Download presentation
Presentation is loading. Please wait.
Published byMarylou Harris Modified over 9 years ago
1
Information Assurance and Security Malware By: Andrew Mitura
2
Discussion: What is Mal Ware? Watch a video: (May 27, 2008) Top 3 virus of 2008? How to prevent Malware? How should companies try and fight off these threats? Conclusion
3
Malware………….. Software designed to infiltrate or damage a computer system without the owner's informed consent.”
4
Watch a Video Watch a video: (May 27, 2008)
5
3 notable viruses of 2008: Conficker Koobface MacSweeper
6
Conficker November 2008 How: ▫Infected numerous computers by finding open ports in Windows Networks NetBIOS Directory attack on Admin$ shares ▫later propagated thru the use of removable media. DDL-based Auto Run Trojan
7
Conficker damages: Est. infected computers: 9-15 million. Notables: ▫French navy could not fly their planes, due to they could not download flight plans ▫Virus: disables safe mode Kills anti-malware Disables auto-update
8
How many people use: FACEBOOK, MySpace, hi5, Bebo, Friendster, and Twitter?
9
Koobface July 31, 2008 How: ▫sent a link to go to a site from potentially someone you don’t know. Once on the site, users are prompted to update their Adobe Flash player. Adobe Flash player had been hacked
10
Koobface Damages: Between 13 and 19 July, the infection rate has increased by 114% for users from the US and by 198% for the UK users. During the same period, infections of French Twitter users have increased by a whopping 371%.
11
How many virus have hit a Mac?
12
MacSweeper Struck January 17 2008 1 st virus of the Mac OS X Operating system. How: ▫Virus attached itself to the spyware, adware removers of the computer. Coerced users to purchase additional software to remove infection.
13
So how can we/companies prevent Malware? Hire an Information Assurance specialist? http://hodes.jobhost.org/viewjob.php?id=600201
14
What is Information Assurance? “The technical and managerial measures designed to ensure the confidentiality, possession or control, integrity, authenticity, availability and utility of information and information systems. This term, which has spread from government use into common parlance, is sometimes synonymous with information security.”
15
Information Assurance/NIST Guidelines Access Control Awareness and Training Audit and Accountability Certification Accreditation Security Assessments Configuration Management Contingency Planning Identification and Authentication, Incident Response Maintenance System and Services Acquisition http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf
16
Conclusion: So how can we/companies prevent Malware? ▫Hire an Information Assurance Specialist
17
Questions:
18
Information Assurance and Security Malware By: Andrew Mitura
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.