Sei sulla pagina 1di 17

ENGLISH II

1. Novi Priawan 11180441


2. Nova Priawan 11180456
3. Tristan Mandar 11180628
4. Roro Ayunisa 11180920
5. Della Alfia 11181176
MALCIUS SOFTWARE (MALWARE)
Malicious Software
In computer world, there is also a software which is created to do
something bad and to perform criminal intension. This kind of software
is called malicious software or malware.
WHAT IS MALWARE?
Malware is the collective name for a number of malicious software
variants, including viruses, ransomware and spyware. Shorthand for
malicious software, malware typically consists of code developed by
cyberattackers, designed to cause extensive damage to data and
systems or to gain unauthorized access to a network. Malware is
typically delivered in the form of a link or file over email and requires
the user to click on the link or open the file to execute the malware.
Malware has actually been a threat to individuals and organizations
since the early 1970s when the Creeper virus first appeared. Since then,
the world has been under attack from hundreds of thousands of
different malware variants, all with the intent of causing the most
disruption and damage as possible. Malicious software can bedivided
into some categories:
A. VIRUS
Virus is a software that can replicate by injecting or infecting its
own code into other file. By its way to infect other file, virus can be
divided into three categories:
1. Overwriting
A type of computer virus that will copy its own code over the host
computer system's file data, which destroys the original program.
After your computer system has been cleaned using an antivirus
program, users will need to install the original program again.
A. VIRUS
2. Appending
A virus that inserts a copy of its malicious code at the end of the file.
The goal of an appending virus is not to harm the host program, but
to modify it to hold the virus code and then be able to run itself.
A. VIRUS
3. Prepending
A virus defines the method it uses of infecting files by adding their
code to the beginning of the file. By doing this, these viruses ensure
that they are activated when an infected file is used.
B. WORM
Worm is also a kind of malicious software. It is different from virus,
which is worm can not inject of infect other files. A worm is a software
which replicates by creating its own copy. And without infecting other
file. Worm actually spreads through a network or the Internet using
email. Below is a sample of worm called I Love You. Worm I Love
You spreads through the Internet as an email attachment.
B. WORM
Usually, worm will do something tricky to cheat email receiver. The
first is using double file extension. At the left sample, worm I Love
You uses two extension, those are TXT.VBS. The second trick is using
social engineering. At the above sample, the worm uses a name “I
LOVE YOU” which might interested to every email receiver. Who
doesn’t need love? So, the effect of these tricks are any body –the
email receiver- will click that attachment which is actually a worm
code.
C. TROJAN HORSE
Trojan horse is derived from ancient Greek. Trojan Horse is a program
that looks like a good program but actually contains destructive code or
destructive feature. Trojan horse is different from virus and worm,
trojan horse can’t replicate and can’t infect other file.
C. TROJAN HORSE
There are many kind of trojan horse. Below are some of them:

a. Password Stealer
A password stealer is a program that collects chunks of data that are
likely to be account names and their associated passwords so that
an attacker can use those credentials to pose as the person they
were stolen from.
C. TROJAN HORSE
b. Keylogger
A keylogger is a technology that tracks and records consecutive
key strokes on a keyboard. Because sensitive information such as
usernames and passwords are often entered on a keyboard, a keylogger
can be a very dangerous technology. Keyloggers are often part of
malware, spyware or an external virus.
c. Fake Program
When installed the fake program, this program mimics a scan of
your computer and then report several flase detected spyware or
viruses on the computer.
C. TROJAN HORSE
d. Anonymous Emailer
An anonymous remailer is a server that receives messages with
embedded instructions on where to send them next, and that forwards
them without revealing where they originally came from
e. Remote Monitoring
Remote monitoring is a technique for monitoring network
conditions, monitoring is related to data traffic in a LAN network
C. TROJAN HORSE

f. Remote Administrator
Remote Administrator is a software dor viewing and controling
other computers from your computer through a local network (LAN)
D. SPYWARE
Spyware, as its name suggests, is designed to spy on what a user is
doing. Hiding in the background on a computer, this type of malware
will collect information without the user knowing, such as credit card
details, passwords and other sensitive information.
D. RANSOMWARE
Also known as scareware, ransomware comes with a heavy price. Able
to lockdown networks and lock out users until a ransom is paid,
ransomware has targeted some of the biggest organizations in the
world today — with expensive results.
Exercise 5
1. A software which is created to do something bad and tp perfom criminal intension:
a. Microsoft Software c. Malicious Software e. Pirate Software
b. Virus Software d. Linux Software
2. A software that can replicate by injecting or infecting its own code into other file :
a. Virus c.Worm e. Cookies
b. File d. Macro
3. A software which replicates by creating its own copy :
a. Virus c.Worm e. Cookies
b. File d. Macro
4. Example of Worm :
a. Fall.txt c.Worm.txt e. Cookies.txt
b. File.txt d. I Love You.txt
5. There are kind of malicious software but not inject files :
a. Virus c. Tracker e. Worm
b. Trojan d. Ghost

Potrebbero piacerti anche