Your SlideShare is downloading. ×
Digital Enemies
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Digital Enemies

714
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
714
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Digital Enemies CC CL Abdul Lateef Khan Millennium Toastmasters August 28, 2007
  • 2. Our Goals
    • What is Malware?
    • Examples of Malware
    • Spam-malware
    • Blended Threat
    • Safety Measures
  • 3. Malware
    • Malicious software
    • Set of coded instructions
    • Corrupt files, alter/delete data, distrubute confidential data
    • Disable hardware
    • Deny legitimate user access
    • Cause a hard drive to crash
  • 4. Examples of Malware
    • Viruses
    • - self replicate within computers & network
    • - alter files and data
    • - usually require some action from user
    • Worms
    • - replicate itself
    • - do not alter file, resides in memory
    • - infect a computer without any user interaction
  • 5. Examples of Malware
    • Trojans
    • - hidden within innocuous program/data
    • - create backdoors and access personal data
    • - do not self replicate
    • Browser hijackers
    • - alter browser settings
    • - alter default home page/search pages
    • - add bookmarks/pop ups/redirect URL’s
  • 6. Serious Threats
    • Spam – Malware
    • - malware and spam working together
    • - unwanted e – mails
    • - unsolicited / sent in bulk
    • Blended Threat
    • - bundles the worst of viruses, worms, Trojan etc.
    • - can initiates, transmit & attack by itself
    • - transport multiple attack in one payload
  • 7. Overview
  • 8. Safety Measures
  • 9. Safety Measures
    • Keep Operating System up-to-date
    • Install Anti Virus
    • Have a Firewall
    • - Hardware
    • - Software
    • Antispyware
    • Install updates
  • 10.  
  • 11.