Your SlideShare is downloading. ×
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide
  • Drive-By Download - A program that is automatically installed in your computer by merely visiting a Web site, without having to explicitly click on a link on the page. Typically spyware that reports information back to the vendor, drive-by downloads are deployed by exploiting flaws in the browser and operating system code. Of course, Internet Explorer and Windows are the primary targets.
  • Transcript

    • 1. Viruses, Worms, Spyware, Phishing Explanation and Removal Tools By Adam Lamar
    • 2. Overview
      • Definitions
      • Symptoms
      • Prevention
      • Removal Tools
    • 3. What are Viruses?
      • Self-replicating software that causes system problems
      • May attach to another piece of software
      • Runs when opened
      • Affects the system in some way
        • Pranks
        • System damage or data loss
        • Compromises system security
    • 4. What are Worms?
      • Self-contained software that infects computer and attempts to spread to other computers
      • Usually spread over a network
        • May not require human interaction
        • Can spread very quickly
      • Spreads by way of system vulnerability
        • Un-patched machines are vulnerable
    • 5. What is Spyware?
      • Secretly gathers information about the user and sends to advertising agencies
        • Privacy concerns
      • May cause browser or network problems
        • Not able to access certain sites
        • Unwanted pop-ups
    • 6. What is Phishing?
      • An attempt to gather your personal information for malicious use
        • “ We suspect an unauthorized transaction on your account….
        • Please click the link below and confirm your identity”
      • “ Phisher” then uses information to steal money, identity, etc.
    • 7. Virus & Worm Symptoms
      • Strange behavior such as
        • Computer is slow
        • Hard disk is suddenly full
        • Unable to run or install certain software like anti-virus or firewall
        • A sudden increase in network traffic (network connection lights are constantly blinking)
        • Documents have been deleted or computer will not start
    • 8. Spyware Symptoms
      • Unable to access certain web sites
        • WebCT
        • Web-based email
        • Secure sites (HTTPS)
      • Often get unwanted pop-ups, even when not using your web browser
      • Network may suddenly not work at all
    • 9. Phishing Symptoms
      • You have provided personal information to a person or website claiming to be from a legitimate company
        • Unauthorized charges on your credit card
        • Loans or credit applied for in your name
        • Identity stolen
    • 10. Virus Prevention
      • Viruses often spread when a user opens a
        • File
        • Email
        • Instant Message
      • Don’t open anything from un-trusted and/or unexpected sources!
      • Run anti-virus software
        • Symantec Antivirus available at
        • Keep anti-virus definitions up-to-date
    • 11. Virus Prevention
      • Keep anti-virus definitions up-to-date
    • 12. Worm Prevention
      • Keep your systems patched
        • Automatic updates on Windows
        • Software Updates on OS X
      • Run a software firewall
        • Already included in most operating systems
        • Verify it is turned on!
      • Run up-to-date anti-virus software
      • Don’t connect computer directly to Internet
        • Use a hardware firewall or router
      • Run as a standard user instead of Administrator
        • Limits possible damage
    • 13. Worm Prevention
      • Ensure firewall software is running
    • 14. Spyware Prevention
      • Often obtained through “Drive-by Download” when browsing the web
        • Internet Explorer is primary target
      • Use an alternate, more secure web browser in Windows
        • Firefox
        • Opera
      • Use caution installing P2P or similar types of software as they often contain spyware
        • Kazaa
        • Bearshare
        • LimeWire
    • 15. Phishing Prevention
      • Do not reply to any request for personal information
        • Always type web addresses into your browser; do not click on address in email or instant message
      • Legitimate companies will normally not ask for personal information unless you contact them first
    • 16. Removal
      • Up-to-date anti-virus and a running firewall will catch many problems
      • Scan computers running Windows often with Ad-Aware or Spybot Search & Destroy
      • Free removal tools often available for specific malware problems
        • Microsoft’s Malicious Software Removal Tool
        • Free online virus scanning
        • See notes for links
      • Education is the best prevention
        • Read Bruce Schneier’s Safe Personal Computing (see notes)