< Return to Video

What Is Malware? | Malware Explained | What Is Malware And It's Types? | Malware Attack |Simplilearn

  • 0:08 - 0:10
    In the current technological era, coming
  • 0:10 - 0:12
    across different computer problems
  • 0:12 - 0:14
    related to malware and cyber tax is
  • 0:14 - 0:15
    common.
  • 0:15 - 0:18
    According to AV test institute, there are
  • 0:18 - 0:20
    more than one billion malware programs
  • 0:20 - 0:21
    available.
  • 0:21 - 0:23
    And new malware programs are detected
  • 0:23 - 0:25
    regularly.
  • 0:25 - 0:26
    Hi guys, and welcome to yet another
  • 0:26 - 0:29
    interesting video by simply learn but
  • 0:29 - 0:31
    before we begin. If you love watching
  • 0:31 - 0:33
    tech videos, subscribe to our channel and
  • 0:33 - 0:35
    hit the bell icon to never miss an
  • 0:35 - 0:37
    update.
  • 0:37 - 0:39
    In this video, we'll understand what is a
  • 0:39 - 0:41
    malware program?
  • 0:41 - 0:44
    Then, we'll see what exactly are viruses
  • 0:44 - 0:46
    and trojans.
  • 0:46 - 0:48
    Then, we will see how they operate in a
  • 0:48 - 0:49
    system.
  • 0:49 - 0:51
    And then different types of viruses and
  • 0:51 - 0:53
    trojan,
  • 0:53 - 0:55
    and how to detect the activity of such
  • 0:55 - 0:56
    programs.
  • 0:56 - 0:58
    And lastly, we will see how to prevent
  • 0:58 - 1:00
    our system from getting infected by such
  • 1:00 - 1:03
    programs.
  • 1:03 - 1:05
    Malware is a malicious software that is
  • 1:05 - 1:07
    programmed to cause damage to a computer.
  • 1:07 - 1:10
    System network and hardware devices.
  • 1:10 - 1:12
    Many malicious programs like trojan
  • 1:12 - 1:15
    viruses worms and bots which cause
  • 1:15 - 1:17
    damage to the system are known as
  • 1:17 - 1:19
    malware. Most of the malware programs are
  • 1:19 - 1:21
    designed to steal information from the
  • 1:21 - 1:23
    targeted user
  • 1:23 - 1:25
    or to steal money from the target by
  • 1:25 - 1:28
    stealing sensitive data.
  • 1:28 - 1:30
    Let's take a look at the introduction
  • 1:30 - 1:32
    for two different types of malware virus,
  • 1:32 - 1:35
    and trojan.
  • 1:36 - 1:38
    Firstly, let's take a look what exactly
  • 1:38 - 1:40
    is a virus program.
  • 1:40 - 1:43
    A computer virus is a type of malicious
  • 1:43 - 1:45
    program that on execution replicates
  • 1:45 - 1:46
    itself.
  • 1:46 - 1:48
    They get attached to different files and
  • 1:48 - 1:50
    programs, which are termed as host
  • 1:50 - 1:53
    programs by inserting their code. If the
  • 1:53 - 1:56
    attachment succeeds, the targeted program
  • 1:56 - 1:58
    is termed as infected with a computer
  • 1:58 - 1:59
    virus.
  • 1:59 - 2:01
    Now, let's take a look at the trojan
  • 2:01 - 2:02
    horse.
  • 2:02 - 2:04
    Trojan horse program is a program that
  • 2:04 - 2:07
    disguises itself as a legitimate program,
  • 2:07 - 2:10
    but harms the system on installation.
  • 2:10 - 2:11
    They hide within the attachments and
  • 2:11 - 2:14
    emails then transfer from one system to
  • 2:14 - 2:16
    another they create bad doors into a
  • 2:16 - 2:19
    system to allow the cyber criminal to
  • 2:19 - 2:22
    steal our information.
