Presentation is loading. Please wait.

Presentation is loading. Please wait.

Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.

Similar presentations


Presentation on theme: "Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s."— Presentation transcript:

1 Malicious Attacks

2 Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s permission

3 Background Started out as “pranks,” more annoying than harmful, created by programmers to see range until around 1999 2001 viruses started to be used as forms as vandalism: destroying files, corrupting system 2003 Broadband Internet  profit promotion via email spam, spyware advertising

4 Viruses first spread via floppy disks  activated when program runs or disk boots 1990 Microsoft Windows platform  rising of “macro viruses”—damage documents instead of applications

5 Recovery Methods System Restore – restores the registry and critical system files to a previous checkpoint Reinstall the operation system – 1. reformat the computer’s hard drive 2. install OS from its original media These methods are simpler and faster than most anti-virus software However, the computer’s user preferences must be restored every time; while backing up software, one may put another computer in danger Anti-virus software prevents, detects, and removes viruses from computers (sometimes downgrades a computer’s performance

6 Phishing

7 Phishing: attempting to get private information like usernames and passwords by pretending to be a trustworthy source.

8 Usually takes place through email and instant messaging – Links that prompt one to put info into what looks like a legitimate site. First known case of Phishing was done in 1996 Started with cases in AOL, then moved to financial institutions

9 Social Networking Sites are now the target of Phishing Most methods of phishing make a link appear to belong to a fake organization. – Misspelled URLs or the use of sub domains are common tricks – Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails

10 WHAT IS A COMPUTER VIRUS? “A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF”

11 TYPES OF VIRUSES BOOT PARTITION INFECTING VIRUS EXECUTABLE FILE INFECTING VIRUS MULTI-PART VIRUS DIRECTORY INFECTING VIRUS

12 WHAT CAN THEY DO? FORMAT DISK COPY, RENAME, AND DELETE FILES COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION MODIFY FILE DATES AND EXTENTIONS CALL OTHER COMPUTERS TO UPLOAD AND DOWNLOAD FILES

13 HOW DO THEY DO IT? APPENDING INSERTION INTERCEPTION REDIRECTION REPLACEMENT

14 Prevention Install software such as; firewalls, a spyware scanner, a Trojan horse program, and antivirus programs Run up to date scans Don’t download materials from questionable sources Remove unused communication ports Understand how an attack could happen so you see one coming

15 Conclusion There are six types of malicious attacks: trojan horses, worms, viruses, hoaxes, spam, and phishing Good computer practices can help a user minimize the threat of a malicious attack


Download ppt "Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s."

Similar presentations


Ads by Google