Malware Protection
description
Transcript of Malware Protection
![Page 1: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/1.jpg)
Malware ProtectionBy
Joshua T. I. Towers
![Page 2: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/2.jpg)
13.3
$13.3 billion was the direct cost of malware for business in 2006
“direct costs are defined as labor costs to analyze, repair and cleanse infected systems, loss of user productivity, loss of revenue due to loss or degraded performance of system, and other costs directly incurred as the result of a malware attack”
![Page 3: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/3.jpg)
http://www.computereconomics.com/article.cfm?id=1225
![Page 4: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/4.jpg)
29,354,532Microsoft desktop anti-malware products cleaned computers in the united states 29,354,532 times in 2009
![Page 5: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/5.jpg)
http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/
![Page 6: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/6.jpg)
What is Malware?
malware is “Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.”
- http://www.techterms.com/definition/malware
![Page 7: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/7.jpg)
Types of MalwareViruses
Worms
Trojan Horses
Spyware
RootKits
![Page 8: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/8.jpg)
Viruses
•Most well know form of malware
•Replicates self
•Attaches to files and emails
•Spreads from machine to machine http://www.computerfixx.biz/
allaboutinfections2.html
![Page 9: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/9.jpg)
Worm
•Replicates self
•Spreads through network traffic
•Attaches to files
http://israelmatzav.blogspot.com/2010/09/six-mysteries-about-stuxnet-computer.html
![Page 10: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/10.jpg)
Trojan Horses
•Can not replicate self•Disguised as interesting or useful programs or links•May drop off other forms of malware into your system
http://www.linux4windows.com/Articles/trojan_horse_software.html
![Page 11: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/11.jpg)
Spyware
•Can not replicate self•Usually hidden inside of other more appealing programs and links•Accesses personal info and transmits it back to its source
http://removingspywareeasy.com/
![Page 12: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/12.jpg)
RootKits
•Individual or collection of programs used to gain admin access with out being detected•Turns computers into zombies for the use of their creator
http://computer.howstuffworks.com/zombie-computer.htm
![Page 13: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/13.jpg)
Threats of MalwareEfficiency loss
Malware can remain active with out your knowledge and slow your computer or network down.
Open back doors A back door is a hole in a computers security
that can be used by either the creator or, other malware, or hackers.
![Page 14: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/14.jpg)
Threats of Malware cont.Stealing information
through the use of such tools as key loggers malware can steal personal information (passwords, credit card numbers, etc.)
Downloading of unwanted contentSome malware will download unwanted
content onto you computer
![Page 15: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/15.jpg)
Nature of MalwareEvolution
As time passes new different malicious acts are added to the repertoire of malware.
Expansion New malware is added to the long list all the
time
![Page 16: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/16.jpg)
DefenseSimple steps for basic protection against
malwareMake sure your fire wall is activeKeep your operating systems updatedKeep your anti-spyware software updatedKeep your anti-virus software updated Use strong passwords
![Page 17: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/17.jpg)
Anti-Virus SoftwareBitDefender AntivirusKaspersky Anit-Virus
Webroot AntivirusNorton AntiVirus
ESER Nod32 AntivirusAVG AntiVirus
G DATA AntiVirusAvira AntiVir
Vipre AntivirusTrend Micro Titanium
http://anti-virus-software-review.toptenreviews.com/ppc-index.html
![Page 18: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/18.jpg)
Criteria for choosingScope of Protection
Effectiveness
Ease of installation and setup
Ease of use
Features
Updates
Help and Support
![Page 19: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/19.jpg)
The RiddingSimple steps for the removal of some
malwareCreate a backup Scan for malwareClean the registryRun operating system updatesRemove any recently added hardware or
software
![Page 20: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/20.jpg)
If that doesn’t work“Safe Mode loads a “bare bones” version of
windows and disables 90% of viruses and their protection mechanisms.” - http://remove-malware.com/how-to/how-to-remove-malware-for-free/
And scan again
![Page 22: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/22.jpg)
IN CONCLUSION Malware protection is very important
![Page 23: Malware Protection](https://reader036.fdocuments.in/reader036/viewer/2022062815/5681687b550346895ddeef44/html5/thumbnails/23.jpg)
http://www.computereconomics.com/article.cfm?id=1225http://www.techterms.com/definition/malwarehttp://www.spamlaws.com/malware-types.htmlhttp://www.itsecurity.com/features/real-cost-of-malware-112807/http://www.cmsconnect.com/Marketing/viruscalc.htmhttp://support.microsoft.com/kb/129972http://www.webopedia.com/TERM/S/spyware.htmlhttp://www.best-spyware-removal.com/what-is-spywarehttp://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htmhttp://www.webopedia.com/DidYouKnow/Internet/2004/virus.asphttp://www.zsecurity.com/articles-rootkits.phphttp://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htmhttp://bigbluewater.com/blog/article/when-is-it-time-to-reload-your-operating-systemhttp://www.microsoft.com/security/pc-security/protect-pc.aspxhttp://remove-malware.com/how-to/how-to-remove-malware-for-free/http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/http://anti-virus-software-review.toptenreviews.com/ppc-index.htmlhttp://www.webroot.com/En_US/csc/malware.htmlhttp://en.wikipedia.org/wiki/Malwarehttp://www.zsecurity.com/articles-rootkits.php
References