Your SlideShare is downloading. ×
support.uidaho.edu
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

support.uidaho.edu

439
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
439
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • http://www.helpdesk.uidaho.edu/CSAD/2005/PDF/Viruses%20Trojans%20and%20Worms%20-%20Oh%20My.pdf
  • http://www.mitre.org/news/digest/advanced_research/07_06/ar_detection.html http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
  • http://www.delamereservices.co.uk/articlespyware.htm
  • http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm http://www.zeromillion.com/email-marketing/Email-Phishing-Security.html
  • http://support.microsoft.com/kb/129972
  • Drive-By Download - A program that is automatically installed in your computer by merely visiting a Web site, without having to explicitly click on a link on the page. Typically spyware that reports information back to the vendor, drive-by downloads are deployed by exploiting flaws in the browser and operating system code. Of course, Internet Explorer and Windows are the primary targets. http://www.helpdesk.uidaho.edu/CSAD/2006/Terms.htm
  • http://www.schneier.com/blog/archives/2004/12/safe_personal_c.html http://www.microsoft.com/security/malwareremove/default.mspx http://www.symantec.com/security_response/writeup.jsp?docid=2003-081119-5051-99 http://housecall.trendmicro.com/
  • Transcript

    • 1. Viruses, Worms, Spyware, Phishing Explanation and Removal Tools By Adam Lamar
    • 2. Overview
      • Definitions
      • Symptoms
      • Prevention
      • Removal Tools
    • 3. What are Viruses?
      • Self-replicating software that causes system problems
      • May attach to another piece of software
      • Runs when opened
      • Affects the system in some way
        • Pranks
        • System damage or data loss
        • Compromises system security
    • 4. What are Worms?
      • Self-contained software that infects computer and attempts to spread to other computers
      • Usually spread over a network
        • May not require human interaction
        • Can spread very quickly
      • Spreads by way of system vulnerability
        • Un-patched machines are vulnerable
    • 5. What is Spyware?
      • Secretly gathers information about the user and sends to advertising agencies
        • Privacy concerns
      • May cause browser or network problems
        • Not able to access certain sites
        • Unwanted pop-ups
    • 6. What is Phishing?
      • An attempt to gather your personal information for malicious use
        • “ We suspect an unauthorized transaction on your account….
        • Please click the link below and confirm your identity”
      • “ Phisher” then uses information to steal money, identity, etc.
    • 7. Virus & Worm Symptoms
      • Strange behavior such as
        • Computer is slow
        • Hard disk is suddenly full
        • Unable to run or install certain software like anti-virus or firewall
        • A sudden increase in network traffic (network connection lights are constantly blinking)
        • Documents have been deleted or computer will not start
    • 8. Spyware Symptoms
      • Unable to access certain web sites
        • WebCT
        • Web-based email
        • Secure sites (HTTPS)
      • Often get unwanted pop-ups, even when not using your web browser
      • Network may suddenly not work at all
    • 9. Phishing Symptoms
      • You have provided personal information to a person or website claiming to be from a legitimate company
        • Unauthorized charges on your credit card
        • Loans or credit applied for in your name
        • Identity stolen
    • 10. Virus Prevention
      • Viruses often spread when a user opens a
        • File
        • Email
        • Instant Message
      • Don’t open anything from un-trusted and/or unexpected sources!
      • Run anti-virus software
        • Symantec Antivirus available at support.uidaho.edu
        • Keep anti-virus definitions up-to-date
    • 11. Virus Prevention
      • Keep anti-virus definitions up-to-date
    • 12. Worm Prevention
      • Keep your systems patched
        • Automatic updates on Windows
        • Software Updates on OS X
      • Run a software firewall
        • Already included in most operating systems
        • Verify it is turned on!
      • Run up-to-date anti-virus software
      • Don’t connect computer directly to Internet
        • Use a hardware firewall or router
      • Run as a standard user instead of Administrator
        • Limits possible damage
    • 13. Worm Prevention
      • Ensure firewall software is running
    • 14. Spyware Prevention
      • Often obtained through “Drive-by Download” when browsing the web
        • Internet Explorer is primary target
      • Use an alternate, more secure web browser in Windows
        • Firefox
        • Opera
      • Use caution installing P2P or similar types of software as they often contain spyware
        • Kazaa
        • Bearshare
        • LimeWire
    • 15. Phishing Prevention
      • Do not reply to any request for personal information
        • Always type web addresses into your browser; do not click on address in email or instant message
      • Legitimate companies will normally not ask for personal information unless you contact them first
    • 16. Removal
      • Up-to-date anti-virus and a running firewall will catch many problems
      • Scan computers running Windows often with Ad-Aware or Spybot Search & Destroy
      • Free removal tools often available for specific malware problems
        • Microsoft’s Malicious Software Removal Tool
        • Free online virus scanning
        • See notes for links
      • Education is the best prevention
        • Read Bruce Schneier’s Safe Personal Computing (see notes)