SlideShare a Scribd company logo
1 of 1
Download to read offline
DESCRIPTION:
Sinks its teeth deep into your device modifying the operat-
ing system to hide itself. The goal of this malware is to
provide remote access or control of a computer without
being detected by users or security programs. It is a master
of stealth and can prevent itself from being displayed in the
list of system processes or prevent its files from being read.
These aren’t the monsters you heard about in campfire stories. These monsters are after your customer’s money,
personal information and resources. A large part of security is knowing the enemy. Let’s explore some of the most
common malware groups and how to defend against them:
UNDERSTANDING 5 COMMON MALWARE CATEGORIES
SO MSPS CAN BETTER PROTECT THEIR CUSTOMERS
root kits
CATEGORY:
DESCRIPTION:
Form of malware that holds a computer system captive
while demanding a ransom. The malware typically
restricts access by encrypting the contents of the hard
drive and displaying messages that are intended to force
the user to pay the malware creator.
ransomware
CATEGORY:
DESCRIPTION:
Exploits operating system vulnerabilities and spreads over
computer networks. Many worms are capable of creating
bot-nets out of infected computers using your CPU and
bandwidth for its own purposes such as DDoS.
TARGETS:
Money
SKILLS:
Hostage
Negotiation
DEFENSE:
Behavioral
Detection
worms
CATEGORY:
DESCRIPTION:
Prowls around for unprotected network devices and
bypasses normal authentication procedures to install
itself unknown to the user. Once this malware enters
your system it opens a back door to allow remote
access to your system leaving your data vulnerable to
remote intruders.
backdoors
how to tell if you’are infected:
security manager: av defender
INCREASE YOUR SECURITY IQ
Visit www.n-able.com to increase your Security IQ
CATEGORY:
DESCRIPTION:
Standalone malware program that disguises itself as a
well-known or helpful program (such as antivirus) in
order to convince a user to install it. This malware
attempts to access financial or personal information in
order to access financial accounts or sell information to
those who would.
rogueware
CATEGORY:
THE
IN YOUR COMPUTER
lurking
monsters
TARGETS:
Information
SKILLS:
Stealth
DEFENSE:
Heuristics
Algorithms
TARGETS:
Resources
SKILLS:
Replication
DEFENSE:
Avoid Spam
TARGETS:
Information
SKILLS:
Disguise
DEFENSE:
User
Management
TARGETS:
Information
SKILLS:
Stealth
DEFENSE:
Firewall
Increased resource usage
Slow computer
Freezing or crashing
New toolbars
Modified or deleted files
Emails sent without permission
Backdoors
File infectors
Greyware
Hijacker
Ransomware
Rogueware
Root kits
Spambots
Spyware
Trojans
Worms
BEHAVIORAL DETECTION
Monitors the behavior of
programs and processes and
prevents suspicious activity.
FULL MALWARE PROTECTION
HEURISTIC ALGORITHMS
Evaluates actions rather
than files and finds malware
before it executes.
USER MANAGEMENT
Users often invite malware into
the network meaning certain
user activity must be prevented.
© 2014 N-able Technologies, Inc. All rights reserved.
READ A WHITE PAPER WATCH THE VIDEO READ A CASE STUDY

More Related Content

What's hot

Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWAREWhiteHats
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the InternetBretz Harllynne Moltio
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attackAmna
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideSarah Roberts
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!aimane
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Malicion software
Malicion softwareMalicion software
Malicion softwareA. Shamel
 

What's hot (20)

Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
spyware
spywarespyware
spyware
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
MALWARE
MALWAREMALWARE
MALWARE
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
WEB ISOLATION
WEB ISOLATIONWEB ISOLATION
WEB ISOLATION
 
Aiman
AimanAiman
Aiman
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Spyware
SpywareSpyware
Spyware
 
Unit6
Unit6Unit6
Unit6
 
Ransomware
RansomwareRansomware
Ransomware
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 

Viewers also liked

Navigate 2014 Slideshow
Navigate 2014 SlideshowNavigate 2014 Slideshow
Navigate 2014 SlideshowContinuum
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersSolarwinds N-able
 
5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service deliverySolarwinds N-able
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPsSolarwinds N-able
 

Viewers also liked (6)

5 challenges infographic
5 challenges infographic5 challenges infographic
5 challenges infographic
 
Navigate 2014 Slideshow
Navigate 2014 SlideshowNavigate 2014 Slideshow
Navigate 2014 Slideshow
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales Producers
 
5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPs
 
MSP Business Plan in a Box
MSP Business Plan in a BoxMSP Business Plan in a Box
MSP Business Plan in a Box
 

