Download presentation
Presentation is loading. Please wait.
Published byBrett Rodgers Modified over 8 years ago
1
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008
2
Symptoms Computer functions slower than normal Computer responds slow and freezes Computer restarts itself often Uncommon error message, distorted menus and dialog boxes Fail to print correctly Applications fail to work properly
3
Backdoor Program Installed on computer by disk, internet, etc. Permits access to computer Bypasses normal authentication process Results in spam email to protect creator
4
Trojan Program Not a virus rather type of malware Does not self-replicate Usually found to be utility Accidentally ran
5
Virus Replicating itself onto saved files or programs Delete or destroy system files and formatting disks Uses large amounts of computer resources to slow it down
6
Types of Viruses Boot sector viruses Program viruses Stealth viruses Macro viruses Active X and Java control
7
Most Dangerous Virus Hoax Virus Email claiming to be gov, microsoft, etc. Says just discovered new virus Virus reformats hard drive or other harm In email itself saying forward to all people
8
Effects of Hoax Clogs your email server Decreases productivity drastically
9
Top Viruses June 2008 TYPE Kind Percentage TYPE Kind Percentage Email-Worm.Win32.NetSky.q Trojan.generic 34.15% Email-Worm.Win32.NetSky.q Email-Worm.Win32.Nyxem.e Trojan.generic 13.16% Email-Worm.Win32.Nyxem.e Email-Worm.Win32.NetSky.y Trojan.generic 8.20% Email-Worm.Win32.NetSky.y Net-Worm.Win32.Mytob.t Worm.P2P.generic 5.40% Net-Worm.Win32.Mytob.t
10
Worms Self replicating like viruses Does not attach itself to programs or files Self contained program More prominent then viruses because of internet and does not need help to spread
11
Effects Large amounts of bandwidth Deleting files Sending emails Creating backdoor paths to computer
12
Types of Worms Kak Worm Bagle Code Red II Melissa Sober Supernova Worm
13
Rootkits Type of trojan that can monitor traffic What goes in and out of computer Monitor keystrokes Captures passwords Compromise system by altering system files and drivers This allows computer to “run normal”
14
Catching Rootkits Reboot computer from cd of flash drive Also has to have scan and detect tools Removing rootkits make difficult because alters your normal computer files
15
Anti-Virus Software AVG free (deluxe model) Norton McAfee Bit Defender
16
Rootkit Scanners AVG free (Deluxe) Panda Daimondcs Stopzilla
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.