* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Remote Domain Security Awareness Training
Unix security wikipedia , lookup
Computer security wikipedia , lookup
Trusted Computing wikipedia , lookup
Microsoft Security Essentials wikipedia , lookup
Antivirus software wikipedia , lookup
Computer virus wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Cybercrime countermeasures wikipedia , lookup
Antnomy of Malware Amruta Dubewar What is Malware? Origin of name Malware malicious software Malware is general term for any kind of unwanted software that is installed without your permission and damage to your computer Malware can be classified based on How they get executed How they spread What they do Types of Malware Viruses Worm Trojan Horse Spyware Adware Ransomware Rootkit Viruses Virus attach themselves to other software program and during the execution of that program the virus code gets executed. They are self-replicating computer programs How virus gets into your system? Social engineering Exploit vulnerabilities Effects of Viruses Stealing hard disk space or CPU time Access private information Corrupt data Spamming contacts May require a complete OS reinstallation to fix. Worms Worm is a standalone computer program and it replicates itself in order to spread to other computers It exploits security hole in software or the operating system. It uses computer network to spread itself Unlike a virus, it does not attach itself to an existing program Effects of Worm Major disruption by increasing network traffic Networks of such machines used by attacker for sending junk email Blackmail companies with threatened DoS attacks Trojan Horse Trojan horse is a very deceptive program, it appears harmless or even beneficial and trick users to install it For example, might look like an Android app for new game It does not have the ability to self replicate like viruses and worm. It spread through user interaction. Unlike viruses, it does not attach itself to existing program. Effects of Torjan Horse Modify or delete files Downloading and installing software Modifications of registry Use your computer as a part of Zombie Army or BOTNETS Spyware Spyware usually comes bundled with free software and automatically installs itself with the program It gathers information about person without their knowledge and send it to another party Effects of Sypware Install additional software Redirect Web browsers Logging keystrokes Change computer settings Stability issues Adware Adware is advertising-supported software It causes pop-up ads or banners to appear on your computer. It downloads to your computer when you access certain Internet sites, install certain freeware Rootkit Rootkit hide the fact that an operating system has been compromised Attacker obtain administrative access and install Rootkit Rootkit are very difficult to detect It allows the installation of hidden files, processes, hidden user accounts etc Ransomware It restricts access to the computer system and demands ransom to remove restriction. It encrypt files or simply lock the system It can be installed from an e-mail attachment, infected program or compromised website Examples ILOVEYOU – 2000 Attacked millions of Windows computers It started spreading email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". Opening the attachment activated the visual basic script. Damage MP3 files, overwriting image files and automatically send itself to all contact in a users address book. Examples C-Brain: January 1986 Damaged millions of personal computers. Virus enters the machine memory once the PC is booted with the infected floppy. It infect other floppy disk accessed while it is in memory It slow down disk access and cause timeouts, make disks unusable and create data loss Examples Code Red & Code Red II – July 2001 The worm exploited a vulnerability that was found in machines running Windows 2000 and Windows NT. The worm spread itself using buffer overflow vulnerability It launch DoS attacks, deface web sites and install remote backdoor program Ways To Avoid Malware Use Antivirus software Set up your computer for automatic software and OS updates Disable Java Scripting and Flash in your web browser Use Firewall software Don't install or download unknown programs to your computer. Never open an email from a stranger Choose strong password for accounts Use browser other than IE Explorer, such as Firefox or Opera