(a) How malware infects the system; (b) Elements of the system violated; (c) Threats generated; (d) Signs of infection.
Upload it to e-learning and present it to other teams during the lab and next lecture.
To familiarize with different categories of malware, their characteristics, and evaluate infection and protection methods.
All names of the team members who participated.
1. Functional algorithm of infection 2. Impactful examples from 2023-2024 3. Recommendations for protection 4. Suggestions for better malware classification.
1. Virus Malware 2. Worm Malware 3. Trojan Malware 4. Adware Malware 5. Spyware Malware 6. Rootkit Malware 7. Zombie Malware 8. Botnet Malware 9. Ransomware Malware
At least three impactful examples from the selected malware group that occurred during 2023-2024.