By Joshua T. I. Towers. 13.3 $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Online PC Safety and Security Workshop LBCC Library Gabriel Beeler, LBCC Librarian.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
GROUP MEMBERS ALI RAZA EHTASHAM ZAFAR SOHAIB AHMED BILAL HASSAN FAHAD ABDUL AZIZ.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses and their Cures Catherine Agnew CEDu 581 – Oconomowoc.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Spyware, Viruses and Malware What the fuss is all about.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Antivirus software.
By: Zach Beilstein. What is a computer virus? A computer virus is a software program that is designed to destroy files and/or mess up the operations of.
Malicious Software.
Computer Skills and Applications Computer Security.
Introduction to Desktop Security Protecting your computer and your data.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Understand Malware LESSON Security Fundamentals.
Safe’n’Sec complex solutions for home PCs protection.
1 3 Computing System Fundamentals 3.7 Utility Software.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Protecting Your PC. Malware Virus Trojan Spyware Worm Rootkit Browser Hijacker With or Without AV software, ALL computers that have access to the internet.
Zemana AntiLogger (2012) Zemana AntiLogger (2012) Zemana Antilogger has been specifically developed to protect PC from numerous security.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Three steps to prevent Malware infection
What they are and how to protect against them
Computer Worms & Viruses
Protect Your Computer Against Harmful Attacks!
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Presentation transcript:

By Joshua T. I. Towers

13.3 $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair and cleanse infected systems, loss of user productivity, loss of revenue due to loss or degraded performance of system, and other costs directly incurred as the result of a malware attack”

29,354,532 Microsoft desktop anti-malware products cleaned computers in the united states 29,354,532 times in 2009

og/malware-trends-statistics/

What is Malware? malware is “Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.” -

Types of Malware Viruses Worms Trojan Horses Spyware RootKits

Viruses Most well know form of malware Replicates self Attaches to files and s Spreads from machine to machine ions2.html

Worm Replicates self Spreads through network traffic Attaches to files x-mysteries-about-stuxnet-computer.html

Trojan Horses Can not replicate self Disguised as interesting or useful programs or links May drop off other forms of malware into your system ojan_horse_software.html

Spyware Can not replicate self Usually hidden inside of other more appealing programs and links Accesses personal info and transmits it back to its source

RootKits Individual or collection of programs used to gain admin access with out being detected Turns computers into zombies for the use of their creator e-computer.htm

Threats of Malware Efficiency loss Malware can remain active with out your knowledge and slow your computer or network down. Open back doors A back door is a hole in a computers security that can be used by either the creator or, other malware, or hackers.

Threats of Malware cont. Stealing information through the use of such tools as key loggers malware can steal personal information (passwords, credit card numbers, etc.) Downloading of unwanted content Some malware will download unwanted content onto you computer

Nature of Malware Evolution As time passes new different malicious acts are added to the repertoire of malware. Expansion New malware is added to the long list all the time

Defense Simple steps for basic protection against malware Make sure your fire wall is active Keep your operating systems updated Keep your anti-spyware software updated Keep your anti-virus software updated Use strong passwords

Anti-Virus Software BitDefender Antivirus Kaspersky Anit-Virus Webroot Antivirus Norton AntiVirus ESER Nod32 Antivirus AVG AntiVirus G DATA AntiVirus Avira AntiVir Vipre Antivirus Trend Micro Titanium

Criteria for choosing Scope of Protection Effectiveness Ease of installation and setup Ease of use Features Updates Help and Support

The Ridding Simple steps for the removal of some malware Create a backup Scan for malware Clean the registry Run operating system updates Remove any recently added hardware or software

If that doesn’t work “Safe Mode loads a “bare bones” version of windows and disables 90% of viruses and their protection mechanisms.” - to/how-to-remove-malware-for-free/ to/how-to-remove-malware-for-free/ And scan again

Whether those steps work or not there are COSTS COSTS

Malware protection is very important

system References