --> 00:08:28.160 and lastly using antivirus and firewalls 00:08:28.160 --> 00:08:30.560 for protection against trojan horses is 00:08:30.560 --> 00:08:33.199 a good habit, 00:08:33.839 --> 00:08:35.360 Now, that we have reached the end of the 00:08:35.360 --> 00:08:38.320 video, let's take a look what we learnt 00:08:38.320 --> 00:08:41.200 for the first part. We saw the main 00:08:41.200 --> 00:08:43.200 objective of the virus is to harm the 00:08:43.200 --> 00:08:45.920 data and information in a system whereas 00:08:45.920 --> 00:08:47.839 for the trojan, we have stealing of the 00:08:47.839 --> 00:08:50.480 data files and information 00:08:50.480 --> 00:08:53.040 effect of viruses is more drastic in 00:08:53.040 --> 00:08:56.640 comparison to the trojan horses. 00:08:56.959 --> 00:08:58.880 Then we have viruses which are 00:08:58.880 --> 00:09:01.680 non-remote programs whereas trojan 00:09:01.680 --> 00:09:03.839 horses are remote accessed. 00:09:03.839 --> 00:09:05.200 And lastly, 00:09:05.200 --> 00:09:07.440 viruses have the ability to replicate 00:09:07.440 --> 00:09:10.080 itself to harm multiple files whereas 00:09:10.080 --> 00:09:11.920 trojan does not have the 00:09:11.920 --> 00:09:13.680 replication ability. 00:09:13.680 --> 00:09:15.600 If you have any questions, you can ask 00:09:15.600 --> 00:09:17.600 them on the comment section. Thank you 00:09:17.600 --> 00:09:20.760 for watching. 00:09:22.080 --> 00:09:23.920 Hi there. If you like this video, 00:09:23.920 --> 00:09:25.600 subscribe to the simply learn YouTube 00:09:25.600 --> 00:09:28.240 channel, and click here to watch similar 00:09:28.240 --> 00:09:30.399 videos to nerd up and get certified. 00:09:30.399 --> 00:09:33.720 Click here.