SlideShare a Scribd company logo
How to Protect your PC from Malware
 What is Malware
 Types of Malware
 How to prevent Malware
Malicious Software
 What is malware?
 Software designed to infiltrate a computer system and possibly
damage it without the user’s knowledge or consent
 Types of malware
 Viruses
 Adware
 Spyware
 Trojan Horse
 Worms
 Ransomware
 Logic Bombs…and more…
Spyware
 Malicious software that is either downloaded unwittingly from a
website
 or is installed along with some other third-party software
 It monitors the user’s activity without informing the user that it is
doing so
 It passes on user’s information to marketers or intercepts personal
data such as credit card numbers
 It always provides commercial gain
How Spyware comes to your computer?
 Downloading free games, utilities, media players
 Opening spam email
 Visiting corrupted websites
 Mainstream software applications
 File sharing programs
How to prevent Spyware?
 The first line of defense is Windows defender (Windows 8)
 Set your Internet security setting to high
 Follow your instincts, don’t visit untrusted Websites
 Read before you click, uncheck the small boxes, and “No, I do not accept”
Adware
 Displays ads and generate revenue for the creator
 Adware collect data on which sites the user visits
 Sends this data back to the company and delivers ads based on the
information
 It can be included within some freeware or shareware
 A visit to an infected website can result in installation of adware
 Antivirus software can detect and remove adware
Trojan Horse
 Trojan horses are programs that enter a system or network under the
guise of another program
 It may be included as an attachment or as part of an installation program
 Appears to perform wanted functions but is actually performing malicious
functions behind the scenes
 The name is derived from the story of the Greek gift to the Trojans, hidden
with soldiers
How to prevent Trojan horse
 Not to allow them to enter your system
 Any software or operating system you install, back it up
 If Trojan horse suspected, then reinstall the original program
 It will delete Trojan horse
 A port scan may also reveal a Trojan horse
 Also, any Trojan Removal software will be helpful
Trojan Horse Removal Software
Worms
 A worm is similar to a virus by design and is considered to be a sub-class
of a virus
 Worms spread from computer to computer, but unlike a virus, it has the
capability to travel without any human action
 A worm takes advantage of file or information transport features on your
system, which is what allows it to travel unaided
 Worm has the capability to replicate itself on your system
 So your computer will be sending out hundreds or thousands of copies of
itself creating a huge devastating attack effect
Who Will Get Infected by Worms?
Ransomware
 Ransomware is often delivered through Trojan Horse
 Takes control of the system and demands a third party be paid
 Control can be accomplished by encrypting the hard drive, by changing
user password information or any other creative ways
 Users are assured that by paying the money they will be given the code
needed to revert their system to normal operations
Ransomware Sign
Logic Bombs
 Logic bombs are programs that executes when a certain predefined event
occurs
 A bomb may send a note to attacker when a user is logged on to the
Internet
 This message informs the attacker that the user is ready for an attack
 That the victim has meet the needed criteria for an attack to begin
 Victim’s system can be used to initiate an attack, such as DDOS attack
 Or can grant access at the time of the attacker’s choosing
Virus
 A virus is a piece of software designed to infect a computer system
 A computer virus attaches itself to another program
 or replaces it by overwriting it so that it can reproduce itself without you
knowing it
 It can quickly use up all the available memory on your computer and
seriously slow down the system, and even stop it completely
 Viruses can damage data files, destroy files, make disks unreadable
How viruses get into your computer
 From contaminated media, like DVD, USB, or CD-ROM
 Through email and social networking sites
 As part of another program
What viruses can do
 Damage data files
 Destroy files
 make disks unreadable
 Even cause damage they weren’t designed to
How to prevent viruses
 The primary method is antivirus software, like Symantec Endpoint
Protection, and Microsoft Security Essentials
 Symantec Endpoint Protection is provided for free to NOVA students
 NOVA students can download it from Blackboard using their myNOVA
username and password
 https://learn.vccs.edu/webapps/portal/execute/tabs/tabAction?tab_tab_gr
oup_id=_23_1
 Microsoft Security Essentials can be downloaded for free from Microsoft
Website
 http://www.microsoft.com/en-us/download/details.aspx?id=5201
What is Anti-Virus software
 Antivirus software is an application to protect your system and scan it for
viruses, worms and Trojan horses
 Most viruses have characteristics that are common to families of virus
 Antivirus software looks for these characteristics, or fingerprints, to
identify and naturalize viruses before they impact you
 More free Anti-Virus software, like Malwarebytes, Spybot, Trend Micro and
more
User Education
 The second method preventing viruses is user education
 Not to open suspicious files
 To scan every disk, email, and document they receive before they open
them
 The security settings should be on high within the application they use
 Update the antivirus software at all times
Symptoms of Virus Infection
 Programs of your system start to load more slowly
 Unusual files appears on your hard drive, or files disappear from your
system
 Many viruses delete key files in your system to make it inoperable
 Program size changes from installed version, because virus is attaching
itself to the program
 Browser, word processing application, or other software exhibit unusual
operating characteristics.
 System suddenly doesn’t reboot or gives unexpected error messages
during startup
Hands-on Activity
 Scanning your system using Microsoft Baseline Security Analyzer
 Install the free Microsoft Baseline Security Analyzer
 Start Microsoft Baseline Security Analyzer
 Choose scan this computer
 You will have a choice which computer to scan
 Choose this computer
 Click on start Scan
 View the report details when the scan concludes
Resources
 CompTIA Security +, Deluxe Study Guide, Third Edition
 By: Emmett Dulaney

