Download Remote Domain Security Awareness Training

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Spyware wikipedia , lookup

Unix security wikipedia , lookup

Computer security wikipedia , lookup

Trusted Computing wikipedia , lookup

Microsoft Security Essentials wikipedia , lookup

Rootkit wikipedia , lookup

Antivirus software wikipedia , lookup

Computer virus wikipedia , lookup

Ransomware wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Mobile security wikipedia , lookup

Malware wikipedia , lookup

Transcript
Antnomy of Malware
Amruta Dubewar
What is Malware?
 Origin of name Malware
malicious software
Malware is general term for any kind of unwanted software that is installed
without your permission and damage to your computer
Malware can be classified based on
How they get executed
How they spread
What they do
Types of Malware
Viruses
Worm
Trojan Horse
Spyware
Adware
Ransomware
Rootkit
Viruses
Virus attach themselves to other software program and during the execution
of that program the virus code gets executed.
They are self-replicating computer programs
How virus gets into your system?
Social engineering
Exploit vulnerabilities
Effects of Viruses
Stealing hard disk space or CPU time
Access private information
Corrupt data
Spamming contacts
May require a complete OS reinstallation to fix.
Worms
Worm is a standalone computer program and it replicates itself in order to
spread to other computers
It exploits security hole in software or the operating system.
It uses computer network to spread itself
Unlike a virus, it does not attach itself to an existing program
Effects of Worm
Major disruption by increasing network traffic
Networks of such machines used by attacker for sending junk email
Blackmail companies with threatened DoS attacks
Trojan Horse
 Trojan horse is a very deceptive program, it appears harmless or even
beneficial and trick users to install it
For example, might look like an Android app for new game
It does not have the ability to self replicate like viruses and worm. It spread
through user interaction.
Unlike viruses, it does not attach itself to existing program.
Effects of Torjan Horse
Modify or delete files
Downloading and installing software
Modifications of registry
Use your computer as a part of Zombie Army or BOTNETS
Spyware
Spyware usually comes bundled with free software and automatically
installs itself with the program
It gathers information about person without their knowledge and send it to
another party
Effects of Sypware
Install additional software
Redirect Web browsers
Logging keystrokes
Change computer settings
Stability issues
Adware
Adware is advertising-supported software
It causes pop-up ads or banners to appear on your computer.
It downloads to your computer when you access certain Internet sites,
install certain freeware
Rootkit
Rootkit hide the fact that an operating system has been compromised
Attacker obtain administrative access and install Rootkit
Rootkit are very difficult to detect
It allows the installation of hidden files, processes, hidden user accounts etc
Ransomware
It restricts access to the computer system and demands ransom to remove
restriction.
 It encrypt files or simply lock the system
It can be installed from an e-mail attachment, infected program or
compromised website
Examples
ILOVEYOU – 2000
Attacked millions of Windows computers
 It started spreading email message with the subject line "ILOVEYOU" and
the attachment "LOVE-LETTER-FOR-YOU.txt.vbs".
Opening the attachment activated the visual basic script.
Damage MP3 files, overwriting image files and automatically send itself to
all contact in a users address book.
Examples
C-Brain: January 1986
Damaged millions of personal computers.
Virus enters the machine memory once the PC is booted with the infected
floppy.
It infect other floppy disk accessed while it is in memory
It slow down disk access and cause timeouts, make disks unusable and
create data loss
Examples
Code Red & Code Red II – July 2001
The worm exploited a vulnerability that was found in machines running
Windows 2000 and Windows NT.
The worm spread itself using buffer overflow vulnerability
It launch DoS attacks, deface web sites and install remote backdoor
program
Ways To Avoid Malware
Use Antivirus software
Set up your computer for automatic software and OS updates
Disable Java Scripting and Flash in your web browser
Use Firewall software
Don't install or download unknown programs to your computer.
Never open an email from a stranger
Choose strong password for accounts
Use browser other than IE Explorer, such as Firefox or Opera