Digital Enemies

931 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
931
On SlideShare
0
From Embeds
0
Number of Embeds
21
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Digital Enemies

  1. 1. Digital Enemies CC CL Abdul Lateef Khan Millennium Toastmasters August 28, 2007
  2. 2. Our Goals <ul><li>What is Malware? </li></ul><ul><li>Examples of Malware </li></ul><ul><li>Spam-malware </li></ul><ul><li>Blended Threat </li></ul><ul><li>Safety Measures </li></ul>
  3. 3. Malware <ul><li>Malicious software </li></ul><ul><li>Set of coded instructions </li></ul><ul><li>Corrupt files, alter/delete data, distrubute confidential data </li></ul><ul><li>Disable hardware </li></ul><ul><li>Deny legitimate user access </li></ul><ul><li>Cause a hard drive to crash </li></ul>
  4. 4. Examples of Malware <ul><li>Viruses </li></ul><ul><li>- self replicate within computers & network </li></ul><ul><li>- alter files and data </li></ul><ul><li>- usually require some action from user </li></ul><ul><li>Worms </li></ul><ul><li>- replicate itself </li></ul><ul><li>- do not alter file, resides in memory </li></ul><ul><li>- infect a computer without any user interaction </li></ul>
  5. 5. Examples of Malware <ul><li>Trojans </li></ul><ul><li>- hidden within innocuous program/data </li></ul><ul><li>- create backdoors and access personal data </li></ul><ul><li>- do not self replicate </li></ul><ul><li>Browser hijackers </li></ul><ul><li>- alter browser settings </li></ul><ul><li>- alter default home page/search pages </li></ul><ul><li>- add bookmarks/pop ups/redirect URL’s </li></ul>
  6. 6. Serious Threats <ul><li>Spam – Malware </li></ul><ul><li>- malware and spam working together </li></ul><ul><li>- unwanted e – mails </li></ul><ul><li>- unsolicited / sent in bulk </li></ul><ul><li>Blended Threat </li></ul><ul><li>- bundles the worst of viruses, worms, Trojan etc. </li></ul><ul><li>- can initiates, transmit & attack by itself </li></ul><ul><li>- transport multiple attack in one payload </li></ul>
  7. 7. Overview
  8. 8. Safety Measures
  9. 9. Safety Measures <ul><li>Keep Operating System up-to-date </li></ul><ul><li>Install Anti Virus </li></ul><ul><li>Have a Firewall </li></ul><ul><li>- Hardware </li></ul><ul><li>- Software </li></ul><ul><li>Antispyware </li></ul><ul><li>Install updates </li></ul>

×