Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Computer Infections

Different Infections

Malware

  • What is it?
  • "Malicious Software"
  • software that is intended to damage or disable computers and computer systems
  • Broad term which includes viruses, trojan horses, spyware and all forms of malicous programs.
  • How does it occur?
  • executable code, scripts, active content, and other software
  • When was the first created?
  • Originally created as experimental pranks
  • Now to steal personal, financial, and business information.
  • Methods:
  • Top Forms
  • Virus
  • Trojan Horse
  • Worms
  • Rootkit
  • Backdoors
  • Evasions

Spyware

  • What is it?
  • Type of malware
  • Installed on a computer without the knowledge of the owner in order to collect the owner’s private information
  • How does it occur?
  • Spyware attaches itself to downloadable software that users will knowingly download
  • After software is installed the spyware will attach itself inside the computer
  • Installation can also occur through a trojan horse or other malware
  • Effects?
  • Collect personal information on users such as;
  • Internet access
  • passwords
  • key strokes
  • internet activity
  • credit card information
  • Negatively impact a computers performance by changing and redirecting information on the computer

Virus

  • What is it?
  • code that is capable copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  • Viruses are a specific type of malware (designed to replicate and spread)
  • How does it occur?
  • Replicate itself in the programming and replaces the computer/program code with its own code.
  • Effects different parts of the computer and stores itself in various locations.
  • Why?
  • Profit (i.e - with ransomware)
  • send a political message
  • personal amusement
  • to demonstrate that a vulnerability exists in software
  • Effects?
  • Billions of dollars a year world wide
  • Computers inability to run effectively

Sources

Conclusion

Learning about computer malware and all the effects it has on the world is important in any field of study in order to safely browse and use the internet in a personal setting but especially at work. Social workers often are government employees and are handling confidential information and paperwork that needs to be backed up and secure in the computer. Understanding how to prevent viruses and malware as well as how they interact with your computer is essential to successfully conduct yourself in accordance with the social work code of ethics and confidentiality.

Epidemics

Zeus

  • http://www.hongkiat.com/blog/famous-malicious-computer-viruses/
  • http://www.telegraph.co.uk/technology/5012057/Top-10-worst-computer-viruses-of-all-time.html
  • http://lifehacker.com/the-difference-between-antivirus-and-anti-malware-and-1176942277
  • https://www.webroot.com/us/en/home/resources/tips/pc-security/security-what-is-anti-virus-software
  • http://www.pctools.com/security-news/what-is-spyware/
  • https://www.ntchosting.com/encyclopedia/ftp/ftp-account-management/
  • http://www.pcworld.com/article/243818/security/how-to-remove-malware-from-your-windows-pc.html
  • https://heimdalsecurity.com/blog/warning-signs-operating-system-infected-malware/
  • https://redshift.autodesk.com/10-tips-on-how-to-prevent-malware-from-infecting-your-computer/
  • http://computersupportservicesnj.com/top-10-computer-virus-symptoms-checklist/

  • Trojan Horse - in 2009
  • Target(s): Windows Computers
  • FTP(File Transfer Protocol) Accounts
  • Large international banks and corporations
  • example: Amazon, Oracle, Bank of America, Cisco,
  • Method(s): downloads, Phishing scams, "drive by" downloads
  • When target was infected the program causes victims to conduct criminal activity.

How:

->Controllers of the Zeus botnet used it to steal the login credentials of social network, email and banking accounts

  • Effects: Over 1 million computers effected and over $70 million gained from virus.

I LOVE YOU Virus

  • Malware - May 2000
  • Created by: Reonel Ramones and Onel de Guzman.

How:

->use social engineering to get people to click on the "love confession".

->The attachment was a script that poses as a TXT file,

-> Once clicked, it sends itself to everyone in the user’s mailing list

-> Finally, it will proceed to overwrite files with itself, making the computer unusable.

  • Effects: Infected computers all over the world
  • Causing over $10 billion in damages to systems and programming.

CryptoLocker

Storm Worm

  • Trojan Horse
  • ransom
  • Target(s): Windows computers
  • Methods: email
  • Results: infecting 500,000 computers and gathering $3 million.

How:

-> Encrypted files on the hard drive and any mounted storage connected to it with RSA public key cryptography.

-> While it is easy enough to remove the malware from the computer, the files will still remain encrypted.

->The only way to unlock the files is to pay a ransom by a deadline.

  • Back Door Trojan Horse - 2007
  • Target(s): Microsoft systems and private computer systems
  • Method(s): Email

How:

-> posed as breaking news of bad weather hitting Europe or an intriguing subject line of the email.

-> When opened, the malware installs the wincom32 service, and injects a payload, passing on packets to destinations encoded within the malware itself.

The Concept Virus

  • Malware - 1995 & 2001
  • two separate pieces
  • WM Concept
  • first virus to spread through Microsoft Word documents
  • Nimda Concept
  • Infecting computer worm
  • Method(s): Email, network shares, compromised websites, exploration of internet information services, Code Red "back doors".

Symptoms &

Treatment

Prevention and treatment

Top Ten Best Prevention Techniques:

1. Install Anti-Virus/Malware Software.

2. Keep Your Anti-Virus Software Up to Date

3. Run Regularly Scheduled Scans with Your

4. Keep Your Operating System Current

5. Secure Your Network

6. Think Before You Click

7. Keep Your Personal Information Safe

8. Don’t Use Open Wi-Fi.

9. Back Up Your Files

10. Use Multiple Strong Passwords

Symptoms

Signs that your computer has been infected:

  • slow downloads
  • pop ups
  • suspicious hard drive activity
  • new; toolbar, homepage, access to unheard of or undesired websites
  • unusual/suspicious automatic messages

How to test if you have a virus?

  • Step 1: Enter Safe Mode
  • Step 2: Delete temporary files
  • Step 3: Download malware scanners
  • Step 4: Run a scan with Malwarebytes
Learn more about creating dynamic, engaging presentations with Prezi