malware spyware & viruses overview what does it look like? what is it? how can you prevent...

18
Malware Spyware & Viruses

Upload: conrad-rodgers

Post on 25-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

Malware

Spyware

& Viruses

Page 2: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

OverviewOverviewWhat does it look like?What does it look like?

What is it?What is it?

How can you prevent it?How can you prevent it?

What can you do about it What can you do about it when you get it?when you get it?

Page 3: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

What’s wrong with

my computer ?

Page 4: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

Symptoms of MalwareSymptoms of Malware

Pop-up adds increasePop-up adds increase Home page changes without your consentHome page changes without your consent Unusually S-L-O-W systemUnusually S-L-O-W system Screen image does unusual things (upside Screen image does unusual things (upside

down/reverses)down/reverses) Rude messages may appearRude messages may appear Unknown icons appear in the Unknown icons appear in the

bottom of the screenbottom of the screen

Page 5: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

MALWAREMALWARE

Name of the “bad Name of the “bad stuff” that gets into stuff” that gets into your computer. your computer.

And there is all kinds of bad stuff out there!!

Page 6: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

Adware is annoying.Adware is annoying.

But serious danger to your But serious danger to your computer lies in computer lies in

Viruses &Viruses &

SpywareSpyware

Page 7: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

VIRUSVIRUS

Computer viruses, Computer viruses, like biological like biological viruses, can viruses, can replicate replicate themselves.themselves.

Page 8: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

Viruses can take over Viruses can take over your computer.your computer.

Page 9: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

Serious Consequences of VirusesSerious Consequences of Viruses

Virus - a hidden program that reproduces Virus - a hidden program that reproduces and destroys portions of a computer’s and destroys portions of a computer’s storage, memory or network:storage, memory or network:

Infects files (hard drives & floppy drives)Infects files (hard drives & floppy drives) Invades operating systemsInvades operating systems Targets memory storage (RAM & boot Targets memory storage (RAM & boot

sectors)sectors)

Page 10: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

SPYWARESPYWARE

malicious tracking of malicious tracking of software that users software that users are unaware of.are unaware of.

Page 11: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

Serious Consequences of SpywareSerious Consequences of Spyware

Spyware - hidden software that Spyware - hidden software that tracks user’s Internet habits:tracks user’s Internet habits:

Can lead to identity theft!Can lead to identity theft! Steals personal information & Steals personal information &

address bookaddress book Uses your computer as a secret Uses your computer as a secret

server to broadcast undesirable files server to broadcast undesirable files (i.e., pornography)(i.e., pornography)

Page 12: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

How can I prevent it?How can I prevent it? PasswordsPasswords

Don’t know = Don’t openDon’t know = Don’t open

Avoid Spam Advertised ProductsAvoid Spam Advertised Products

Pop-up BoxesPop-up Boxes

Use Safe BrowsersUse Safe Browsers– Firefox / OperaFirefox / Opera

Page 13: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

How can I prevent it?How can I prevent it?

Install security software /$$$Install security software /$$$– Anti-virusAnti-virus– Anti-spywareAnti-spyware– FirewallFirewall

Page 14: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

How can I prevent it?How can I prevent it?

Download /install security updates Download /install security updates and patchesand patches

Page 15: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Page 16: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

Computer Clean-UpComputer Clean-Up

Remove any programs that you do not Remove any programs that you do not need or did not add.need or did not add.

Restart your computer in safe mode.Restart your computer in safe mode. Disable the system’s restore.Disable the system’s restore. Clear the cache of cookies.Clear the cache of cookies. Run a virus scan.Run a virus scan. Update the computer’s virus protection. Update the computer’s virus protection. Back up your files.Back up your files.

Page 17: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

REFERENCES REFERENCES

Department of Academic Information Technology. (2007). Department of Academic Information Technology. (2007). Malware: The Enemy Within.Malware: The Enemy Within. 1-4. 1-4.

Retrieved from http://www.brooklyn.cuny.eduRetrieved from http://www.brooklyn.cuny.edu

McAfee, Inc. (2008). McAfee, Inc. (2008). McAfee’s 10-Step Internet Safety Plan for Your Family.McAfee’s 10-Step Internet Safety Plan for Your Family. [Power Point Slides]. [Power Point Slides]. Retrieved from Online Web Site: Retrieved from Online Web Site: http://usmcafee.com/en-us/local/docs/McAfeeInternetSafetyPlan.pdfhttp://usmcafee.com/en-us/local/docs/McAfeeInternetSafetyPlan.pdf

Mystic Network Solutions. Mystic Network Solutions. How Do I Remove Viruses From My Computer?.How Do I Remove Viruses From My Computer?. Retrieved March 2, 2009 Retrieved March 2, 2009 from the World Wide Web: from the World Wide Web: http://mysticnetworks.com/uploads/How_Do_I_remove_viruses_from_my_computerhttp://mysticnetworks.com/uploads/How_Do_I_remove_viruses_from_my_computer..

Net for Beginners. (2009, January). Net for Beginners. (2009, January). Spyware-Malware 101.Spyware-Malware 101. 1-2. Retrieved from http:// 1-2. Retrieved from http://

www.netforbeginners.about.comwww.netforbeginners.about.com

NewsTiger Direct. (2007, January). NewsTiger Direct. (2007, January). Viruses, Spyware and Malware.Viruses, Spyware and Malware. 1-10. Retrieved from 1-10. Retrieved from

http://www.news.tigerdirct.com/2007http://www.news.tigerdirct.com/2007

Primeweb Computer and Website Services. Primeweb Computer and Website Services. Computer Clean Up Tutorial. Computer Clean Up Tutorial. Retrieved March 2, 2009 Retrieved March 2, 2009 from the World Wide Web: http://www.primeweb.ca/docs/computer_clean_up_tutorial.docfrom the World Wide Web: http://www.primeweb.ca/docs/computer_clean_up_tutorial.doc

Page 18: Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

REFERENCES CONTINUEDREFERENCES CONTINUED

Spyware Prevent Guide. Spyware Prevent Guide. Retrieved March 2, 2009 from: Retrieved March 2, 2009 from: http://geekgirls.com/security_spyware_prevention.htmlhttp://geekgirls.com/security_spyware_prevention.html

Ten Steps to Malware Prevention.Ten Steps to Malware Prevention. Retrieved March 2, 2009 from: http://www.malwarehelp.org/ten- Retrieved March 2, 2009 from: http://www.malwarehelp.org/ten-steps-to-malware-prevention-part-1.htmlsteps-to-malware-prevention-part-1.html

University of Vermont. University of Vermont. Safe Computing Malware Clean-up GuideSafe Computing Malware Clean-up Guide. January 18, 2005. http://. January 18, 2005. http:// www.uvm.edu/cit/safecomputing/MalwareRemovalGuide.www.uvm.edu/cit/safecomputing/MalwareRemovalGuide.