Download presentation
Presentation is loading. Please wait.
1
Viruses and Virus Protection
A basic overview by Jacob Benko
2
Definitions Malware: Virus:
A piece of software designed to take over or damage a computer Includes viruses, worms, trojans, backdoors, spyware, key loggers, dialers, browser hijackers, etc Virus: Strictly: “Self replicating code” Technically must reside within some “host” file, and cannot spread to other computer unless a user sends it.
3
Common Threats Worm: Trojan Horse Backdoor:
A specific type of virus that can stand alone without attaching to a process, and spreads itself between computers by some means Trojan Horse A piece of malware that is disguised as a legitimate program Backdoor: A piece of software that allows access to a computer bypassing standard authentication
4
AIM Viruses Most are links to a webpage where you download the malware
Usually place the message in a user profile or relay the message to everyone on a user’s buddy list A type of worm that uses social engineering to spread Use cleverly (and often timely) worded messages to entice the user into clicking the link Ex: on Valentines day: “Valentine’s sexy pix”
5
Internet Worms Often use network vulnerabilities to automatically spread ALL operating systems contain security flaws, and many worms use these flaws to spread to non-updated computers Famous worms include Nimda, Code Red (2001) Blaster, Sobig (2003) MyDoom, Sasser (2004)
6
Trojan Horses Must be spread by a user from one computer to another. Common transmittal means: Attachments Cracks and Keygens from websites P2P Files Many P2P networks are saturated with files infected by trojan horses These files may appear to work and perform their task, but in the background may install some malware such as a backdoor.
7
Protection Antivirus software made by McAfee and Norton/Symantec have “on access scans” These scan any file before it runs, to check it for known viruses This list of known viruses will not contain every possible threat, and newer viruses may not be recognized This list is constantly updated by the AV company as they identify threats, and you must update to this list regularly to stay protected
8
Basic Guidelines If you are not sure about an AIM message or an attachment either So not open it at all, or Ask the person who sent it if they meant to send it, and scan the file for viruses manually Keep your antivirus up to date Most have auto-update feature, make sure it is on Be wary of any programs you download from an untrusted webpage or P2P networks
9
Any Questions?
10
Thanks for not coming More food for us
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.