Malware, Anti-malware & Rats

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Computer Viruses Computer viruses are a type of Malware that can infect other computer operating systems. They can do harmful things to the host it infected.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Protecting Your Computer & Your Information
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
IT security By Tilly Gerlack.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
CONTENTS What is Virus ? Types of computer viruses.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Computer safety Filip Hruby.
KS3 COMPUTING E-Safety Lesson 1 Malware KS3 Computing E-Safety.
Chapter 40 Internet Security.
Chapter Objectives In this chapter, you will learn:
Viruses & Destructive Programs
3.6 Fundamentals of cyber security
CYBER SECURITY...
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Network security threats
COMPUTER VIRUSES Computer Technology.
computer virus infection & symptoms
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Malicious Software There are various sources via whom a malicious software can enter a system most common of which is through internet sites not only this.
Computer Technology Notes 5
NET 311 Information Security
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
How to allow USB Flash Drive Scan in Avast Antivirus.
Risk of the Internet At Home
Chap 10 Malicious Software.
Get Rid of a Trojan Horse? Even with a competent anti-virus installed, PCs could still be susceptible to malicious programs such.
Viruses and Virus Protection
Stay Safe While Using The Internet
Faculty of Science IT Department By Raz Dara MA.
Computer Viruses Standard A-4 (Safety Unit)
Chap 10 Malicious Software.
Malicious Program and Protection
Introduction-Cyber Safety
Presentation transcript:

Malware, Anti-malware & Rats Richard Gariboldi & Akshay Awasthi

Malware Definition

Types of Malware •Malware - An umbrella term. Short for malicious software, is any software used to disrupt computer operations. •Virus - A piece of code that is capable of copying itself and typically is used for corrupting the system or destroying data. •Worm - A standalone malware computer program that replicates itself in order to spread to other computers. •Trojan - Any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it. 

Global Malware Activity

https://cybermap.kaspersky.com/ Live malware Map https://cybermap.kaspersky.com/

https://youtu.be/kieAxktbyyw Types Of MAlware https://youtu.be/kieAxktbyyw

Total Malware 1984-2017

Early Malware 1970’s 1980’s Creeper Virus (1971) Wabbit Virus (1974) Creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage on, but to illustrate a mobile application. Wabbit Virus (1974) Wabbit was a self-replicating program, that made multiple copies of itself on a computer until it bogs down the system to such an extend that system performance is reduced to nil and the computer eventually crashes. This virus was named wabbit because of the speed at which it was able to replicate. ANIMAL (1974/5) ANIMAL asked a number of questions of the user in an attempt to guess  the type of animal that the user was thinking of, while the related  program PERVADE would create a copy of itself and ANIMAL in every  directory to which the current user had access.  1980’s Jürgen Kraus wrote his master thesis "Selbstreproduktion bei Programmen" (self-reproduction of programs) Stoned (1987) A computer infected with the original version had a one in eight probability[5][6]that the screen would declare: "Your PC is now Stoned!", a phrase found in infected boot sectors of infected floppy disks and master boot records of infected hard disks, along with the phrase "Legalise Marijuana". Later variants produced a range of other messages. The Morris Worm (1988) first to gain significant mainstream media attention. It also resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act.[1]

Anti-malware Antimalware (anti-malware) is a type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.

Video links https://www.youtube.com/watch?v=bTU1jbVXlmM

How It Works Heuristic analysis - a method employed to detect previously unknown computer malware, as well as new variants of virus by checking the behavior of the malware rather than just the signatures. Checking Hashes – a method employed to detect known computer viruses by checking the MD5/SHA1 value of each file against known malware hashes

VirusTotal https://www.virustotal.com/

History G Data Software AG (1987) McAfee (1987)

RATS Definition

How they work https://www.youtube.com/watch?v=vY8iHRfCgYQ

What they are used for Remote Access Trojans (RATs) provide cybercriminals with unlimited access to infected endpoints. Using the victim’s access privileges, they can access and steal sensitive business and personal data including intellectual property, personally identifiable information (PII and patient health information (PHI). While automated cyber-attacks (e.g. Man-in-the-Browser) allow cybercriminals to attack browser-based access to sensitive applications, RATs are used to steal information through manual operation of the endpoint on behalf of the victim. Most Advanced Persistent Threat (APT) attacks take advantage of RAT technology for reconnaissance, bypassing strong authentication, spreading the infection, and accessing sensitive applications to exfiltrate data. RATs are commercially available (e.g. Poison Ivy, Dark Comet) and can be maliciously installed on endpoints using drive-by-download and spear-phishing tactics. 

How to protect yourself Antivirus Antimalware Automatic Updates for antimalware as well as System Updates Don’t click the link! If it sounds too good to be true it probably is Be Smart!

Extra Links to show how easy this really is https://www.youtube.com/watch?v=t5Zkm5HAHu0 https://www.youtube.com/watch?v=o8AW8EB76wg https://www.youtube.com/watch?v=xjFw6mUfbHI