Similar to The Monsters lurking in your computer

CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfKakai Catalan
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesAvinash Sinha
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsB R SOFTECH PVT LTD
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 

Similar to The Monsters lurking in your computer (20)

CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 
Cyber security
Cyber security Cyber security
Cyber security
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Computer virus
Computer virusComputer virus
Computer virus
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 

More from Solarwinds N-able

Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomSolarwinds N-able
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencySolarwinds N-able
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilitySolarwinds N-able
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinarSolarwinds N-able
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business managementSolarwinds N-able
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report ManagerSolarwinds N-able
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Solarwinds N-able
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsSolarwinds N-able
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptxSolarwinds N-able
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationSolarwinds N-able
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch managementSolarwinds N-able
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralSolarwinds N-able
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customersSolarwinds N-able
 
RMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingRMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingSolarwinds N-able
 
RMM 101 -- Workstation Management
RMM 101 -- Workstation ManagementRMM 101 -- Workstation Management
RMM 101 -- Workstation ManagementSolarwinds N-able
 
Automation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing HeadcountAutomation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing HeadcountSolarwinds N-able
 

More from Solarwinds N-able (20)

Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP Profitability
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinar
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business management
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report Manager
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
 
MSP Manager Launch Webinar
MSP Manager Launch WebinarMSP Manager Launch Webinar
MSP Manager Launch Webinar
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptx
 
Social Media for the MSP
Social Media for the MSPSocial Media for the MSP
Social Media for the MSP
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-central
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
 
RMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingRMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reporting
 
Rmm101 server management
Rmm101 server managementRmm101 server management
Rmm101 server management
 
RMM 101 -- Workstation Management
RMM 101 -- Workstation ManagementRMM 101 -- Workstation Management
RMM 101 -- Workstation Management
 
Automation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing HeadcountAutomation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing Headcount
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

The Monsters lurking in your computer

  • 1. DESCRIPTION: Sinks its teeth deep into your device modifying the operat- ing system to hide itself. The goal of this malware is to provide remote access or control of a computer without being detected by users or security programs. It is a master of stealth and can prevent itself from being displayed in the list of system processes or prevent its files from being read. These aren’t the monsters you heard about in campfire stories. These monsters are after your customer’s money, personal information and resources. A large part of security is knowing the enemy. Let’s explore some of the most common malware groups and how to defend against them: UNDERSTANDING 5 COMMON MALWARE CATEGORIES SO MSPS CAN BETTER PROTECT THEIR CUSTOMERS root kits CATEGORY: DESCRIPTION: Form of malware that holds a computer system captive while demanding a ransom. The malware typically restricts access by encrypting the contents of the hard drive and displaying messages that are intended to force the user to pay the malware creator. ransomware CATEGORY: DESCRIPTION: Exploits operating system vulnerabilities and spreads over computer networks. Many worms are capable of creating bot-nets out of infected computers using your CPU and bandwidth for its own purposes such as DDoS. TARGETS: Money SKILLS: Hostage Negotiation DEFENSE: Behavioral Detection worms CATEGORY: DESCRIPTION: Prowls around for unprotected network devices and bypasses normal authentication procedures to install itself unknown to the user. Once this malware enters your system it opens a back door to allow remote access to your system leaving your data vulnerable to remote intruders. backdoors how to tell if you’are infected: security manager: av defender INCREASE YOUR SECURITY IQ Visit www.n-able.com to increase your Security IQ CATEGORY: DESCRIPTION: Standalone malware program that disguises itself as a well-known or helpful program (such as antivirus) in order to convince a user to install it. This malware attempts to access financial or personal information in order to access financial accounts or sell information to those who would. rogueware CATEGORY: THE IN YOUR COMPUTER lurking monsters TARGETS: Information SKILLS: Stealth DEFENSE: Heuristics Algorithms TARGETS: Resources SKILLS: Replication DEFENSE: Avoid Spam TARGETS: Information SKILLS: Disguise DEFENSE: User Management TARGETS: Information SKILLS: Stealth DEFENSE: Firewall Increased resource usage Slow computer Freezing or crashing New toolbars Modified or deleted files Emails sent without permission Backdoors File infectors Greyware Hijacker Ransomware Rogueware Root kits Spambots Spyware Trojans Worms BEHAVIORAL DETECTION Monitors the behavior of programs and processes and prevents suspicious activity. FULL MALWARE PROTECTION HEURISTIC ALGORITHMS Evaluates actions rather than files and finds malware before it executes. USER MANAGEMENT Users often invite malware into the network meaning certain user activity must be prevented. © 2014 N-able Technologies, Inc. All rights reserved. READ A WHITE PAPER WATCH THE VIDEO READ A CASE STUDY