Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lab 7 – Defeating MALWARE

Similar presentations


Presentation on theme: "Lab 7 – Defeating MALWARE"— Presentation transcript:

1 Lab 7 – Defeating MALWARE
Network Security Lab

2 What is Malware MALicious software A software that can Alter :
Computer settings Behavior Files Services Ports Speed

3 Sources INTERNET!!! Insufficient security on computer
Honeypot websites Free unverified downloads Torrents Pop-ups! s Data media (USB, CD, DVD, etc.,)

4 Symptoms Unusual behavior of computer Slow Speed Pop ups!
Replication of files Unnecessary files Corrupted Executables Denial of access to applications

5 Types of Malware Virus: Cannot sustain on its own, has to attach to a host. Targeted behavior, feeds on alike files, if a word file is infected, it may replicate to other word files or will corrupt the Word Application itself. Trojan: Disguised Killers, look like genuine software, once installed open backdoors. (Free memory cleaners, boosters and others). The backdoor is used by other viruses and worms to enter the computer. Worms: Self Sustaining, can replicate itself to other file types, makes copies of files, decreases the speed and performance of the computer.

6 Viruses Viruses need time to infect.
Has potential to infect programs only after executing Every time they are executed, they will target applications and corrupt them. Disguise as resident programs of the computer Has the ability to corrupt the files, delete them or change the size of memory.

7 Trojans Appear as genuine executable software with a purpose
Mostly free Once installed create backdoors through with viruses and worms can enter. Alter the behavior of computer and applications (moving icons, encrypt files, corrupting the files)

8 Counter Measures Try to ensure that you are browsing trusted websites ( Never click any enticing pop-ups (Lottery, win an Iphone) Doubtful, unknown and malicious s (‘you have won $1.67 million’) Ensure that removable media (USB, CD, DVD) is not infected. Install genuine (paid and licensed) antimalware, antivirus, IDS or IPS. Learn how to configure the built-in windows firewall Schedule regular scan when you know you are not using the computer.

9 Lab Exercise Refer to Exercise file


Download ppt "Lab 7 – Defeating MALWARE"

Similar presentations


Ads by Google