  • 2:22 - 2:23
    Let's take a look how they function
  • 2:23 - 2:28
    after getting installed into our system.
  • 2:28 - 2:30
    Firstly, we have virus programs the
  • 2:30 - 2:32
    computer virus must contain two parts to
  • 2:32 - 2:34
    infect the system.
  • 2:34 - 2:37
    First is a surge routine which locates
  • 2:37 - 2:39
    new files and data that is to be
  • 2:39 - 2:41
    infected by the virus program.
  • 2:41 - 2:43
    And the second part is known as the copy
  • 2:43 - 2:45
    routine, which is necessary for the
  • 2:45 - 2:48
    program to copy itself into the targeted
  • 2:48 - 2:51
    file, which is located by the search
  • 2:51 - 2:52
    routine now let's take a look at the
  • 2:52 - 2:55
    trojan horse functioning
  • 2:55 - 2:57
    for trojan horses entryway into our
  • 2:57 - 2:59
    system is through emails that may look
  • 2:59 - 3:01
    legitimate, but may have unknown
  • 3:01 - 3:04
    attachments. And when such files are
  • 3:04 - 3:06
    downloaded into the device, the trojan
  • 3:06 - 3:08
    program gets installed and infects the
  • 3:08 - 3:10
    system.
  • 3:10 - 3:12
    They also infect the system on the
  • 3:12 - 3:14
    execution of infected application or the
  • 3:14 - 3:18
    executable file and attacks the system.
  • 3:18 - 3:20
    Now, that we understand what virus and
  • 3:20 - 3:22
    trojans are let's understand different
  • 3:22 - 3:26
    types of virus androgens.
  • 3:26 - 3:28
    Let's take a look at different types of
  • 3:28 - 3:29
    viruses.
  • 3:29 - 3:31
    The first one is known as the booth
  • 3:31 - 3:33
    sector virus. This type of virus damages
  • 3:33 - 3:36
    the booting section of the system by
  • 3:36 - 3:38
    infecting the master bot record, which is
  • 3:38 - 3:40
    also known as MBR.
  • 3:40 - 3:42
    This damages the boot sector section by
  • 3:42 - 3:45
    targeting the hard disk of the system.
  • 3:45 - 3:48
    Then we have the macro virus.
  • 3:48 - 3:51
    Micro virus is a type of virus that gets
  • 3:51 - 3:53
    embedded into the document related data,
  • 3:53 - 3:56
    and is executed when the file is opened.
  • 3:56 - 3:58
    They also are designed to replicate
  • 3:58 - 4:00
    themselves, and infect the system on a
  • 4:00 - 4:02
    larger scale.
  • 4:02 - 4:04
    And lastly, we have the direct action
  • 4:04 - 4:06
    virus.
  • 4:06 - 4:08
    This type of virus gets attached to
  • 4:08 - 4:11
    executable files, which on execution
  • 4:11 - 4:13
    activates the virus program and infects
  • 4:13 - 4:16
    the system. Once the infection of the
  • 4:16 - 4:19
    file is completed, they exit the system
  • 4:19 - 4:21
    which is also the reason it is known as
  • 4:21 - 4:24
    a non-resident virus.
  • 4:24 - 4:25
    Let's take a look at different types of
  • 4:25 - 4:27
    trojans.
  • 4:27 - 4:30
    The first type of trojan is the backdoor
  • 4:30 - 4:31
    trojan.
  • 4:31 - 4:33
    They are designed to create a backdoor
  • 4:33 - 4:35
    in the system on execution of an
  • 4:35 - 4:37
    infected program.
  • 4:37 - 4:39
    They provide remote access of our system
  • 4:39 - 4:41
    to the hacker. This way, the cyber
  • 4:41 - 4:44
    criminal can steal our system data and
  • 4:44 - 4:46
    may use it for illegal activities. Next,
  • 4:46 - 4:47
    we have
  • 4:47 - 4:49
    quick source trojan.
