MALWARE Autumn Mattis.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Computer Viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
HACKING Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Computer Security Keeping you and your computer safe in the digital world.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site.
Mark Ryan Professor of Computer Security 25 November 2009
Three Things About Malware
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
CYBER SECURITY...
Various Types of Malware
Malware aka- malicious software By: Ken Fogel
Network security threats
CHAPTER 6 – BASIC SECURITY
Computer Virus Nick DeFabis.
Computer Security Std XI– Chapter 8.
Cyber Security By: Pratik Gandhi.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Teaching Computing to GCSE
Computer Technology Notes 5
Computer Applications Unit B
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Malware CJ
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Networking for Home and Small Businesses – Chapter 8
Ch9 E-commerce Security
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

MALWARE Autumn Mattis

Overview What is malware? Where malware comes from Purpose of malware Adware vs. Spyware How malware spreads Types of malware Prevention of malware The future Conclusion

What is malware? Malicious software Designed to disrupt or deny operation, gather information that leads to loss of privacy A variety of forms of hostile, intrusive, or annoying software or program code Code scripts, active content, and other software

Where does malware come from? Bundled with other programs Installed from websites Reinstall themselves or hide deep within Windows Makes them very difficult to clean

Purpose of malware Malware has been designed to partially control the user’s computer for reasons such as: To subject the user to advertise To spread spam To track the user’s activity To commit fraud, such as identity theft

Adware vs. Spyware Adware Spyware Software that displays sponsored advertisements in a section of your browser window or as a pop-up box An unwanted piggyback program that usually downloads with other software you want to install from the Internet.

How malware spreads Trojan Horse Viruses Worm Malicious program that is disguised as useful and legitimate software Viruses Self-replicating program that spreads by inserting copies of itself into other documents Worm Self-replicating program, doesn’t need to be part of another program

Prevention of malware Anti-virus programs Anti-adware program Firewall

The Future Continue to be vulnerabilities Users will continue to become better educated and software will continue to mature and become less vulnerable There will still be attacks but things will slowly get better

Conclusion Malware is disruptive and can gather information that leads to loss of privacy There are many forms of malware There are steps that can be taken to prevent malware from being harmful

Bibliography http://arstechnica.com/security/news/2004/11/malware.ars http://www.wisegeek.com/what-is-malware.htm http://en.wikipedia.org/wiki/Malware#Purposes http://cs.bham.ac.uk/~mdr/teaching/modules/security/lectures/Malware.pdf Technology In Action: 7th Edition