Presentation is loading. Please wait.

Presentation is loading. Please wait.

Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.

Similar presentations


Presentation on theme: "Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern."— Presentation transcript:

1 Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern

2 Malicious Attacks 1. Introduction 2. Background and Evolution 3. Preventative Steps 4. Challenges

3 Introduction Text Virus A program that copies itself into other programs that are executed, in order to wreak havoc. Trojan Horse A program that appears to be harmless, but which causes damage when run. Phishing The use of various forms of social engineering to trick computer users into giving away personal information. Malicious attacks can be defined as any attempt to undermine the privacy or security of a computer system, usually taking one of the following forms: What are malicious attacks?

4 Introduction Text Identity Theft Hackers often want to steal personal information, such as social security numbers or credit card numbers from a person or group of people. Denial-of-Service Attack Some viruses infect many computers, which combine to overload a secondary target, such as a government- or company-owned network. Just for Fun Some hackers simply enjoy destroying other people’s computers. The hackers, or people who engage in cyber attacks often have one or more of the following goals: What are the goals of malicious attacks?

5 Background and Evolution 1980s 1990s – early 2000s 2000s - Present Popularization of the personal computer. Malicious software first takes the form of trojan horses posted to bulletin boards (early messaging system) and simple viruses on floppy disks. The Internet becomes popular. Viruses become common as e-mail attachments. Examples include the Melissa virus in 1999 and the ILOVEYOU virus in 2000. Phishing and other social engineering attacks are on the rise. Viruses occur on a large scale in computers that are not protected.

6 Preventative Steps Text For Viruses, Trojan Horses, and Worms Install and maintain up-to-date antivirus software. Install all security updates. Never download files from the Internet unless it is from a trusted source. If you think your computer has a virus, get help right away. For Phishing Be careful never to send personal information over e- mail or click hyperlinks within e-mail text. If you ever doubt the authenticity of a message, contact the sender or legitimate organization before taking further action. The following measures can be taken to help prevent a malicious attack: What can be done to prevent malicious attacks?

7 Challenges Text Effective antivirus software is often too expensive for some people to afford. The source a virus is often difficult or impossible to pinpoint. File sharing via the Internet or other means such as USB drives is increasing and will continue to increase. Many people simply have not been taught how to recognize phishing attempts and scams. Hackers are smart and are often one step ahead. Various factors make it difficult for people to stay protected from malicious computer attacks: What inhibits the prevention of attacks?

8 Our Opinion Text Increased awareness of the dangers of the Internet and file-sharing Development by trusted organizations of freely available protective software Education about phishing and how to identify likely phishing attempts Government involvement in countering large-scale viruses and cyber attacks We think the following would help to decrease the success of malicious attacks: How can we help?


Download ppt "Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern."

Similar presentations


Ads by Google