  • 4:49 - 4:51
    They enter the system by clicking the
  • 4:51 - 4:53
    random pop-ups which we come across on
  • 4:53 - 4:55
    the internet.
  • 4:55 - 4:56
    They attempt a user to give their
  • 4:56 - 4:58
    personal details for different
  • 4:58 - 5:01
    transactions or schemes,
  • 5:01 - 5:03
    which may provide remote access of a
  • 5:03 - 5:06
    system to the cyber criminal.
  • 5:06 - 5:08
    And the last trojan type is ransom
  • 5:08 - 5:09
    trojan.
  • 5:09 - 5:11
    This type of trojan program after
  • 5:11 - 5:14
    entering the system blocks the user from
  • 5:14 - 5:15
    accessing
  • 5:15 - 5:18
    its own system. And also affects the
  • 5:18 - 5:20
    system functioning
  • 5:20 - 5:22
    the cyber criminal demands a ransom from
  • 5:22 - 5:25
    the targeted user for the removal of the
  • 5:25 - 5:27
    trojan program from the device.
  • 5:27 - 5:29
    Now, that we understand some details
  • 5:29 - 5:31
    regarding viruses and trojan, let's solve
  • 5:31 - 5:33
    a question.
  • 5:33 - 5:35
    The question is Jake was denied access
  • 5:35 - 5:37
    to his system, and he wasn't able to
  • 5:37 - 5:39
    control the data and information in his
  • 5:39 - 5:41
    system.
  • 5:41 - 5:42
    Now,
  • 5:42 - 5:44
    the actual question is what could be the
  • 5:44 - 5:47
    reason behind his system's problem?
  • 5:47 - 5:50
    Option A: macro virus, Option B: ransom
  • 5:50 - 5:53
    trojan, Option C: backward version.
  • 5:53 - 5:56
    Give your answers in the comment section.
  • 5:56 - 5:58
    Now, let's understand how to detect the
  • 5:58 - 6:00
    activity of viruses and trojan in our
  • 6:00 - 6:02
    system
  • 6:02 - 6:05
    to detect virus or trojan activity in a
  • 6:05 - 6:07
    system, we can refer to the following
  • 6:07 - 6:08
    points
  • 6:08 - 6:09
    for viruses. We have
  • 6:09 - 6:12
    slowing down of the system and frequent
  • 6:12 - 6:14
    application freeze shows that the
  • 6:14 - 6:16
    infection of the virus is present in the
  • 6:16 - 6:17
    system.
  • 6:17 - 6:20
    Then, we have the viruses can also steal
  • 6:20 - 6:23
    sensitive data including passwords,
  • 6:23 - 6:24
    account details,
  • 6:24 - 6:27
    which may lead to unexpected log out
  • 6:27 - 6:29
    from the accounts or corruption of the
  • 6:29 - 6:30
    sensitive data.
  • 6:30 - 6:33
    And lastly, we have frequent system
  • 6:33 - 6:35
    crashes due to virus infection which
  • 6:35 - 6:38
    damages the operating system.
  • 6:38 - 6:40
    For trojan, we have frequent system
  • 6:40 - 6:42
    crashes and system also faces slow
  • 6:42 - 6:44
    reaction time.
  • 6:44 - 6:46
    Then, we have there are more random
  • 6:46 - 6:48
    pop-ups from the system which may
  • 6:48 - 6:50
    indicate trojan activity.
  • 6:50 - 6:53
    And lastly, we have modification in the
  • 6:53 - 6:55
    system application and change of the
  • 6:55 - 6:57
    desktop appearance can be also due to
  • 6:57 - 7:00
    the infection of a trojan program.
  • 7:00 - 7:02
    Next, let's take a look at a famous cyber
  • 7:02 - 7:07
    attack for virus and a trojan horse.
