Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Viruses & Destructive Programs
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Protecting Your Computer & Your Information
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
INTERNET: The Good, The Bad and The Ugly
ANITVIRUSES TECHNIQUES
Safety and Security issues of using ICT Alys brooks.
CONTENTS What is Virus ? Types of computer viruses.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Malicious Attacks

Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s permission

Background Started out as “pranks,” more annoying than harmful, created by programmers to see range until around viruses started to be used as forms as vandalism: destroying files, corrupting system 2003 Broadband Internet  profit promotion via spam, spyware advertising

Viruses first spread via floppy disks  activated when program runs or disk boots 1990 Microsoft Windows platform  rising of “macro viruses”—damage documents instead of applications

Recovery Methods System Restore – restores the registry and critical system files to a previous checkpoint Reinstall the operation system – 1. reformat the computer’s hard drive 2. install OS from its original media These methods are simpler and faster than most anti-virus software However, the computer’s user preferences must be restored every time; while backing up software, one may put another computer in danger Anti-virus software prevents, detects, and removes viruses from computers (sometimes downgrades a computer’s performance

Phishing

Phishing: attempting to get private information like usernames and passwords by pretending to be a trustworthy source.

Usually takes place through and instant messaging – Links that prompt one to put info into what looks like a legitimate site. First known case of Phishing was done in 1996 Started with cases in AOL, then moved to financial institutions

Social Networking Sites are now the target of Phishing Most methods of phishing make a link appear to belong to a fake organization. – Misspelled URLs or the use of sub domains are common tricks – Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing s

WHAT IS A COMPUTER VIRUS? “A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF”

TYPES OF VIRUSES BOOT PARTITION INFECTING VIRUS EXECUTABLE FILE INFECTING VIRUS MULTI-PART VIRUS DIRECTORY INFECTING VIRUS

WHAT CAN THEY DO? FORMAT DISK COPY, RENAME, AND DELETE FILES COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION MODIFY FILE DATES AND EXTENTIONS CALL OTHER COMPUTERS TO UPLOAD AND DOWNLOAD FILES

HOW DO THEY DO IT? APPENDING INSERTION INTERCEPTION REDIRECTION REPLACEMENT

Prevention Install software such as; firewalls, a spyware scanner, a Trojan horse program, and antivirus programs Run up to date scans Don’t download materials from questionable sources Remove unused communication ports Understand how an attack could happen so you see one coming

Conclusion There are six types of malicious attacks: trojan horses, worms, viruses, hoaxes, spam, and phishing Good computer practices can help a user minimize the threat of a malicious attack