SlideShare a Scribd company logo
1 of 16
The Future of PC
             Protection


1   The Presentation is sole property of Aspenmas and cannot be used without permission.
When do you see a
                                   Virus or Malware?

    • After it is in your PC and already effecting your
      machine, right.

    • How does a virus really infect and effect your machine?

    • The virus or malware is an executable piece of program that
      runs in your machine. Everything that happens on your PC
      is a program execution of some form or another.

    • Most of these executions are good and some are bad.


2      The Presentation is sole property of Aspenmas and cannot be used without permission.
What are some of the primary characteristics
          of the current malware today?
    • Sources: All media forms, usually controlled by a Botnet.

    • Who’s the target: Anyone, any company any individual.

    • What happens to a typical victim:
      1     System is compromised
      2     Information is stolen, sold, exploited.
      3     PC is subjugated to a bot-network.

    • What does an Infection look like:
      1     Primary objective is to remain unseen.
      2     Make tracking almost impossible.
      3     Setup shop and not effect the PC operation.
      4     Your PC is then controlled by the Botnet.
3      The Presentation is sole property of Aspenmas and cannot be used without permission.
A Little Analysis
    • So when you see a problem, there has been an execution of a
      program.

    • What else can be associated with this execution event?

    • There can be several:
    • First, the piece of code or program that was run. This is called a
      “binary”.

    • Second might be a file copied or saved and the address or path.

    • The Third association, to the event, is the preceding or “parent
      event”.

    • So now we have a parent event and the child event that we found
      from the original problem we discovered.
4      The Presentation is sole property of Aspenmas and cannot be used without permission.
What is the “binary” that is associated
                      with an event?

    • Bottom line is, it is a program. It might be MS Word or
      Outlook or your browser or anything else has been
      installed or run on your PC.

    • What does a virus binary do?
    • Basically, it can do anything that any other program can do.

    • It can copy itself from place to place.

    • It can attach itself to other binaries, in order to hide, like a
      windows system file or other programs.

    • It can even delete files or itself and, if it want to, it could
      destroy your entire hard drive.
5       The Presentation is sole property of Aspenmas and cannot be used without permission.
So what can we do with this information?

    • If we knew all of the events, we can trace from one event to
      another.

    • If we have each of the original “binaries” we can do three
      things.

    1. We can replace a damaged binary with the original one.
    2. We can compare this binary to know bad programs.
    3. We could see the original malware or virus when it
           entered the PC and its source point.


6      The Presentation is sole property of Aspenmas and cannot be used without permission.
The original event Discovered
                                                               while using the PC (O.E.)




7   The Presentation is sole property of Aspenmas and cannot be used without permission.
O.E.

                Parent event.
                (P.E.)




8   The Presentation is sole property of Aspenmas and cannot be used without permission.
O.E.

          P.E.                  P.E.
    Trace back to the
    event that started
    the chain.




9      The Presentation is sole property of Aspenmas and cannot be used without permission.
The origin event will give
     up the source of the
     problem.


                                                                O.E.

          P.E.                  P.E.




10     The Presentation is sole property of Aspenmas and cannot be used without permission.
From the entry parent event we
                                                              can trace each of the child
                                      C.E.                    events and the effects of those
                                                              events in the PC and what each
                                                              future event has effected.




     P.E.                                                            O.E.
                                     P.E.




                                   C.E.


11          The Presentation is sole property of Aspenmas and cannot be used without permission.
C.E.


                                             C.E.




                                                                                         C.E.
                                                                                                   One original
                                                                                                   virus event can
     P.E.                                                                                          create many
                                     P.E.                                                          effects in
                                                                                                   different parts of
                                                                           C.E.                    your PC.




                                      C.E.

                                                                                      C.E.
12          The Presentation is sole property of Aspenmas and cannot be used without permission.
Bad News and Good News

     • The bad news is, this is real. The actions of a virus or malware
       binary are very serious.

     • In the past, it used to be that virus would send you a nasty note
       and do its nasty business. Now they don’t tell you anything.
       As a mater of fact, one primary goal is to NOT be detected or
       tracked. This way it can continue to do its business without you
       knowing it exists and you removing it.

