How To Understand What A Virus Is And How To Protect Yourself From A Virus



Similar documents
Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Introduction to Free Computer Tools

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Introduction to Computer Security Table of Contents

Module 5: Analytical Writing

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Network Security. Demo: Web browser

Computer Security Maintenance Information and Self-Check Activities

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Don t Fall Victim to Cybercrime:

The Care and Feeding of Your Computer Troubleshooting and Maintenance

ANTIVIRUS BEST PRACTICES

Ten Tips to Avoid Viruses and Spyware

Additional details >>> HERE <<<

Types of cyber-attacks. And how to prevent them

Introduction (Contd )

F-Secure Anti-Virus for Mac 2015

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Computer Viruses: How to Avoid Infection

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

What are Viruses, Trojans, Worms & Spyware:

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

How to easily clean an infected computer (Malware Removal Guide)

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Preparing Your Personal Computer to Connect to the VPN

F-Secure Anti-Virus for Mac. User's Guide

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer?

Additional details >>> HERE <<<

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

What's the difference between spyware and a virus? What is Scareware?

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Protecting Your Computer from Viruses and Spyware

IRM NEWS CYBER SECURITY AWARENESS FIREWALLS THE GUARDIAN AT THE GATE FLORIDA ATLANTIC UNIVERSITY

ViRobot Desktop 5.5. User s Guide

Global Antivirus Software Package Market

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Pro Security

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Sophos Endpoint Security and Control Help

Security Industry Market Share Analysis

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

ANDRA ZAHARIA MARCOM MANAGER

Basic Computer Maintenance

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Spyware: Securing gateway and endpoint against data theft

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Get Started Guide - PC Tools Internet Security

Sophos Endpoint Security and Control Help. Product version: 11

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Open an attachment and bring down your network?

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

Computer infiltration

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Trend Micro Endpoint Comparative Report Performed by AV Test.org

1 Introduction. Agenda Item: Work Item:

System Administrator Guide

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Transcription:

Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series

Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change? What is the difference between a virus, a Trojan and a worm? How did a worm get into my computer? 2

Definition Virus - In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD Trojan - In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. Worm - In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks. 3

Definition Spyware - Spyware is any technology that aids in gathering information about a person or organization without their knowledge. Adware - Generically, adware (spelled all lower case) is any software application in which advertising banners are displayed while the program is running. Malware - Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission. 4

The cost and rise in Malware On average, one in every 44 e-mails contained a virus in 2005, according to Sophos. This rose to one in 12 e-mails during major malware outbreaks. In total, Sophos identified 15,907 new malware threats in 2005, up 48% from 2004. Malware attacks in 2005 caused an estimated $14.2 Billion in damages from loss of revenue, labor expenses, loss of productivity and the cost of tools. 5

Simulated spread The Symantec Worm Simulator shows how quickly some of the top recent worms spread. [switch to application] 6

Infection How did my system get infected? Windows Vulnerabilities Network Connections/Shared Files Pop-Ups E-mail Free Applications 7

Infection How do I know when my system is infected? Slow system performance Pop-ups New Toolbars Internet Homepage changed Computer Crashes No indication 8

Extraction Anti-Malware Removal Tools AVG Anti-Virus HouseCall from Trend Micro AdAware from Lavasoft SpyBot Search and Destroy Microsoft Malicious Software Removal Tool 9

Extraction Stand Alone / Virus Specific Removal Tools Stinger from Mcafee Removal Tools from Symantec 10

Protection What tools can I use to make sure I am continuously protected from Malware? Aluria Anti-Spyware CounterSpy SpySweeper Spyware Doctor 11

Protection What tools can I use to make sure I am continuously protected from viruses? AVG Anti-Virus Mcafee Anti-Virus Norton/Symantec Anti-Virus 12

Prevention How can I prevent virus, trojans, worms and malware from getting onto my system? Careful web browsing E-mail safety Keep protection tools up to date Review software being installed Protect and monitor your child s computer usage 13

References http://www.whatis.com This site is a source for all technology related definitions and information. http://www.searchsecurity.com This site is a source of information on security tips, products and definitions. http://www.bleepingcomputer.com/forums/topic2520.html - This site is a compilation of information submitted by users from across the world. http://support.dell.com/support/topics/global.aspx/support/security/security _antivirus_help?c=us&l=en&s=gen&~mode=popup Dell provides a variety of information on how systems can get infected, how to know you re infected, and how to remove the virus. 14

References http://anti-spyware-review.toptenreviews.com/ - The site, Top 10 reviews, provides in-depth reviews of anti-malware protection products. http://anti-virus-software-review.toptenreviews.com/ - The site, Top 10 reviews, provides in-depth reviews of anti-virus protection products. http://netsecurity.about.com/cs/generalsecurity/a/aa050204.htm - This page provides general guidelines on how to prevent having malware installed. http://security.yahoo.com/ - Yahoo s security site provides you with information on how to prevent downloading viruses. http://computer.howstuffworks.com/virus.htm - How Computer Viruses Work. 15

Questions? 16

Thank you for attending! 17