Lab 7 – Defeating MALWARE

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
CONTENTS What is Virus ? Types of computer viruses.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
For more information on Rouge, visit:
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Technical Implementation: Security Risks
Computer safety Filip Hruby.
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
How to remove virus from computer ?
Malware and Computer Maintenance
Instructor Materials Chapter 7 Network Security
Viruses, worms and trojans.
Backdoor Attacks.
Computer Security Std XI– Chapter 8.
SEMINAR ON PC SECURITY FROM VIRUSES
Cyber Security By: Pratik Gandhi.
How to Fix Trojan.Poweliks Using Norton Antivirus?
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
f
Computer Technology Notes 5
How to allow USB Flash Drive Scan in Avast Antivirus.
Virus And Malware Causes And Troubleshoot By I FIX PC
Computer Viruses.
Internet Safety for Everyone
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Viruses and Virus Protection
Security.
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Malicious Software Network security Master:Mr jangjou
Unit 4 IT Security Kerris Davies.
Chap 10 Malicious Software.
Internet Safety for Everyone
Technology Mrs. Huddleston
Malicious Program and Protection
Internet Safety for Everyone
Internet Safety for Everyone
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Lab 7 – Defeating MALWARE Network Security Lab

What is Malware MALicious software A software that can Alter : Computer settings Behavior Files Services Ports Speed

Sources INTERNET!!! Insufficient security on computer Honeypot websites Free unverified downloads Torrents Pop-ups! Emails Data media (USB, CD, DVD, etc.,)

Symptoms Unusual behavior of computer Slow Speed Pop ups! Replication of files Unnecessary files Corrupted Executables Denial of access to applications

Types of Malware Virus: Cannot sustain on its own, has to attach to a host. Targeted behavior, feeds on alike files, if a word file is infected, it may replicate to other word files or will corrupt the Word Application itself. Trojan: Disguised Killers, look like genuine software, once installed open backdoors. (Free memory cleaners, boosters and others). The backdoor is used by other viruses and worms to enter the computer. Worms: Self Sustaining, can replicate itself to other file types, makes copies of files, decreases the speed and performance of the computer.

Viruses Viruses need time to infect. Has potential to infect programs only after executing Every time they are executed, they will target applications and corrupt them. Disguise as resident programs of the computer Has the ability to corrupt the files, delete them or change the size of memory.

Trojans Appear as genuine executable software with a purpose Mostly free Once installed create backdoors through with viruses and worms can enter. Alter the behavior of computer and applications (moving icons, encrypt files, corrupting the files)

Counter Measures Try to ensure that you are browsing trusted websites (https://) Never click any enticing pop-ups (Lottery, win an Iphone) Doubtful, unknown and malicious emails (‘you have won $1.67 million’) Ensure that removable media (USB, CD, DVD) is not infected. Install genuine (paid and licensed) antimalware, antivirus, IDS or IPS. Learn how to configure the built-in windows firewall Schedule regular scan when you know you are not using the computer.

Lab Exercise Refer to Exercise file