King Mongkut's University of Technology Thonburi (KMUTT)

In the digital age, where online living has become the norm, malware has emerged as a threat that everyone must be aware of and vigilant against.


Malware is short for Malicious Software, which refers to software developed to harm computer systems without authorization. Malware can cause damage to data, steal personal information, or take control of devices without the user's knowledge. The impact of malware can be severe, potentially leading to the loss of important data or allowing malicious individuals easy access to personal information.

Types of Malware

Virus: A type of software that attaches itself to programs or files and spreads when the program or file is executed. Viruses often cause system damage or delete data.


Worm: This type of software can self-replicate and spread to other computers or devices without user action. Unlike viruses, which require a file to be opened, worms operate and spread automatically through networks.


Trojans: are software or files that appear safe or legitimate, but when installed or activated by the user, they create a pathway for attackers to take control of or access the victim's computer data.


Spyware: This software collects personal information from users without their consent, such as tracking internet usage or stealing critical data like passwords.


Ransomware: This software encrypts files on a device and demands a ransom to unlock the data. It often threatens to destroy data if the payment is not made, with no guarantee that the files will be unlocked after payment.


Adware: This software displays unwanted advertisements to users, often bundled with free programs or installed without the user's knowledge.


Rootkit: A type of software used to hide the operation of malware or harmful processes on a system, making it difficult for users to detect the presence of malware.


Keylogger: This software records keystrokes made by users to steal sensitive information, such as passwords or financial data.


Methods for Preventing Malware to Reduce the Risk of Attacks and Maintain Computer System Security


1. Install Anti-Malware Software: This software attaches itself to programs or files and spreads when those programs or files are executed. Viruses often cause system damage or data loss.


2. Regularly Update Operating Systems and Software: Software developers release updates to address security vulnerabilities. Failing to update can leave your system exposed to attacks through these vulnerabilities.


3. Avoid Downloading Software from Untrustworthy Sources: Do not download programs or files from unsafe sources, as malware is often hidden in files or programs distributed through insecure websites.


4. Exercise Caution with Emails and Links: Avoid clicking on links or opening attachments from unknown or suspicious emails, as they may contain malware or phishing attempts designed to steal information or compromise your device.


5. Enable a Firewall: Activating a firewall helps prevent unauthorized access to your system from external sources. It filters potentially harmful data traffic.


6. Use Strong Passwords: Do not reuse passwords across multiple accounts, and change your passwords regularly. Use complex passwords that are difficult to guess, and avoid using the same password for multiple accounts. Regularly updating your passwords helps prevent hacking.


7. Back Up Data Regularly: Consistently back up important data to ensure that you can recover it in the event your device is attacked by malware, such as ransomware.


8. Avoid Connecting to Unsecure Public Wi-Fi: Connecting to public Wi-Fi networks that lack encryption or adequate security can expose you to data interception risks.


9. Be Cautious of Free Software or Bundled Offers (Freeware/Adware): Some free programs may come bundled with malware, such as adware. Verify the credibility of such programs before installation.


10. Limit User Permissions: Grant users only the necessary permissions, especially avoiding granting administrative rights to general users to reduce the risk of malware gaining control over the system.





TOP