Spyware, Viruses and Malware What the fuss is all about.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Security Advice Georgie Pepper Campsmount Acadamy.
Viruses & Destructive Programs
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
W elcome to our Presentation. Presentation Topic Virus.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
James Paik. What is a virus? A virus is a malicious program that can be executed on the computer and can cause damage to it.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Chapter 40 Internet Security.
Malware and Computer Maintenance
Instructor Materials Chapter 7 Network Security
Network security threats
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Information Security Session October 24, 2005
Viruses and Virus Protection
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Spyware, Viruses and Malware What the fuss is all about

Malware, or Malicious Code, refer to various types of software that can cause problems, damage, disrupt your computer. Installed without user knowledge or approval What is Malware?

Motivation for Malware Fun/Hobby/Spreading of ideological or political message Experimental/Research/Proof of Concepts Vandalism/Graffiti Revenge Profit/Extortion

Types of Malware Virus – software program – exist on local drive – reproduction using a host (e.g. files, s) – simple self-modification, encryption, polymorphic, metamorphic – Melissa, Chernobyl, I Love You….

Types of Malware Worms – stand alone software application – reproduced by itself – spread by exploiting vulnerabilities in the system – Netsky, SoBig, CodeRed, Sasser….

Types of Malware Trojan – disguised as legitimate software – ActiveX, BHO, shareware, pop-ups advertisement, pirated software – remains hidden – usually do not replicate itself – Adware, Spyware, Backdoor (rootkit, zombies), Dropper, NetBus, SubSeven, GAIN (Kazaa)

Types of Malware Others – Key Logger – Dialer – Browser Hijack – hybrids

How did it get there? Zero day exploits Drive by downloads Vulnerabilities in available services; DCOM, RPC, p2p, lsass, etc Default passwords attachment, opened by user or program p2p downloads, double extensions

How did it get there? User Error User has installed the malware Social Engineering (but it said, “I love you!”) Poor or nonexistent passwords

Countermeasures Antivirus – Scanning and identifying using unique pattern of individual malware (Signature) – searching is done based on definition of known virus byte patterns (virus dictionary) – some uses heuristic/pattern analysis (suspicious behaviour) – scan for virus, worms, spyware and adware – Norton, McAfee, AVG, ZoneAlarm, Avast

Countermeasures Firewall – rule-based (filter based on ports, IP address, application….) – hardware/software – network layer, application layer, application – personal, network based – stateless/stateful – part of Intrusion Prevention System (IPS) – IPFilter, pf, ipfw, Netfilter, Cisco, Dlink, McAfee, Norton, ZoneAlarm, Windows, Avast, Jetico

Countermeasures Education – Educating end-users to: Constantly apply OS patches available Enable and constantly update antivirus Delete s from unknown sender Operate in least privileged mode Enable a personal firewall

Once malware has been identified, it is best to remove it while in safe mode. Some malware has additional processes that strive to stop you from removing it. Deleting startup locations and files while in safe mode, you can usually restore a system to working condition but not necessarily trusted state. Removal Notes

Some notes on Malware Remember that a machine compromised by malware has effectively been ‘hacked’ and that it is usually best to return the machine to a trusted state by removing important data and rebuilding using best practices. Keep in mind the following; Change all Passwords associated with this machine Hardening Patching