Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Malware Ge Zhang Karlstad Univeristy. Focus What malware are Types of malware How do they propagate How do they hide How to detect them.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Windows Malware: Detection And Removal TechBytes Tim Ramsey.
Malware Fundamentals POLITEHNICA University of Bucharest 14 th of January 2015 Ionuţ – Daniel BARBU.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
Viruses.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Spyware, Viruses and Malware What the fuss is all about.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
 Awesome Stuff Cyber Security Tyler Hoover Auburn University.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
3.6 Fundamentals of cyber security
Various Types of Malware
Computer Applications Unit B
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Risk of the Internet At Home
Malware CJ
King Saud University- College OF Applied Studies
How to keep the bad guys out and your data safe
King Saud University- College OF Applied Studies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 Final Jeopardy Final Jeopardy Rules may randomly vary

Virus - $100 This virus was considered to be the first socially engineered computer virus. What is the name of the virus? This virus was considered to be the first socially engineered computer virus. What is the name of the virus? Love Letter Virus Love Letter Virus

Virus - $200 Before there was the World Wide Web, the first computer viruses spread via this. Before there was the World Wide Web, the first computer viruses spread via this. Floppy disks Floppy disks

Virus - $300 One of the first viruses to target children and it would delete all files in Windows and Windows/System once activated. The victim would have to reinstall MS Windows as a result. One of the first viruses to target children and it would delete all files in Windows and Windows/System once activated. The victim would have to reinstall MS Windows as a result. Pikachu Virus Pikachu Virus

Virus - $400 What do you call a virus that can change their appearance with each new infection? What affect does it have on countermeasures? What do you call a virus that can change their appearance with each new infection? What affect does it have on countermeasures? Polymorphic Polymorphic It makes it more difficult for anti-virus software to detect it since the signature is constantly changing It makes it more difficult for anti-virus software to detect it since the signature is constantly changing

Virus - $500 This virus drew attention for knocking out satellite communications for the French news agency France-Presse and caused problems with Delta Air Lines systems, causing some flight cancellations. This virus drew attention for knocking out satellite communications for the French news agency France-Presse and caused problems with Delta Air Lines systems, causing some flight cancellations. Sasser Sasser

Worm - $100 What distinguishes worms from viruses? What distinguishes worms from viruses? It does not need to attach itself to an existing program. It does not need to attach itself to an existing program.

Worm - $200 This worm was created to see how big the Internet was. The poor college student didn’t mean to cause problems. What worm is this? This worm was created to see how big the Internet was. The poor college student didn’t mean to cause problems. What worm is this? Morris Worm Morris Worm

Worm - $300 Most massive DOS attack to date, believed to have been commissioned by spammers. Most massive DOS attack to date, believed to have been commissioned by spammers. Mydoom Mydoom

Worm - $400 Conficker Conficker This worm could download payloads remotely to update itself. This worm could download payloads remotely to update itself.

Worm - $500 This family of worms tried to download and install patches from Microsoft’s website to fix vulnerabilities in the host system by exploiting those vulnerabilities. (Hint: They had good intentions) This family of worms tried to download and install patches from Microsoft’s website to fix vulnerabilities in the host system by exploiting those vulnerabilities. (Hint: They had good intentions) The Welchia Worm The Welchia Worm

Spyware - $100 This is a subcategory of spyware that describe the software companies use to track your browsing activities. This is a subcategory of spyware that describe the software companies use to track your browsing activities. Commercial spyware or Adware Commercial spyware or Adware

Spyware - $200 What is the name of a software that monitors keystrokes? What is the name of a software that monitors keystrokes? Keyloggers Keyloggers

Spyware - $300 In 2004, it was estimated what percentage of all computers had some form of spyware? In 2004, it was estimated what percentage of all computers had some form of spyware? 80% 80%

Spyware - $400 When was the first recorded use of the word spyware? Where was it said? When was the first recorded use of the word spyware? Where was it said? October 16, 1995 October 16, 1995 Usenet Usenet

Spyware - $500 What is the name of the first anti-spyware software. What is the name of the first anti-spyware software. OptOut OptOut

Trojan Horses - $100 In 2009, it was discovered this Trojan horse had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Cisco, Amazon, and Business Week magazine. In 2009, it was discovered this Trojan horse had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Cisco, Amazon, and Business Week magazine. Zeus Zeus

Trojan Horses - $200 This Trojan horse has been used to gain unauthorized access to computers. It can also read keystrokes that occurred since the last boot – a capability that can be used to steal passwords and credit card numbers. This Trojan horse has been used to gain unauthorized access to computers. It can also read keystrokes that occurred since the last boot – a capability that can be used to steal passwords and credit card numbers. Sub7 or Sub7Server Sub7 or Sub7Server

Trojan Horses - $300 This Trojan horse was used in a cyberattack on the U.S. It also led to the creation of this. This Trojan horse was used in a cyberattack on the U.S. It also led to the creation of this. Agent.btz Agent.btz U.S. Cyber Command U.S. Cyber Command

Trojan Horses - $400 ZeroAccess (aka Sirefef) is used to download other malware on an infected machine from a botnet mostly involved in Bitcoin mining and click fraud, while remaining hidden on a system using these techniques. ZeroAccess (aka Sirefef) is used to download other malware on an infected machine from a botnet mostly involved in Bitcoin mining and click fraud, while remaining hidden on a system using these techniques. Rootkit Rootkit

Trojan Horses - $500 According to a survey done by BitDefender from January to June 2009, “Trojan-type malware is on the rise”. In the survey, Trojan horses accounted for this percentage of global malware detected in the world. According to a survey done by BitDefender from January to June 2009, “Trojan-type malware is on the rise”. In the survey, Trojan horses accounted for this percentage of global malware detected in the world. 83% 83%

Ransomware/Rootkits - $100 NTRootkit What is the first documented rootkit, which targeted Windows NT.

Ran/Root - $200 How do rootkits hide other proccesses? How do rootkits hide other proccesses? By modifying the OS. By modifying the OS.

Ran/Root - $300 Sony BMG used these to install a rootkit which would limit how these could be used. CDs CDs

Ran/Root - $400 What is the name of the first used Ransomware? What is the name of the first used Ransomware? TROJ_CRYZIP or Trojan Cry Zip

Ransomware/Rootkits - $500 Where and when was the first recorded uses of Ransomware? Where and when was the first recorded uses of Ransomware? Russia, 2006 Russia, 2006

Final Jeopardy Who created the first Rootkit? Who created the first Rootkit? Greg Hoglund