Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Malware & Safe Browsing

975 views

Published on

Presentation I put together for ACADEMIC purposes, I do not claim ownership or copyright on any of the images.

Published in: Technology
  • Be the first to comment

Malware & Safe Browsing

  1. 1. The Internet is Scary <ul><li>by: Joshua Swift </li></ul><ul><li>What kind of risks are there? </li></ul><ul><li>How to detect problem programs </li></ul><ul><li>Prevent problems before they happen </li></ul>
  2. 2. STOP!
  3. 3. Top 5 Excuses <ul><li>I don't have anything valuable on my computer anyway </li></ul><ul><li>Running a firewall slows down my computer or video games </li></ul><ul><li>The programs are too complicated </li></ul><ul><li>I am broke and programs are expensive </li></ul><ul><li>I have never used security programs and have never been infected </li></ul>
  4. 4. Risk by Country (2010)
  5. 5. Types of Malware <ul><li>Virus </li></ul><ul><ul><li>Self-replicating </li></ul></ul><ul><ul><li>General term for “malware” </li></ul></ul><ul><li>Worm </li></ul><ul><ul><li>Self-contained virus </li></ul></ul><ul><ul><li>Works in conjunction with other viruses </li></ul></ul><ul><li>Trojan </li></ul><ul><ul><li>Disguised at legitimate software </li></ul></ul>
  6. 6. Spy vs. Spy
  7. 7. Spyware <ul><li>Secretly monitors anything and everything you do </li></ul><ul><li>Estimated 90% of computers infected </li></ul><ul><li>Bundled with legitimate software </li></ul><ul><li>Keyloggers, Screenloggers, Rootkits </li></ul><ul><li>Tracking cookies (i.e. EverCookie) </li></ul>
  8. 8. Ads run amok
  9. 9. Adware <ul><li>Pop-up advertisements </li></ul><ul><li>Hijacks web browser homepage </li></ul><ul><li>Sends spam using your email </li></ul><ul><li>Slows down computer or makes it unusable </li></ul><ul><li>Usually just annoying, but may be bundled with other viruses </li></ul>
  10. 10. Fake Alerts
  11. 11. Scareware <ul><li>Otherwise known as Ransomware </li></ul><ul><li>Meant to shock and threaten users, causing anxiety or panic </li></ul><ul><li>Holds computer hostage, demanding extortion for restoration </li></ul><ul><li>Threat is usually fictional and fix is virus itself </li></ul><ul><li>Typically behave like legitimate anti-virus or firewall program </li></ul>
  12. 12. Security Programs
  13. 13. Detection & Response <ul><li>Anti-Virus </li></ul><ul><li>Anti-Spyware </li></ul><ul><ul><li>Scans computer and cleans infections </li></ul></ul><ul><li>Firewalls </li></ul><ul><ul><li>Prevents attackers from in-bound and/or out-bound communication </li></ul></ul><ul><ul><li>Alerts users of suspicious internet activity </li></ul></ul>
  14. 14. Free Programs <ul><li>Anti-Virus </li></ul><ul><ul><li>AVG Free Edition </li></ul></ul><ul><ul><li>Avast! </li></ul></ul><ul><ul><li>Kaspersky </li></ul></ul><ul><ul><li>Trend Micro HouseCall </li></ul></ul><ul><ul><li>Panda ActiveScan </li></ul></ul><ul><ul><li>Microsoft Security Essentials </li></ul></ul>
  15. 15. Free Programs (cont.) <ul><li>Anti-Spyware </li></ul><ul><ul><li>Spybot Search & Destroy </li></ul></ul><ul><ul><li>Malwarebytes </li></ul></ul><ul><ul><li>SUPERAntiSpyware </li></ul></ul><ul><ul><li>Ad-Aware </li></ul></ul><ul><ul><li>Spyware Doctor </li></ul></ul>
  16. 16. Free Programs (cont.) <ul><li>Firewall </li></ul><ul><ul><li>ZoneAlarm </li></ul></ul><ul><ul><li>Comodo </li></ul></ul><ul><ul><li>Outpost </li></ul></ul><ul><ul><li>OnlineArmor </li></ul></ul><ul><ul><li>PrivateFirewall </li></ul></ul><ul><ul><li>Windows Firewall </li></ul></ul>
  17. 17. Prevention <ul><li>It's obvious: better to prevent viruses than fix them . </li></ul><ul><li>Why? The going rate for clean-up is $150 </li></ul><ul><li>Safe browsing practices </li></ul><ul><ul><li>Know what to avoid </li></ul></ul><ul><ul><li>Disable vulnerable plugins or applications </li></ul></ul><ul><ul><li>Update! Update! Update! </li></ul></ul>
  18. 18. Web Browsers
  19. 19. Safe Browsing <ul><li>Do not open e-mails or attachments from users you do not know </li></ul><ul><li>Never open .exe , .pif or .bat files unless you specifically know the files are clean </li></ul><ul><li>Do not click spam, pop-ups, or ads in general </li></ul><ul><li>Some pop-ups may look like windows saying your computer is “unsafe” </li></ul>
  20. 20. Windows Update (XP)
  21. 21. Windows Update (7)
  22. 22. Safe Browsing (cont.) <ul><li>Do not visit ethically questionable sites </li></ul><ul><ul><li>WAREZ, CRACKZ, SERIALZ & PORN </li></ul></ul><ul><li>Download from trusted sites only </li></ul><ul><li>Religiously update your web browser, browser plugins, virus definitions and operating system </li></ul><ul><li>Disable Cookies, JavaScript, Flash & ActiveX (use plugins like NoScript & Adblock) </li></ul>
  23. 23. Password Re-use http://passwordmaker.org/
  24. 24. Computer Insecurity (final thoughts) <ul><li>Security is lacking in general, so don't be embarrassed if you get hacked </li></ul><ul><li>When there is a will, there is a way . All security software does is place speed-bumps before determined hackers </li></ul><ul><li>Security by obscurity is not security! </li></ul><ul><li>A little knowledge can go a long way for your sanity and wallet </li></ul>

×