Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Malware

No description
by

Christopher Grimm

on 28 November 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Malware

Timeline Calculations 2013 2009 2010 2011 2012 0 + - = 9 8 7 1 2 3 4 5 6 c Ok, so how can you protect yourself... 1. Always have anti-virus software installed on your computer (including laptops and smartphones). What is Malware (Malicious Software)? programming code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on a computer, multiple computers, or information on the computer(s). So many terms.... Virus As always, remember that "Sec_rity is incomplete without U." If you have any questions regarding malware, please contact: Virus operates by placing itself within another program and then spreads itself from computer to computer Malware A Guide for Work or Home Short answer: something bad that can do very bad things. Trojans Worms Spyware Adware These are all examples of malware. Each of these vary slightly in either what they do or how they do it. Worm also spreads from computer to computer, but does not need to be contained in another program, it stands by itself How to Protect Against Malware Anti-virus software alone is not enough....
Although anti-virus software should be on every computer, it can only protect against older viruses that are already known. Malware can be designed to bypass anti-virus software.

Anti-virus cannot protect against vulnerabilities in the operating system (i.e. - Windows 7)

There are actual websites that hackers can copy and paste their evil code into that will let them know if it can make it through anti-virus software!!! Malware is often installed via a method called the "Drive-by download (or install)" These are perhaps the most dangerous because you can infect your computer simply by visiting a website, and in a matter of seconds.

A drive-by download can install any of the prior mentioned malware without you ever even noticing it. This does not protect against many threats but it is still an absolute must-have! 2. Keep all software up-to-date, especially Windows updates, anti-virus software, web browsers, and all add-ons/plug-ins - including Java, Flash and Adobe Acrobat. To be extra safe, periodically goto the website of each to check for updates versus just clicking "ok" every time a pop-up asks if you would like to install an update. 3. Enable the web-filtering option that comes with most current internet browsers. These will alert you to possibly harmful sites. 4. Do not use your computer with administrator privileges. This makes it much easier for malware to be installed without you actually approving anything. 5. When prompted if you would like to install something, like an update, don't automatically click "yes." 7. Finally, the "typical" and often repeated guidelines... A good habit is to make note of what the prompt asks, close out of it, and do a quick google search to see if it is safe. 6. Sometimes a disc or a flash drive given to you by a friend may unknowingly have malware on it. You can scan a disc or flash drive with your anti-virus software before you open any of the files. - don't open links or attachments in emails from unknown senders
- even if the email says it is from someone you know, check to make sure they actually sent it Trojan often disguised as something normal or desirable, enticing the users to install it without realizing the dangers. Unlike viruses and worms, they do not spread by themselves. They require a user to spread them, for example by downloading a file, program, application, or screen-saver. while these originated as strictly for profit, they evolved to be a more dangerous tool. These are designed to monitor users' web browsing and diplay unsolicited advertisements. A large number of viruses and worms are designed to take control of users' computers for black-market exploitation.

These infected "zombie computers" not only continue to spread infection but can also be used to email spam unknowingly from the user, host contraband data such as pornography, and can make websites unavailable to users/customers/ clients. Spyware & Adware -ISAC Helpdesk

-Senoy Kavalackal
-Greg Bilobran ext. 2444 or
isac.helpdesk@isac.illinois.gov
Full transcript