What is malware


Published on

Published in: Business, Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

What is malware

  1. 1. A presentation given Simon PellDirector Wardour Secure NetworksLtd at the BizGen Conference and Expo Lincoln
  2. 2. What is Malware? Are you protected?
  3. 3. All the various threats can be called Malware The word malware comes from thecombination of Malicious and software. It refers to viruses, worms, spyware,adware, hoaxes etc etc.
  4. 4. Did you know that over 90% of smallbusinesses have anti-virus solutions in place?Yet almost half are still getting attacked bye-threats!!
  5. 5. What’s a Virus?
  6. 6. A virus is a piece of code or software thatis designed to damage your files andprograms, they are designed to replicate andspread to other computers via email or acrossyour local area network (LAN).
  7. 7. What is a Trojan?
  8. 8. What is a Trojan? As the name suggests a trojan is a piece ofmalicious code disguised as an apparently harmlessprogram, which in many cases when run releases themalicious code hidden in it. Unlike viruses trojans do not self replicate, but likeviruses they are designed to destroy files or programs. Inmany cases they can capture and resend data to externaladdresses or open the PC to be controlled by remote users,referred to as @cyber-crooks, usually there to stealpasswords and banking information. Definitely not what asmall business needs.
  9. 9. What is a Worm? Worms are programs that make copies of themselves indifferent places in your PC. The object of this is to slow your PC or network down to make itunusable. Unlike viruses they do not infect files. Worms are usually spread using social engineering, they makethem to look attractive by use of attractive names to hide the files.Most popular names relate to sex, famous people, free softwareanything to make them seem appealing. Worms are more geared to make financial gain and bringnotoriety to the creator. Most recently reported in the press was the cornflicker virus.
  10. 10. What is a RootKit? These are programs designed to hide objects such as files, windows registry entries orprocesses. A rootkit itself is not malicious but is used by writers of malware to cover their tracks in infected computers. The first examples of malware using rootkits to hide themselves appeared in 2005.Spyware, Adware and Bots added thesecharacteristics to their own to try to avoiddetection.
  11. 11. Spyware/Adware Spyware and Adware are programs that display advertsassociated with the product or service being offered by the creator ofthe program. It can be installed in a number of ways, in many caseswithout the users consent or without knowledge of its function. The term Adware and Spyware can be controversial, as arule they are not used for criminal intent but to advertise products adservices. information collected does not include bank details butmore like web pages visited or favourites etc.
  12. 12. What are Cookies
  13. 13. What are Cookies Cookies are small text files stored on a computer by yourweb browser after visiting a web page. The information stored by thecookies has a number of uses. It can be used to personalise a webpage for the next time you visit, to collect demographic informationabout the visitors to the page or to monitor banner clicks. A good example is when you revisit a page and it says"Welcome back <your name>" such as Ebay or Amazon etc. While a cookie in itself is not malicious it could be used bymalicious code to affect a users privacy as it can create a usersprofile of browsing activity and send it to third parties.
  14. 14. SummaryVirus- Self replicates and infectsTrojan – Does NOT Self Replicate and infectsWorm – Copies itself to various parts of a computer , DOESNOT infect.Rootkit – Does not replicate and does not itself infect.Cookies – Text File that stores information.Spyware/ Adware – Advertise products to the user based onsites visited.
  15. 15. Protection Always use a reliable security program orregime KEEP IT UPTO DATE Dont download content from pages unless youare confident of their reliability. Keep a close eye on all downloads made withinyour network, as a small business you are liable forthe employees use of the internet. Use a good firewall. If you are unsure seek advise and DONT PANIC!!!
  16. 16. Firewalls
  17. 17. Firewalls Watchguard
  18. 18. Firewalls are usually hardware devicesdesigned to protect your network fromintrusion, unauthorised access and more.
  19. 19. FAQ1.Will it slow my connection to the internet?2.Can I still access websites?3.Can I still send and receive emails?4.Can I still watch YouTube or access facebook/Twitter?
  20. 20. Slowness: with the right firewall configurationyou shouldn’t notice any change toperformance.Websites: can still be accessed but you cancontrol what employees look at.Emails: are still sent and received but you canreduce spam.Social Media: can still be accessed but youcan control it better.
  21. 21. UTM SuiteUTM is unified threat management.Application ControlReputation Enabled DefenceWebBlockerSpamBlockerGateway AntiVirusIntrusion Prevention
  22. 22. Application Control
  23. 23. With XTM application control you canblock more than 1800 web and businessapplications. More precisely you can control access tomore than 1800 web and businessapplications. You can BLOCK, ALLOW and REPORTon who has access to what.
  24. 24. How will a firewall benefit a companyReduces time wasted by workersImproved productivityPrevent malware or illegal downloads
  25. 25. BizMidlands.co.uk