Skip to main content

Malware ( Malicious Software)

   is a program that is made to cause damage or can infiltrate people's computers. Malware comes from the Mali word which means "malicious intent" and ware which means "software". certainly those who can make this malware are people who already understand in terms of security and software. this program enters via e-mail, internet downloads and programs that have been infected with the virus. this program can not only cause system damage, but can also retrieve data or information that is affected by the malware. This malware arises from downloading software from an illegal place where the malware program has been downloaded. malware also includes several things, namely: a virus is a device that can spread on the system and can also interfere with the performance of the system that it has entered, trojan house is a device that can enter to damage the system and can also steal data or information from system users he was broken. , as well as other dangerous things that are very unwanted by PC users. not only that the website can also be exposed to malware because the user is downloading illegally which can also cause leaking of data from the website and also the server of the website can also be slowed down due to suspicious things happening inside. this can be prevented from where users do not download from illegal websites but from official websites that have been made so that user funds are safe from any problems.


Kevin P.M / 106218037 / IR 1






Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...