-
In the current technological era, coming
-
across different computer problems
-
related to malware and cyber tax is
-
common.
-
According to AV test institute, there are
-
more than one billion malware programs
-
available.
-
And new malware programs are detected
-
regularly.
-
Hi guys, and welcome to yet another
-
interesting video by simply learn but
-
before we begin. If you love watching
-
tech videos, subscribe to our channel and
-
hit the bell icon to never miss an
-
update.
-
In this video, we'll understand what is a
-
malware program?
-
Then, we'll see what exactly are viruses
-
and trojans.
-
Then, we will see how they operate in a
-
system.
-
And then different types of viruses and
-
trojan,
-
and how to detect the activity of such
-
programs.
-
And lastly, we will see how to prevent
-
our system from getting infected by such
-
programs.
-
Malware is a malicious software that is
-
programmed to cause damage to a computer.
-
System network and hardware devices.
-
Many malicious programs like trojan
-
viruses worms and bots which cause
-
damage to the system are known as
-
malware. Most of the malware programs are
-
designed to steal information from the
-
targeted user
-
or to steal money from the target by
-
stealing sensitive data.
-
Let's take a look at the introduction
-
for two different types of malware virus,
-
and trojan.
-
Firstly, let's take a look what exactly
-
is a virus program.
-
A computer virus is a type of malicious
-
program that on execution replicates
-
itself.
-
They get attached to different files and
-
programs, which are termed as host
-
programs by inserting their code. If the
-
attachment succeeds, the targeted program
-
is termed as infected with a computer
-
virus.
-
Now, let's take a look at the trojan
-
horse.
-
Trojan horse program is a program that
-
disguises itself as a legitimate program,
-
but harms the system on installation.
-
They hide within the attachments and
-
emails then transfer from one system to
-
another they create bad doors into a
-
system to allow the cyber criminal to
-
steal our information.
-
Let's take a look how they function
-
after getting installed into our system.
-
Firstly, we have virus programs the
-
computer virus must contain two parts to
-
infect the system.
-
First is a surge routine which locates
-
new files and data that is to be
-
infected by the virus program.
-
And the second part is known as the copy
-
routine, which is necessary for the
-
program to copy itself into the targeted
-
file, which is located by the search
-
routine now let's take a look at the
-
trojan horse functioning
-
for trojan horses entryway into our
-
system is through emails that may look
-
legitimate, but may have unknown
-
attachments. And when such files are
-
downloaded into the device, the trojan
-
program gets installed and infects the
-
system.
-
They also infect the system on the
-
execution of infected application or the
-
executable file and attacks the system.
-
Now, that we understand what virus and
-
trojans are let's understand different
-
types of virus androgens.
-
Let's take a look at different types of
-
viruses.
-
The first one is known as the booth
-
sector virus. This type of virus damages
-
the booting section of the system by
-
infecting the master bot record, which is
-
also known as MBR.
-
This damages the boot sector section by
-
targeting the hard disk of the system.
-
Then we have the macro virus.
-
Micro virus is a type of virus that gets
-
embedded into the document related data,
-
and is executed when the file is opened.
-
They also are designed to replicate
-
themselves, and infect the system on a
-
larger scale.
-
And lastly, we have the direct action
-
virus.
-
This type of virus gets attached to
-
executable files, which on execution
-
activates the virus program and infects
-
the system. Once the infection of the
-
file is completed, they exit the system
-
which is also the reason it is known as
-
a non-resident virus.
-
Let's take a look at different types of
-
trojans.
-
The first type of trojan is the backdoor
-
trojan.
-
They are designed to create a backdoor
-
in the system on execution of an
-
infected program.
-
They provide remote access of our system
-
to the hacker. This way, the cyber
-
criminal can steal our system data and
-
may use it for illegal activities. Next,
-
we have
-
quick source trojan.
-
They enter the system by clicking the
-
random pop-ups which we come across on
-
the internet.
-
They attempt a user to give their
-
personal details for different
-
transactions or schemes,
-
which may provide remote access of a
-
system to the cyber criminal.
-
And the last trojan type is ransom
-
trojan.
-
This type of trojan program after
-
entering the system blocks the user from
-
accessing
-
its own system. And also affects the
-
system functioning
-
the cyber criminal demands a ransom from
-
the targeted user for the removal of the
-
trojan program from the device.
-
Now, that we understand some details
-
regarding viruses and trojan, let's solve
-
a question.
-
The question is Jake was denied access
-
to his system, and he wasn't able to
-
control the data and information in his
-
system.
-
Now,
-
the actual question is what could be the
-
reason behind his system's problem?
-
Option A: macro virus, Option B: ransom
-
trojan, Option C: backward version.
-
Give your answers in the comment section.
-
Now, let's understand how to detect the
-
activity of viruses and trojan in our
-
system
-
to detect virus or trojan activity in a
-
system, we can refer to the following
-
points
-
for viruses. We have
-
slowing down of the system and frequent
-
application freeze shows that the
-
infection of the virus is present in the
-
system.
-
Then, we have the viruses can also steal
-
sensitive data including passwords,
-
account details,
-
which may lead to unexpected log out
-
from the accounts or corruption of the
-
sensitive data.
-
And lastly, we have frequent system
-
crashes due to virus infection which
-
damages the operating system.
-
For trojan, we have frequent system
-
crashes and system also faces slow
-
reaction time.
-
Then, we have there are more random
-
pop-ups from the system which may
-
indicate trojan activity.
-
And lastly, we have modification in the
-
system application and change of the
-
desktop appearance can be also due to
-
the infection of a trojan program.
-
Next, let's take a look at a famous cyber
-
attack for virus and a trojan horse.
-
For virus, we have
-
the my doom virus which was identified
-
in the ER 2004, which affected over 50
-
million systems by creating a network of
-
sending spam emails,
-
which was to gain backdoor access into
-
our systems.
-
Next for the trojan horse, we have the
-
emote trojan program
-
which is specifically designed for
-
financial theft and for stealing bank
-
related information.
-
Next, we have few points for how to
-
prevent virus entry or trojan attack for
-
a system.
-
The most basic way of virus protection
-
is to using antivirus and do regular
-
viruses can
-
this will prevent virus entry in the
-
system, and also having more than one
-
antivirus provides much better
-
protectionm
-
then avoid visiting uncertified websites
-
can also prevent virus entry into our
-
systemm
-
then we have
-
using regular driver updates and system
-
updates to prevent virus entry for
-
trojan. We have using certified softwares
-
from legal sites to prevent any trojan
-
activity in our system,
-
and also avoid clicking random pop-ups
-
that we often see on the internet
-
and lastly using antivirus and firewalls
-
for protection against trojan horses is
-
a good habit,
-
Now, that we have reached the end of the
-
video, let's take a look what we learnt
-
for the first part. We saw the main
-
objective of the virus is to harm the
-
data and information in a system whereas
-
for the trojan, we have stealing of the
-
data files and information
-
effect of viruses is more drastic in
-
comparison to the trojan horses.
-
Then we have viruses which are
-
non-remote programs whereas trojan
-
horses are remote accessed.
-
And lastly,
-
viruses have the ability to replicate
-
itself to harm multiple files whereas
-
trojan does not have the
-
replication ability.
-
If you have any questions, you can ask
-
them on the comment section. Thank you
-
for watching.
-
Hi there. If you like this video,
-
subscribe to the simply learn YouTube
-
channel, and click here to watch similar
-
videos to nerd up and get certified.
-
Click here.