Your SlideShare is downloading. ×
0
Malicious Software and Internet Security<br />Viruses, Ad-ware, Spyware, Trojans and Worms<br />
Ways Malware Enters a System<br />
Viruses<br />Are malicious tools, fragments and software which spread themselves by human intervention to infect files or ...
Types of Viruses<br />
Polymorphic Viruses<br />
Stealth Viruses<br />
Retro Viruses<br />
Multipartite Viruses<br />
Armored Viruses<br />
Companion Viruses<br />
Phage Viruses<br />
Macro Viruses<br />
Things To Know About Viruses<br /><ul><li>Anti-Virus Software will not protect you from all viruses.
Treat infected computers the way you would a patient with a cold or a fever.
Viruses will mutate and spread if left untreated, and they will also reappear if infected files are left.
 Viruses can damage hardware as well as software.
Do not open files, folders, programs you do not recognize.
Always scan storage media before opening them up on a system.
Turn off auto-play on all system on a network.
Keep virus protection software up to date.
Make sure your anti-virus software protects you from mal-ware, ad-ware, and spyware not just viruses.
Scan all e-mail attachments. </li></li></ul><li>Viruses Cont’d<br />Research unknown files and software before deleting <b...
Spread of Viruses<br />
Worms<br />The goal of a worm is to infect other hosts and systems from the infected system so they can spread to system t...
Worms Vs. Viruses<br />
Parts of a Worm<br />
Steps to Mitigate Worm Attacks:<br />
Steps to Mitigate Worm Attacks Cont’d<br />
Trojan Horse Attacks<br />Masks malware as legitimate applications.  When this malware is installed into a system they rel...
Examples of Trojans<br />
Characteristics of Trojan Horses<br />
Symptoms of a Trojan Horse Attack<br />
SPAM<br />
Protection From SPAM<br />
Fight SPAM with E-Mail Organization<br />
Upcoming SlideShare
Loading in...5
×

Viruses and internet security

1,047

Published on

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,047
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
63
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Viruses and internet security"

  1. 1. Malicious Software and Internet Security<br />Viruses, Ad-ware, Spyware, Trojans and Worms<br />
  2. 2. Ways Malware Enters a System<br />
  3. 3. Viruses<br />Are malicious tools, fragments and software which spread themselves by human intervention to infect files or systems of a network. <br />
  4. 4. Types of Viruses<br />
  5. 5. Polymorphic Viruses<br />
  6. 6. Stealth Viruses<br />
  7. 7. Retro Viruses<br />
  8. 8. Multipartite Viruses<br />
  9. 9. Armored Viruses<br />
  10. 10. Companion Viruses<br />
  11. 11. Phage Viruses<br />
  12. 12. Macro Viruses<br />
  13. 13. Things To Know About Viruses<br /><ul><li>Anti-Virus Software will not protect you from all viruses.
  14. 14. Treat infected computers the way you would a patient with a cold or a fever.
  15. 15. Viruses will mutate and spread if left untreated, and they will also reappear if infected files are left.
  16. 16. Viruses can damage hardware as well as software.
  17. 17. Do not open files, folders, programs you do not recognize.
  18. 18. Always scan storage media before opening them up on a system.
  19. 19. Turn off auto-play on all system on a network.
  20. 20. Keep virus protection software up to date.
  21. 21. Make sure your anti-virus software protects you from mal-ware, ad-ware, and spyware not just viruses.
  22. 22. Scan all e-mail attachments. </li></li></ul><li>Viruses Cont’d<br />Research unknown files and software before deleting <br />Backup your computer and data before making major changes.<br />Back-up your registry if you plan to delete registry keys from it.<br />All viruses spread by HUMAN INTERVENTION <br />
  23. 23. Spread of Viruses<br />
  24. 24. Worms<br />The goal of a worm is to infect other hosts and systems from the infected system so they can spread to system to system without human intervention.<br />
  25. 25. Worms Vs. Viruses<br />
  26. 26. Parts of a Worm<br />
  27. 27. Steps to Mitigate Worm Attacks:<br />
  28. 28. Steps to Mitigate Worm Attacks Cont’d<br />
  29. 29. Trojan Horse Attacks<br />Masks malware as legitimate applications. When this malware is installed into a system they release malicious code and infect the whole system.<br />
  30. 30. Examples of Trojans<br />
  31. 31. Characteristics of Trojan Horses<br />
  32. 32. Symptoms of a Trojan Horse Attack<br />
  33. 33. SPAM<br />
  34. 34. Protection From SPAM<br />
  35. 35. Fight SPAM with E-Mail Organization<br />
  36. 36. Fight SPAM with E-Mail Organization Cont’d<br />
  37. 37. Phishing Attacks<br />
  38. 38. Do not provide the following on unsecure sites, through instant messaging, unknown emails and pop-up ads:<br />
  39. 39. Spy-Ware and Ad-Ware<br />
  40. 40. Protection From Spy-Ware<br />
  41. 41. Other Mal-Ware Categories<br />
  42. 42. Other Mal-Ware Cont’d<br />
  43. 43. Next Week<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×