Information Assurance and Security Malware By: Andrew Mitura
Discussion: What is Mal Ware? Watch a video: (May 27, 2008) Top 3 virus of 2008? How to prevent Malware? How should companies try and fight off these threats? Conclusion
Malware………….. Software designed to infiltrate or damage a computer system without the owner's informed consent.”
Watch a Video Watch a video: (May 27, 2008)
3 notable viruses of 2008: Conficker Koobface MacSweeper
Conficker November 2008 How: ▫Infected numerous computers by finding open ports in Windows Networks NetBIOS Directory attack on Admin$ shares ▫later propagated thru the use of removable media. DDL-based Auto Run Trojan
Conficker damages: Est. infected computers: 9-15 million. Notables: ▫French navy could not fly their planes, due to they could not download flight plans ▫Virus: disables safe mode Kills anti-malware Disables auto-update
How many people use: FACEBOOK, MySpace, hi5, Bebo, Friendster, and Twitter?
Koobface July 31, 2008 How: ▫sent a link to go to a site from potentially someone you don’t know. Once on the site, users are prompted to update their Adobe Flash player. Adobe Flash player had been hacked
Koobface Damages: Between 13 and 19 July, the infection rate has increased by 114% for users from the US and by 198% for the UK users. During the same period, infections of French Twitter users have increased by a whopping 371%.
How many virus have hit a Mac?
MacSweeper Struck January st virus of the Mac OS X Operating system. How: ▫Virus attached itself to the spyware, adware removers of the computer. Coerced users to purchase additional software to remove infection.
So how can we/companies prevent Malware? Hire an Information Assurance specialist?
What is Information Assurance? “The technical and managerial measures designed to ensure the confidentiality, possession or control, integrity, authenticity, availability and utility of information and information systems. This term, which has spread from government use into common parlance, is sometimes synonymous with information security.”
Information Assurance/NIST Guidelines Access Control Awareness and Training Audit and Accountability Certification Accreditation Security Assessments Configuration Management Contingency Planning Identification and Authentication, Incident Response Maintenance System and Services Acquisition
Conclusion: So how can we/companies prevent Malware? ▫Hire an Information Assurance Specialist
Questions:
Information Assurance and Security Malware By: Andrew Mitura