malware protection

23
Malware Protection By Joshua T. I. Towers

Upload: mckile

Post on 25-Feb-2016

42 views

Category:

Documents


0 download

DESCRIPTION

Malware Protection. By Joshua T. I. Towers. 13.3. $13.3 billion was the direct cost of malware for business in 2006 - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Malware Protection

Malware ProtectionBy

Joshua T. I. Towers

Page 2: Malware Protection

13.3

$13.3 billion was the direct cost of malware for business in 2006

“direct costs are defined as labor costs to analyze, repair and cleanse infected systems, loss of user productivity, loss of revenue due to loss or degraded performance of system, and other costs directly incurred as the result of a malware attack”

Page 3: Malware Protection

http://www.computereconomics.com/article.cfm?id=1225

Page 4: Malware Protection

29,354,532Microsoft desktop anti-malware products cleaned computers in the united states 29,354,532 times in 2009

Page 5: Malware Protection

http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/

Page 6: Malware Protection

What is Malware?

malware is “Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.”

- http://www.techterms.com/definition/malware

Page 7: Malware Protection

Types of MalwareViruses

Worms

Trojan Horses

Spyware

RootKits

Page 8: Malware Protection

Viruses

•Most well know form of malware

•Replicates self

•Attaches to files and emails

•Spreads from machine to machine http://www.computerfixx.biz/

allaboutinfections2.html

Page 9: Malware Protection

Worm

•Replicates self

•Spreads through network traffic

•Attaches to files

http://israelmatzav.blogspot.com/2010/09/six-mysteries-about-stuxnet-computer.html

Page 10: Malware Protection

Trojan Horses

•Can not replicate self•Disguised as interesting or useful programs or links•May drop off other forms of malware into your system

http://www.linux4windows.com/Articles/trojan_horse_software.html

Page 11: Malware Protection

Spyware

•Can not replicate self•Usually hidden inside of other more appealing programs and links•Accesses personal info and transmits it back to its source

http://removingspywareeasy.com/

Page 12: Malware Protection

RootKits

•Individual or collection of programs used to gain admin access with out being detected•Turns computers into zombies for the use of their creator

http://computer.howstuffworks.com/zombie-computer.htm

Page 13: Malware Protection

Threats of MalwareEfficiency loss

Malware can remain active with out your knowledge and slow your computer or network down.

Open back doors A back door is a hole in a computers security

that can be used by either the creator or, other malware, or hackers.

Page 14: Malware Protection

Threats of Malware cont.Stealing information

through the use of such tools as key loggers malware can steal personal information (passwords, credit card numbers, etc.)

Downloading of unwanted contentSome malware will download unwanted

content onto you computer

Page 15: Malware Protection

Nature of MalwareEvolution

As time passes new different malicious acts are added to the repertoire of malware.

Expansion New malware is added to the long list all the

time

Page 16: Malware Protection

DefenseSimple steps for basic protection against

malwareMake sure your fire wall is activeKeep your operating systems updatedKeep your anti-spyware software updatedKeep your anti-virus software updated Use strong passwords

Page 17: Malware Protection

Anti-Virus SoftwareBitDefender AntivirusKaspersky Anit-Virus

Webroot AntivirusNorton AntiVirus

ESER Nod32 AntivirusAVG AntiVirus

G DATA AntiVirusAvira AntiVir

Vipre AntivirusTrend Micro Titanium

http://anti-virus-software-review.toptenreviews.com/ppc-index.html

Page 18: Malware Protection

Criteria for choosingScope of Protection

Effectiveness

Ease of installation and setup

Ease of use

Features

Updates

Help and Support

Page 19: Malware Protection

The RiddingSimple steps for the removal of some

malwareCreate a backup Scan for malwareClean the registryRun operating system updatesRemove any recently added hardware or

software

Page 20: Malware Protection

If that doesn’t work“Safe Mode loads a “bare bones” version of

windows and disables 90% of viruses and their protection mechanisms.” - http://remove-malware.com/how-to/how-to-remove-malware-for-free/

And scan again

Page 21: Malware Protection

Whether those steps work or not there are

COSTS

Page 22: Malware Protection

IN CONCLUSION Malware protection is very important

Page 23: Malware Protection

http://www.computereconomics.com/article.cfm?id=1225http://www.techterms.com/definition/malwarehttp://www.spamlaws.com/malware-types.htmlhttp://www.itsecurity.com/features/real-cost-of-malware-112807/http://www.cmsconnect.com/Marketing/viruscalc.htmhttp://support.microsoft.com/kb/129972http://www.webopedia.com/TERM/S/spyware.htmlhttp://www.best-spyware-removal.com/what-is-spywarehttp://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htmhttp://www.webopedia.com/DidYouKnow/Internet/2004/virus.asphttp://www.zsecurity.com/articles-rootkits.phphttp://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htmhttp://bigbluewater.com/blog/article/when-is-it-time-to-reload-your-operating-systemhttp://www.microsoft.com/security/pc-security/protect-pc.aspxhttp://remove-malware.com/how-to/how-to-remove-malware-for-free/http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/http://anti-virus-software-review.toptenreviews.com/ppc-index.htmlhttp://www.webroot.com/En_US/csc/malware.htmlhttp://en.wikipedia.org/wiki/Malwarehttp://www.zsecurity.com/articles-rootkits.php

References