Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
 What is Computer Security  Key Components  Levels  Challenges  Attacks  Desktop Security  Why it is important  Virus/Worms/Trojans  Tips  Web.
Quiz Review.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
About Us Inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Offices.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Protecting Your Computer & Your Information
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
32-1 Internet Safety/Security Issues Trojan/Virus precautions When you run an executable program from an untrusted source you’re opening yourself.
Hacker Zombie Computer Reflectors Target.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Software.
 Malicious Code  Hacking  Natural Disaster  Theft.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
What they are and how to protect against them
IT Security  .
Instructor Materials Chapter 7 Network Security
Computer Applications Unit B
Computer Security.
Presentation transcript:

Viruses, Hacking, and AntiVirus

What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate itself – Spread from one computer to another

First Viruses Creeper Virus detected on ARPANET Would display “I'm the creeper, catch me if you can!“ “Elk Cloner” – attach to Apple DOS 3.3 OS and spread via floppy disk

Types of Viruses Viruses that infects popularly traded software Macro Viruses: written in scripting languages for Microsoft programs such as Word and Excel Viruses in Executables

How Your Computer Gets Infected Binary Executable files (DLL’s, EXE’s) An external, physical device General Purpose Script files System Specific Autorun Script files Documents that contain Macros Exploitable bugs in a program Links to malicious code in PDFs, HTML, other documents

An Example A file could be named “picture.png.exe” When opened, the program runs and infects computer Spoofing an address to make it sound legitimate so you’ll download and open an attachment

Malware Includes viruses, worms, trojan horses, spyware, adware

Purpose of Malware Used to steal personal, financial, or business information Destroy data Hijacking computers for various purposes

Cookies Cookies are small files deposited on a system during a web site visit Can be useful: – Allows web servers to maintain state (position and information) of a session with a user – Can keep track of your login information, shopping cart, etc. May be harmful – Allows web sites to track information unbeknownst to user – Source of data for Pop-ups

Worms Worms are similar to viruses in the way they are spread Doesn’t need user action to spread Actively transmits itself over networks to infect other computers

Trojan Horses A program that looks like a harmless program but contains malicious code Used to install other malware such as backdoors or spyware

Rootkits Rootkits: modify OS so malware is hidden “Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.”

Backdoors A way to bypass normal authentication procedures Example: a hard coded user and password that gives access to a system or computer Easter Eggs Many viruses and worms attempt to create backdoors for more viruses

Spyware Software that monitors and gathers information about your system or computing Can collect personal information, Internet surfing habits, user logins, bank or credit account information Can change computer settings Keyloggers – collects information about what you type Port Sniffers – intercept and log data sent over a network

Port Scanners and Sniffers Port Sniffers – intercept and log data sent over a network Port Scanner – software that probes a server or computer network for open ports. Use ports to access network.

Bots and Botting Programs that take control of a computers normal operation, or operate in stealth mode on a computer Can be used to disrupt normal operations Can turn a user’s computer into a source of malware attacks on others ( Spamming)

Adware Advertising-supported software: automatically renders unwanted advertisements Object is to generate revenue for its author

Non-Malware, Active Threats Phishing – Posing as a trustworthy entity to acquire information Fake websites Spoofing

Non-Malware, Active Threats (Distributed) Denial of Service, AKA DDOS attack Flooding a web server with spurious traffic generated to overwhelm the server’s capabilities thus denying legitimate users or exposing system flaws Related to Botting

Scareware Holds your PC hostage

Hacking USES ALL OF THE ABOVE Not this:

Additional Hacking Password Cracking Software bugs: buffer-overrun, SQL Injections

Protecting Your Computer

Signs Your Computer May Be Hacked Your computer is running slow Processes you don’t recognize are running You are asked for personal information via , or by phone You see data or programs disappear or change A Pop-up says your machine is infected and you need to scan it right now – and it is not the security software you installed

Anti-Spyware When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the OS. 1.Scans incoming network data for spyware 2.Detects and removes spyware

Firewalls Similar to Anti-Spyware but controls all incoming and outgoing traffic and what should and shouldn’t be allowed in and out

Anti-Virus Pros: Prevents, detects and removes malware Cons: False Positives, False Negatives Slows down your computer

Be Smart! Don’t open s that you don’t recognize Don’t download attachments you don’t recognize Don’t run programs or install applications you don’t know or trust

Personal Checklist Passwords are set, sufficiently complex, and not shared Legitimate Anti-Malware software running Home wireless network protected by WPA Firewall software running Browser settings appropriate Sensitive files are protected - password and encrypted Smartphone protected – locate, lock, wipe Software is kept up to date I'm being cautious: - Which web sites I visit - When I open s - Where I leave my laptop, smartphone, USB drive - When asked for information via , internet, phone - When I use public wireless networks - When I download applications

Some Anti-Virus Software review.toptenreviews.com/ review.toptenreviews.com/ anti-virus-software.htm anti-virus-software.htm

Some Anti-Virus Software Avast!: Avira: AVG: Microsoft Security Essentials: US/windows/security-essentials-download US/windows/security-essentials-download MalwareBytes: