Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Malware
Although anti-virus software should be on every computer, it can only protect against older viruses that are already known. Malware can be designed to bypass anti-virus software.
Anti-virus cannot protect against vulnerabilities in the operating system (i.e. - Windows 7)
There are actual websites that hackers can copy and paste their evil code into that will let them know if it can make it through anti-virus software!!! Malware is often installed via a method called the "Drive-by download (or install)" These are perhaps the most dangerous because you can infect your computer simply by visiting a website, and in a matter of seconds.
A drive-by download can install any of the prior mentioned malware without you ever even noticing it. This does not protect against many threats but it is still an absolute must-have! 2. Keep all software up-to-date, especially Windows updates, anti-virus software, web browsers, and all add-ons/plug-ins - including Java, Flash and Adobe Acrobat. To be extra safe, periodically goto the website of each to check for updates versus just clicking "ok" every time a pop-up asks if you would like to install an update. 3. Enable the web-filtering option that comes with most current internet browsers. These will alert you to possibly harmful sites. 4. Do not use your computer with administrator privileges. This makes it much easier for malware to be installed without you actually approving anything. 5. When prompted if you would like to install something, like an update, don't automatically click "yes." 7. Finally, the "typical" and often repeated guidelines... A good habit is to make note of what the prompt asks, close out of it, and do a quick google search to see if it is safe. 6. Sometimes a disc or a flash drive given to you by a friend may unknowingly have malware on it. You can scan a disc or flash drive with your anti-virus software before you open any of the files. - don't open links or attachments in emails from unknown senders
- even if the email says it is from someone you know, check to make sure they actually sent it Trojan often disguised as something normal or desirable, enticing the users to install it without realizing the dangers. Unlike viruses and worms, they do not spread by themselves. They require a user to spread them, for example by downloading a file, program, application, or screen-saver. while these originated as strictly for profit, they evolved to be a more dangerous tool. These are designed to monitor users' web browsing and diplay unsolicited advertisements. A large number of viruses and worms are designed to take control of users' computers for black-market exploitation.
These infected "zombie computers" not only continue to spread infection but can also be used to email spam unknowingly from the user, host contraband data such as pornography, and can make websites unavailable to users/customers/ clients. Spyware & Adware -ISAC Helpdesk
-Greg Bilobran ext. 2444 or