Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Format Scandisk Defragmentation Antivirus Compression Software
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
1 Computer Security: Protect your PC and Protect Yourself.
Security Advice Georgie Pepper Campsmount Acadamy.
What is it, how does it work, and why is it important?
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Video Following is a video of what can happen if you don’t update your security settings! security.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Online Annoyances Spam – electronic junk mail
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
1 Kids on the Web. Child’s play? September, 2008.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Staying Safe Online Keep your Information Secure.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
PC Maintenance How to keep your computer healthy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer Skills and Applications Computer Security.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Computer Security Keeping you and your computer safe in the digital world.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Managing Windows Security
Three steps to prevent Malware infection
Protect Your Computer Against Harmful Attacks!
Presentation transcript:

Viruses and Spyware

What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of itself. It is a parasite program, needing another program to survive. For our purposes, that program is Microsoft Windows

How many viruses are out there? Many.

Yale’s Network Our network is particularly vulnerable

Yale’s Network We are not a closed corporate network We have a federated IT structure We have STUDENTS

How is the Library protected? Norton Antivirus updated daily Microsoft Security Patches

Norton Antivirus Constantly scans system files for viruses. Does this in “real time” New virus definitions are delivered when needed.

Norton Antivirus Norton is REACTIVE not PROACTIVE This means that only known viruses can be caught There have been several times where something originates here at Yale or at another university before Norton finds it. Norton cannot a stop virus in this case

Norton Antivirus Norton also does not necessarily remove the virus from the machine. It will block access to it, but if a machine is open to the exploit, there still is the chance it will be successfully executed

How can I tell if I have a problem with Norton? Normal Norton Shield Red cross through Shield Yellow exclamation point

Norton Antivirus What do they mean? Realtime protection not active Norton Antivirus services not loaded Both are not good

Norton Antivirus other problems No shield at all Not updating every day Virus Definitions are not recent (several weeks old) Hands on

When Norton catches a virus A window pops up. What this window says is very important

When Norton catches a virus This is good

When Norton catches a virus This is bad

When Norton catches a virus So long as your computer says “quarantine succeeded”, the virus has been caught. If it says anything else, contact W&WS immediately.

When Norton catches a virus Norton does not delete it but“quarantines” it. Goes back to a time when viruses infected legitimate documents Generally no longer the case. Viruses are no longer worth keeping. If Norton catches it, they already know about it

Clearing the Quarantine As a result, as viruses are caught on your computer they fill up the quarantine. This leads to annoying messages asking you to try and “fix” the files This is useless. You cannot fix a modern virus. We should just clear out the quarantine. This is how:

Clearing the Quarantine

Clearing the quarantine

Virus transmission Most common methods: Executed by someone clicking on an attachment. Automatically through a network via security holes/flaws

Virus transmission How do we stop them? well…

Messages viruses are a fact of life, and there is little that you can do at the computer end to stop them. (Do not filter at the computer!) Be suspicious of attachments from unknown sources.

Messages Do not set your program to "auto- run" attachments. We have ITS renaming files so that people have to go through several steps to open attachments. This reduces the likelihood of “accidentally “ clicking on an attachment.

Virus transmission Verify that attachments have been sent by the author of the . Newer viruses can send messages that APPEAR to be from people you know.

Virus transmission Speaking of which….

messages headers can be forged. This means that the person in the “from” address did NOT send the virus. The virus simply picks and chooses two random addresses from your computer and sends it

messages Just because a virus arrives with someone’s name attached to it. This does not mean that they have a virus.

Forged header example

Virus transmission Viruses exploit security flaws within Windows Almost all of these flaws are public knowledge with an available fix Viruses exploit security flaws within Windows

Virus transmission Virus infections are preventable via patching Case in point:

Virus transmission The Sasser worm exploits a hole in Windows that was patched on April 13, The Sasser worm started making it’s rounds on April 30th. People had 17 days to patch their machines.

Virus transmission As a result of patching all of our machines, the Library did not have a single computer found with the Sasser Worm.

Software Update Services This is a result of Software Update Services. This is an automated, centrally managed service that allows automatic application of patches on Yale Library workstations

Software Update Services What you need to know

Software Update Services This globe indicates that the updates have been automatically sent to your computer

Software Update Services Because Library users are administrators on their machines, users can override this.

Software Update Services Tell your users to click YES when this window appears

Software Update Services Tasks for expert users Make sure computers are turned on frequently. If people are away, please make sure their workstations are turned on regularly. Login is not necessary

Spyware: What is it? Spyware is deceptive software, which promises you a feature or utility in return for secretly tracking your web surfing habits for advertising purposes.

Spyware Why Spyware is bad: It is a possible security risk (redirects) It is network intensive Violates your privacy Violates Yale’s ‘privacy’ (can monitor ALL your network traffic) It is annoying

How do I tell if I have spyware? 5 Signs: Extra system tray icons Extra toolbars in Internet Explorer Redirected home page Popups ALL the time S L O W Computer

How do I remove spyware The best way: Spyware removal tools We use Spybot Search and Destroy Sometimes even the uninstallers are deceptive