     • The good news is this entire process has been built into a tool
       that we install on our clients machines to assist in identifying
       and cleaning problems that occur.



13      The Presentation is sole property of Aspenmas and cannot be used without permission.
The Better News
     • The current anti-virus and anti-malware software compares the
       programs (binaries) against a list of binaries that are known
       copies of the bad virus’s and malware. These lists are called a
       signature files. A search, with the signature file, will identify
       programs on your PC that are similar to or are bad binaries.
       They then can then be removed and your PC can now be cleaned.

     • The problem is no one anti-virus program will find all of the bad
       software.

     • The great news is our tool has the ability to compare all of the
       binaries in your system to ALL of the signature files from All of
       the major software programs on the market. This can be done
       with in minutes of a new binary being introduced into your PC.



14      The Presentation is sole property of Aspenmas and cannot be used without permission.
AspenMAS

     • Aspenmas is a Colorado based MSP.

     • We provide one of the most effective PC and Server
       protection systems available today.

     • Our security Plans include Firewalls, software, monitoring
       and Pro-Active Security Systems.

     • If we can’t stop the problem, our systems can identify and
       allow us to correct the infection.



15      The Presentation is sole property of Aspenmas and cannot be used without permission.
What do you do now
     • The AspenMAS security Plans are available to our regular
       MSP clients.

     • If you are interested in becoming an AspenMAS client
       contact us at:

                            AspenMAS
                            40 W. Littleton Blvd
                            Suite 210-284
                            Littleton, CO 80120
                            sales@aspenmas.com
                            www.aspenmas.com



16      The Presentation is sole property of Aspenmas and cannot be used without permission.

More Related Content

Viewers also liked

Horror pitch final
Horror pitch finalHorror pitch final
Horror pitch finalxtara15
 
Horror pitch final
Horror pitch finalHorror pitch final
Horror pitch finalxtara15
 
Horror pitch
Horror pitchHorror pitch
Horror pitchxtara15
 
Director case study
Director case studyDirector case study
Director case studyxtara15
 
Horror pitch final
Horror pitch finalHorror pitch final
Horror pitch finalxtara15
 
The 2009 Presidential Car - Cadillac One
The 2009 Presidential Car - Cadillac OneThe 2009 Presidential Car - Cadillac One
The 2009 Presidential Car - Cadillac Onemrballantyne
 

Viewers also liked (7)

Horror pitch final
Horror pitch finalHorror pitch final
Horror pitch final
 
Horror pitch final
Horror pitch finalHorror pitch final
Horror pitch final
 
Horror pitch
Horror pitchHorror pitch
Horror pitch
 
Director case study
Director case studyDirector case study
Director case study
 
Horror pitch final
Horror pitch finalHorror pitch final
Horror pitch final
 
The 2009 Presidential Car - Cadillac One
The 2009 Presidential Car - Cadillac OneThe 2009 Presidential Car - Cadillac One
The 2009 Presidential Car - Cadillac One
 
Cleft lip
Cleft lipCleft lip
Cleft lip
 

Similar to Mtt p2

Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computerheidirobison
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systemsGener Luis Morada
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_virusesLihtnes1
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYShah Rashedul LastHaque
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfEric Selje
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crashShae
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remembersherireid89
 
Lesson plan for presentation
Lesson plan for presentationLesson plan for presentation
Lesson plan for presentationdipti reya
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 

Similar to Mtt p2 (20)

Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
 
Operating systems
Operating systemsOperating systems
Operating systems
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Spyware
SpywareSpyware
Spyware
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
 
Privacy, Security
Privacy, SecurityPrivacy, Security
Privacy, Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
Anti virus
Anti virusAnti virus
Anti virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
 
Lesson plan for presentation
Lesson plan for presentationLesson plan for presentation
Lesson plan for presentation
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Mtt p2

