common malware and countermeasures
DESCRIPTION
Security Awareness related to common malwares, (viruses, trojans, worms etc) the damages they cause and basic countermeasures one can adopt to protect against them.TRANSCRIPT
![Page 1: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/1.jpg)
COMMON MALWARE and COUNTERMEASURES
![Page 2: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/2.jpg)
MALWARE(Malicious-Software)
Ask yourself this. This power point presentation is named
malware. Did you run a scan on it before opening.?
![Page 3: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/3.jpg)
A Malware is a specific set of codes or an application , specifically designed to harm and/or to gain access to a targeted computer , or spread across multiple computers ; over the use of a network or a data storage device.
MALWARE DEFINED
![Page 4: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/4.jpg)
Malware is a Malicious SoftwareAs old as the Software itselfAny harmful piece of program.
DIFFERENCE TYPES OF MALWARES
![Page 5: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/5.jpg)
Virus Worm Trojan horse Spyware Phishing
TYPES OF MALWARE
![Page 6: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/6.jpg)
The first malware was a VirusIt Appeared in the realms of computer were ELK Cloner and Brain virus.
The “ELK Cloner” virus appeared on Apple MAC in 1982 , and was created by Rich Skrenta from Pennsylvania, United States.
FIRST MALWARE OF THE WORLD
![Page 7: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/7.jpg)
FIRST MOST DAMAGING VIRUS OF WORLD
The Brain virus was programmed by two brothers ; Amjad Farooq Alvi and Basit Farooq Alvi , from Lahore Pakistan in 1986.
![Page 8: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/8.jpg)
1990 focused targeting on colleges and universities
Mid 20th century started targeting businesses
After the year 2000 target was The Internet !
To attack or takedown websites• Destroying the online presence and credibility.• Financial Theft.
BRIEF HISTORY OF MALWARES.
![Page 9: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/9.jpg)
BRIEF HISTORY OF MALWARES.The “Worn Outbreak ERA”From 2000-2003
The “WEB THREAT ERA”From 2004-2008
![Page 10: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/10.jpg)
Current Era of Malwares as termed by experts:
BRIEF HISTORY OF MALWARES.
![Page 11: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/11.jpg)
Other EXAMPLES OF MALWARE.
![Page 12: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/12.jpg)
Evolution of Malware over (2003-2010):
STATISTICS ; MALWARE ; Evolution.
![Page 13: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/13.jpg)
TYPES of MALWARE EXPLAINED
![Page 14: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/14.jpg)
Virus replicates into the network by creating copies of itself in the computer files. ◦ Need a file to survive, infect and replicate
Virus is designed to damage or read data on computers or cause interruptions in work
Melissa virus is a top known virus.
VIRUS
![Page 15: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/15.jpg)
WORM
• Self duplicating malware that spreads out independently• Eats the Network• Famous of all time and first Worm– Morris Worm• Stuxtnet Worm !
![Page 16: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/16.jpg)
The Trojan Horse by the Greeks Hides in a legitimate software Tricks users to install it Gains privileged access to the OS Makes a botnet Non self replicating NetBus is a well known trojan from 1988
TROJAN
![Page 17: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/17.jpg)
As the name suggests SPYware! Steals information Hard to detect SpyAnytime, CASE, GATOR are spywares
Spyware
![Page 18: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/18.jpg)
Pretend Play! Get financial or personal information Corporate espionage Fake calls and emails Common target today is social networking sites
PHISHING
![Page 19: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/19.jpg)
Malwares will always be Chasing you!
Adopt layers of security for defense
◦ Anti Virus and Scans ◦ Install software from trusted vendors◦ Avoid opening unknown attachments◦ Do not insert media on known infected
computer◦ Clean out old files
KEEP YOUR GUARD UP
![Page 20: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/20.jpg)
Keep up your security shields
◦ Always re confirm source◦ Monitor network traffic◦ Audit logs◦ Keep OS updated◦ All other common security measures
KEEP YOUR GUARD UP
![Page 21: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/21.jpg)
Malwares are now not restricted to computers only , these have made their way into the world of cell phones and tablets.Major affecting the mobiles containing the Android and IOS operating system.
MALWARE ; NOT RESTRICTED TO COMPUTERS
![Page 22: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/22.jpg)
STATISTICS ; MALWARE , Type.
Malware Distribution by type:
![Page 23: Common malware and countermeasures](https://reader035.vdocument.in/reader035/viewer/2022062312/554d2805b4c905ca208b504d/html5/thumbnails/23.jpg)
In order to countermeasure the threats of malware , the user should:
SUMMARY for COUNTERMEASURES
• Installing Anti-Malware Applications.
• Often Get the data drive Scan and analyzed.
• Gaining basic knowledge about the way malwares work.
• Installing Basic internet Security Applications.