common malware and countermeasures

Post on 09-May-2015

1.035 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Security Awareness related to common malwares, (viruses, trojans, worms etc) the damages they cause and basic countermeasures one can adopt to protect against them.

TRANSCRIPT

COMMON MALWARE and COUNTERMEASURES

MALWARE(Malicious-Software)

Ask yourself this. This power point presentation is named

malware. Did you run a scan on it before opening.?

A Malware is a specific set of codes or an application , specifically designed to harm and/or to gain access to a targeted computer , or spread across multiple computers ; over the use of a network or a data storage device.

MALWARE DEFINED

Malware is a Malicious SoftwareAs old as the Software itselfAny harmful piece of program.

DIFFERENCE TYPES OF MALWARES

Virus Worm Trojan horse Spyware Phishing

TYPES OF MALWARE

The first malware was a VirusIt Appeared in the realms of computer were ELK Cloner and Brain virus.

The “ELK Cloner” virus appeared on Apple MAC in 1982 , and was created by Rich Skrenta from Pennsylvania, United States.

FIRST MALWARE OF THE WORLD

FIRST MOST DAMAGING VIRUS OF WORLD

The Brain virus was programmed by two brothers ; Amjad Farooq Alvi and Basit Farooq Alvi , from Lahore Pakistan in 1986.

1990 focused targeting on colleges and universities

Mid 20th century started targeting businesses

After the year 2000 target was The Internet !

To attack or takedown websites• Destroying the online presence and credibility.• Financial Theft.

BRIEF HISTORY OF MALWARES.

BRIEF HISTORY OF MALWARES.The “Worn Outbreak ERA”From 2000-2003

The “WEB THREAT ERA”From 2004-2008

Current Era of Malwares as termed by experts:

BRIEF HISTORY OF MALWARES.

Other EXAMPLES OF MALWARE.

Evolution of Malware over (2003-2010):

STATISTICS ; MALWARE ; Evolution.

TYPES of MALWARE EXPLAINED

Virus replicates into the network by creating copies of itself in the computer files. ◦ Need a file to survive, infect and replicate

Virus is designed to damage or read data on computers or cause interruptions in work

Melissa virus is a top known virus.

VIRUS

WORM

• Self duplicating malware that spreads out independently• Eats the Network• Famous of all time and first Worm– Morris Worm• Stuxtnet Worm !

The Trojan Horse by the Greeks Hides in a legitimate software Tricks users to install it Gains privileged access to the OS Makes a botnet Non self replicating NetBus is a well known trojan from 1988

TROJAN

As the name suggests SPYware! Steals information Hard to detect SpyAnytime, CASE, GATOR are spywares

Spyware

Pretend Play! Get financial or personal information Corporate espionage Fake calls and emails Common target today is social networking sites

PHISHING

Malwares will always be Chasing you!

Adopt layers of security for defense

◦ Anti Virus and Scans ◦ Install software from trusted vendors◦ Avoid opening unknown attachments◦ Do not insert media on known infected

computer◦ Clean out old files

KEEP YOUR GUARD UP

Keep up your security shields

◦ Always re confirm source◦ Monitor network traffic◦ Audit logs◦ Keep OS updated◦ All other common security measures

KEEP YOUR GUARD UP

Malwares are now not restricted to computers only , these have made their way into the world of cell phones and tablets.Major affecting the mobiles containing the Android and IOS operating system.

MALWARE ; NOT RESTRICTED TO COMPUTERS

STATISTICS ; MALWARE , Type.

Malware Distribution by type:

In order to countermeasure the threats of malware , the user should:

SUMMARY for COUNTERMEASURES

• Installing Anti-Malware Applications.

• Often Get the data drive Scan and analyzed.

• Gaining basic knowledge about the way malwares work.

• Installing Basic internet Security Applications.

top related