  • 1. The Future of PC Protection 1 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 2. When do you see a Virus or Malware? • After it is in your PC and already effecting your machine, right. • How does a virus really infect and effect your machine? • The virus or malware is an executable piece of program that runs in your machine. Everything that happens on your PC is a program execution of some form or another. • Most of these executions are good and some are bad. 2 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 3. What are some of the primary characteristics of the current malware today? • Sources: All media forms, usually controlled by a Botnet. • Who’s the target: Anyone, any company any individual. • What happens to a typical victim: 1 System is compromised 2 Information is stolen, sold, exploited. 3 PC is subjugated to a bot-network. • What does an Infection look like: 1 Primary objective is to remain unseen. 2 Make tracking almost impossible. 3 Setup shop and not effect the PC operation. 4 Your PC is then controlled by the Botnet. 3 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 4. A Little Analysis • So when you see a problem, there has been an execution of a program. • What else can be associated with this execution event? • There can be several: • First, the piece of code or program that was run. This is called a “binary”. • Second might be a file copied or saved and the address or path. • The Third association, to the event, is the preceding or “parent event”. • So now we have a parent event and the child event that we found from the original problem we discovered. 4 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 5. What is the “binary” that is associated with an event? • Bottom line is, it is a program. It might be MS Word or Outlook or your browser or anything else has been installed or run on your PC. • What does a virus binary do? • Basically, it can do anything that any other program can do. • It can copy itself from place to place. • It can attach itself to other binaries, in order to hide, like a windows system file or other programs. • It can even delete files or itself and, if it want to, it could destroy your entire hard drive. 5 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 6. So what can we do with this information? • If we knew all of the events, we can trace from one event to another. • If we have each of the original “binaries” we can do three things. 1. We can replace a damaged binary with the original one. 2. We can compare this binary to know bad programs. 3. We could see the original malware or virus when it entered the PC and its source point. 6 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 7. The original event Discovered while using the PC (O.E.) 7 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 8. O.E. Parent event. (P.E.) 8 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 9. O.E. P.E. P.E. Trace back to the event that started the chain. 9 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 10. The origin event will give up the source of the problem. O.E. P.E. P.E. 10 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 11. From the entry parent event we can trace each of the child C.E. events and the effects of those events in the PC and what each future event has effected. P.E. O.E. P.E. C.E. 11 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 12. C.E. C.E. C.E. One original virus event can P.E. create many P.E. effects in different parts of C.E. your PC. C.E. C.E. 12 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 13. Bad News and Good News • The bad news is, this is real. The actions of a virus or malware binary are very serious. • In the past, it used to be that virus would send you a nasty note and do its nasty business. Now they don’t tell you anything. As a mater of fact, one primary goal is to NOT be detected or tracked. This way it can continue to do its business without you knowing it exists and you removing it. • The good news is this entire process has been built into a tool that we install on our clients machines to assist in identifying and cleaning problems that occur. 13 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 14. The Better News • The current anti-virus and anti-malware software compares the programs (binaries) against a list of binaries that are known copies of the bad virus’s and malware. These lists are called a signature files. A search, with the signature file, will identify programs on your PC that are similar to or are bad binaries. They then can then be removed and your PC can now be cleaned. • The problem is no one anti-virus program will find all of the bad software. • The great news is our tool has the ability to compare all of the binaries in your system to ALL of the signature files from All of the major software programs on the market. This can be done with in minutes of a new binary being introduced into your PC. 14 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 15. AspenMAS • Aspenmas is a Colorado based MSP. • We provide one of the most effective PC and Server protection systems available today. • Our security Plans include Firewalls, software, monitoring and Pro-Active Security Systems. • If we can’t stop the problem, our systems can identify and allow us to correct the infection. 15 The Presentation is sole property of Aspenmas and cannot be used without permission.
  • 16. What do you do now • The AspenMAS security Plans are available to our regular MSP clients. • If you are interested in becoming an AspenMAS client contact us at: AspenMAS 40 W. Littleton Blvd Suite 210-284 Littleton, CO 80120 sales@aspenmas.com www.aspenmas.com 16 The Presentation is sole property of Aspenmas and cannot be used without permission.