  • 7:08 - 7:09
    For virus, we have
  • 7:09 - 7:12
    the my doom virus which was identified
  • 7:12 - 7:15
    in the ER 2004, which affected over 50
  • 7:15 - 7:18
    million systems by creating a network of
  • 7:18 - 7:20
    sending spam emails,
  • 7:20 - 7:22
    which was to gain backdoor access into
  • 7:22 - 7:24
    our systems.
  • 7:24 - 7:27
    Next for the trojan horse, we have the
  • 7:27 - 7:29
    emote trojan program
  • 7:29 - 7:31
    which is specifically designed for
  • 7:31 - 7:33
    financial theft and for stealing bank
  • 7:33 - 7:36
    related information.
  • 7:36 - 7:38
    Next, we have few points for how to
  • 7:38 - 7:40
    prevent virus entry or trojan attack for
  • 7:40 - 7:43
    a system.
  • 7:43 - 7:46
    The most basic way of virus protection
  • 7:46 - 7:48
    is to using antivirus and do regular
  • 7:48 - 7:49
    viruses can
  • 7:49 - 7:51
    this will prevent virus entry in the
  • 7:51 - 7:53
    system, and also having more than one
  • 7:53 - 7:55
    antivirus provides much better
  • 7:55 - 7:57
    protectionm
  • 7:57 - 8:00
    then avoid visiting uncertified websites
  • 8:00 - 8:02
    can also prevent virus entry into our
  • 8:02 - 8:05
    systemm
  • 8:06 - 8:07
    then we have
  • 8:07 - 8:09
    using regular driver updates and system
  • 8:09 - 8:12
    updates to prevent virus entry for
  • 8:12 - 8:15
    trojan. We have using certified softwares
  • 8:15 - 8:18
    from legal sites to prevent any trojan
  • 8:18 - 8:20
    activity in our system,
  • 8:20 - 8:22
    and also avoid clicking random pop-ups
  • 8:22 - 8:25
    that we often see on the internet
  • 8:25 - 8:28
    and lastly using antivirus and firewalls
  • 8:28 - 8:31
    for protection against trojan horses is
  • 8:31 - 8:33
    a good habit,
  • 8:34 - 8:35
    Now, that we have reached the end of the
  • 8:35 - 8:38
    video, let's take a look what we learnt
  • 8:38 - 8:41
    for the first part. We saw the main
  • 8:41 - 8:43
    objective of the virus is to harm the
  • 8:43 - 8:46
    data and information in a system whereas
  • 8:46 - 8:48
    for the trojan, we have stealing of the
  • 8:48 - 8:50
    data files and information
  • 8:50 - 8:53
    effect of viruses is more drastic in
  • 8:53 - 8:57
    comparison to the trojan horses.
  • 8:57 - 8:59
    Then we have viruses which are
  • 8:59 - 9:02
    non-remote programs whereas trojan
  • 9:02 - 9:04
    horses are remote accessed.
  • 9:04 - 9:05
    And lastly,
  • 9:05 - 9:07
    viruses have the ability to replicate
  • 9:07 - 9:10
    itself to harm multiple files whereas
  • 9:10 - 9:12
    trojan does not have the
  • 9:12 - 9:14
    replication ability.
  • 9:14 - 9:16
    If you have any questions, you can ask
  • 9:16 - 9:18
    them on the comment section. Thank you
  • 9:18 - 9:21
    for watching.
  • 9:22 - 9:24
    Hi there. If you like this video,
  • 9:24 - 9:26
    subscribe to the simply learn YouTube
  • 9:26 - 9:28
    channel, and click here to watch similar
  • 9:28 - 9:30
    videos to nerd up and get certified.
  • 9:30 - 9:34
    Click here.
Title:
What Is Malware? | Malware Explained | What Is Malware And It's Types? | Malware Attack |Simplilearn
Description:

more » « less
Video Language:
English
Duration:
09:34

English subtitles

Revisions Compare revisions