Presented by: Craig Mayfield & Joey Police What solution works best for you? AntiVirus & Malware.

Slides:



Advertisements
Similar presentations
Viruses & Spyware A Module of the CYC Course – Computer Security
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Thank you to IT Training at Indiana University Computer Malware.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
32-1 Internet Safety/Security Issues Trojan/Virus precautions When you run an executable program from an untrusted source you’re opening yourself.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Three steps to prevent Malware infection
What they are and how to protect against them
3.6 Fundamentals of cyber security
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
Chap 10 Malicious Software.
HOW DO I KEEP MY COMPUTER SAFE?
Chap 10 Malicious Software.
Presentation transcript:

Presented by: Craig Mayfield & Joey Police What solution works best for you? AntiVirus & Malware

Understanding what you’re up against What is the difference between all of these? 1Viruses 2Malware 3Worms

Virus: What is it? Viruses Wreak Havoc On Your Files 1

Now, let’s look at malware… The term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared. Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like CIH, are designed to render your PC completely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff. You can protect yourself from viruses by making certain your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in.mp3.exe, you're dealing with a virus.

Spyware, scareware and worms oh my! What is Malware? The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.

Trojans and worms… Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers. Since spyware is primarily meant to make money at your expense, it doesn't usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you've got that many pieces of software spying on you, your PC is going to become slow. What many people don't realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of MalwareBytes and Combofix to clean it thoroughly.

Worms and Trojans… Scareware is a relatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses, and can only be cleaned if you pay for a full license. Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom—in most cases, you can't uninstall them or even use the PC. If you manage to come across a PC infected with one of these, your best bet is to Google the name of the virus and find specific instructions on how to remove it, but the steps are usually the same—run a combination of MalwareBytes, SuperAntiSpyware, and maybe ComboFix if you need to.

Which software works best? Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don't replicate themselves—they must be installed by an unwitting user. Once your PC has been infected with the trojan, it can be used for any number of evil purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses— make sure that your antivirus application is up to date, don't open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that's one of malware authors' favorite spots to hide a trojan.

Let’s see the competition! All Antivirus applications Stink! All use system resources which takes away “power” from your computer Can be cumbersome to setup and use (especially for a novice) All offer a false sense of “security” Why?

Let’s Meet Our Contestants!

Now, the dollar dollar bills y’all! Which Application Stinks the Least AVG – AVG 9 Antivirus software has been improved significant in speed and levels of security protection. It also features an antivirus module but also modules for detecting spyware, basic anti rootkit protection, and phishing protection as well as the AVG Link scanner to provide safety ratings for websites.anti rootkit AVG antivirus 9 free edition download size is around 70MB. BitDefender 10 - antivirus free edition is equipped with latest BitDefender antivirus engine. The best part of this free anti virus comes with the ICSA Labs certified scanning engines found in other BitDefender products which allowing you to enjoy basic virus protection for no cost at all. However, BitDefender Free Edition is an on-demand virus scanner, which is best used in a system recovery or forensics role. AVAST - this free anti virus comes with full load of security system protection features to protect users computer. The most impressive security features perhaps is multi threaded scanning optimization, which allows the splitting of large individual files between cores, accelerating the scanning process.free anti virus So, i hope above the best free antivirus can protect Windows system. Let me know if i missed your favorite antivirus in comments below..

Which are the WORST ONES! Which Application Stinks the Least ESET – LOW on resources! Trend Micro – VERY GOOD, but expensive. AVG – VERY GOOD, but HARD ON YOUR PC!

Which Application Stinks the Most …and the Award goes to…. Why? All use a considerable amount of computer resources. Extremely cumbersome to setup and use I often tell clients: “Instead of using these products, you’re just better off getting the virus” They are all more expensive than most

What to do when you get malware/virus/spyware ….because, by God you will no matter what you use. Combofix Malwarebytes No, it’s not Thundercats

Steps to Removal The “Quick” Way 1.Download and Run Combofix in Safe Mode 2.Download and Run Malwarebytes QuickScan 3.Check Proxy server settings in Internet Explorer/Firefox 4.Check Hosts file The Best or “Better” Way 1.Download and Run Combofix under infected user account. If the computer is on a Domain this may require booting into safe mode and running as administrator and running a second time as the infected user account. 2.Download and Run a Full scan of Malwarebytes 3.IE – check Proxy Server settings 4.Check Hosts file – if infected and cannot be unlocked you must use an unlocker utility to delete the file 5.Sfc /purgecache – to purge the windows system files cache 6.Sfc /scannow – to check windows files 7.Update Adobe products – Acrobat and Flash 8.Update Windows 9.Update IE or Firefox 10.Reset IE/Firefox settings 11.Check Antivirus settings

Website Blocking – Open DNS, ISA Update Windows Update Adobe Flash and Reader Use Script Blocker like “No Script” for Firefox Do not use Internet Explorer 6. Best to use updated IE8, Firefox, Chrome, etc. Use a 64 Bit Operation System – Windows XP 64, Vista 64, or Win 7 64