We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAlexandrina Spencer
Modified over 8 years ago
Chapter Nine Maintaining a Computer Part III: Malware
© 2006-2011 Wiley, Inc. All Rights Reserved. Strata Objectives Covered 4.1 (3.1 FC0-U11 U.K.) Recognize the basic security risks and procedures to prevent them –Identify risks –Identify prevention methods 4.2 (3.2 FC0-U11 U.K.) Recognize security breaches and ways to resolve them –Recognize the proper diagnostic procedures when infected with a virus –Recognize the proper procedures to maintain a secure environment 2
© 2006-2011 Wiley, Inc. All Rights Reserved. Types of Malware Attacks Exploits Viruses Worms Trojan Horses Adware Spyware Rootkits Backdoors Botnets 3
© 2006-2011 Wiley, Inc. All Rights Reserved. OS and Application Exploits Vulnerability: a flaw in programming that creates the potential for misuse Exploit: a criminal activity that uses a vulnerability to attack a system All Oses have weaknesses that can be exploited Download and install all available updates and patches to minimize the risk 4
© 2006-2011 Wiley, Inc. All Rights Reserved. Viruses A computer code that inserts itself into an executable file When file executes, virus’s code executes too Viruses can have harmless or harmful results Most have a self-replicating component that causes them to spread between executable files via RAM 5
© 2006-2011 Wiley, Inc. All Rights Reserved. Trojan Horses Rogue applications that may appear to do something useful but also secretly do something harmful, such as install a keylogger Keylogger records all keystrokes and sends the information to a file or a remote location Trojan horses don’t replicate themselves; they commonly spread via worms 6
© 2006-2011 Wiley, Inc. All Rights Reserved. Worms Self-transporting applications that carry an active payload, such as virus or Trojan horse Active or passive –Active: self-transport without human intervention –Passive: rely on user’s innocence to transport themselves, via email or social engineering 7
© 2006-2011 Wiley, Inc. All Rights Reserved. Adware Application that displays un-asked- for ads; most often comes from an add-on toolbar for the web browser Adware companies make money when people click the ads they display Not all adware is illegal, but it is annoying Adware programs may be difficult to remove, much like a virus infection 8
© 2006-2011 Wiley, Inc. All Rights Reserved. Spyware Software that secretly records your computer usage Spyware makers get revenue from collecting consumer marketing data or stealing passwords for criminal activity Most spyware is illegal, and can be difficult to remove Not self-replicating; relies on social engineering to spread 9
© 2006-2011 Wiley, Inc. All Rights Reserved. Anti-Malware Software Antivirus software –Defends against viruses, worms, and Trojan horses Anti-spyware software –Defends against adware and spyware Anti-spam software –Reduces the amount of junk email you receive Suites combine multiple security functions 10
© 2006-2011 Wiley, Inc. All Rights Reserved. Antivirus Software Identifies infections by scanning all files on your hard disk Looks for virus signatures in executable code Maintains a database of virus definitions for which to scan executable files 11
© 2006-2011 Wiley, Inc. All Rights Reserved. Antivirus Software May also create MD5 for each application –A math calculation that results in a unique value for the file –If the file’s MD5 doesn’t match its original MD5 value, it may have been altered by a virus Windows Security Essentials is a free antivirus program available from Microsoft 12
© 2006-2011 Wiley, Inc. All Rights Reserved. Antivirus Software Usually resident, meaning continuously running in the background Each file is checked as it is opened, and each email as it is received Quarantining a file places it in an off-limits area where it can’t be run 13
© 2006-2011 Wiley, Inc. All Rights Reserved. Anti-Spyware Software Find and remove adware and spyware Find and remove tracking cookies and other potential privacy threats Many antivirus programs also have anti-spyware capabilities Windows Defender comes free with Windows 14
© 2006-2011 Wiley, Inc. All Rights Reserved. Anti-spam Software Spam is unwanted junk mail Most spam tries to sell products or services, or to use social engineering to commit crimes Mail applications often include basic anti-spam capabilities Third-party anti-spam programs are also available 15
© 2006-2011 Wiley, Inc. All Rights Reserved. Diagnosing and Fixing Malware Infections Symptoms of infection: –Antivirus software disabled and can’t be re-enabled –System runs sluggishly –CPU and memory usage high –Warning or message boxes refuse to go away –Friends receive strange emails from you that you didn’t send –Bombarded with pop-up ads when using web browser 16
© 2006-2011 Wiley, Inc. All Rights Reserved. Virus Removal Run a full antivirus check If your antivirus software won’t run, use an online checker such as http://housecall.trendmicro.com http://housecall.trendmicro.com Follow virus checker advice 17
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
What are Trojan horses? A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Threats To A Computer Network
Windows Security Tech Talk 9/25/07. What is a virus? A computer program designed to self replicate without permission from the end user The program.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Viruses & Destructive Programs
Contents Viruses Viruses Computer Worms Computer Worms Trojans Trojans Spyware Spyware Adware Adware Spam Spam Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Malware Spyware & Viruses Overview What does it look like? What is it? How can you prevent it? What can you do about it when you get it?
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
© 2024 SlidePlayer.com Inc. All rights reserved.