Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers different types of malware, including viruses, worms, Trojan Horses, and rootkits. It discusses how viruses replicate to infect other content or machines, the defenses against viruses, the characteristics of worms as self-replicating programs, and the infamous examples of malware like I Love You and WannaCry. Additionally, it explores the concept of Trojan Horses, which deceive users by appearing as desirable software while performing malicious activities, and rootkits that hide within a system to allow unauthorized access. The lecture also delves into real-world examples such as the Stuxnet worm, which targeted Iran's nuclear power plants.