More Related Content

What's hot

Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
Pratimesh Pathak
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Internet threats
Internet threatsInternet threats
Internet threats
GicelDelaCruz
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
Rohit Kashyap
 
Virus
VirusVirus
Virus
Protik Roy
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
YouQue ™
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer virus
Computer virusComputer virus

What's hot (20)

Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Internet threats
Internet threatsInternet threats
Internet threats
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Virus
VirusVirus
Virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer security
Computer securityComputer security
Computer security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar to How to Protect your PC from Malware

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
JohnRebenRequinto1
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Virus
VirusVirus
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
AkshayIngole17
 

Similar to How to Protect your PC from Malware (20)

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

How to Protect your PC from Malware

  • 1. How to Protect your PC from Malware  What is Malware  Types of Malware  How to prevent Malware
  • 2. Malicious Software  What is malware?  Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent  Types of malware  Viruses  Adware  Spyware  Trojan Horse  Worms  Ransomware  Logic Bombs…and more…
  • 3. Spyware  Malicious software that is either downloaded unwittingly from a website  or is installed along with some other third-party software  It monitors the user’s activity without informing the user that it is doing so  It passes on user’s information to marketers or intercepts personal data such as credit card numbers  It always provides commercial gain
  • 4. How Spyware comes to your computer?  Downloading free games, utilities, media players  Opening spam email  Visiting corrupted websites  Mainstream software applications  File sharing programs
  • 5. How to prevent Spyware?  The first line of defense is Windows defender (Windows 8)  Set your Internet security setting to high  Follow your instincts, don’t visit untrusted Websites  Read before you click, uncheck the small boxes, and “No, I do not accept”
  • 6. Adware  Displays ads and generate revenue for the creator  Adware collect data on which sites the user visits  Sends this data back to the company and delivers ads based on the information  It can be included within some freeware or shareware  A visit to an infected website can result in installation of adware  Antivirus software can detect and remove adware
  • 7. Trojan Horse  Trojan horses are programs that enter a system or network under the guise of another program  It may be included as an attachment or as part of an installation program  Appears to perform wanted functions but is actually performing malicious functions behind the scenes  The name is derived from the story of the Greek gift to the Trojans, hidden with soldiers
  • 8. How to prevent Trojan horse  Not to allow them to enter your system  Any software or operating system you install, back it up  If Trojan horse suspected, then reinstall the original program  It will delete Trojan horse  A port scan may also reveal a Trojan horse  Also, any Trojan Removal software will be helpful
  • 10. Worms  A worm is similar to a virus by design and is considered to be a sub-class of a virus  Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action  A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided  Worm has the capability to replicate itself on your system  So your computer will be sending out hundreds or thousands of copies of itself creating a huge devastating attack effect
  • 11. Who Will Get Infected by Worms?
  • 12. Ransomware  Ransomware is often delivered through Trojan Horse  Takes control of the system and demands a third party be paid  Control can be accomplished by encrypting the hard drive, by changing user password information or any other creative ways  Users are assured that by paying the money they will be given the code needed to revert their system to normal operations
  • 14. Logic Bombs  Logic bombs are programs that executes when a certain predefined event occurs  A bomb may send a note to attacker when a user is logged on to the Internet  This message informs the attacker that the user is ready for an attack  That the victim has meet the needed criteria for an attack to begin  Victim’s system can be used to initiate an attack, such as DDOS attack  Or can grant access at the time of the attacker’s choosing
  • 15. Virus  A virus is a piece of software designed to infect a computer system  A computer virus attaches itself to another program  or replaces it by overwriting it so that it can reproduce itself without you knowing it  It can quickly use up all the available memory on your computer and seriously slow down the system, and even stop it completely  Viruses can damage data files, destroy files, make disks unreadable
  • 16. How viruses get into your computer  From contaminated media, like DVD, USB, or CD-ROM  Through email and social networking sites  As part of another program
  • 17. What viruses can do  Damage data files  Destroy files  make disks unreadable  Even cause damage they weren’t designed to
  • 18. How to prevent viruses  The primary method is antivirus software, like Symantec Endpoint Protection, and Microsoft Security Essentials  Symantec Endpoint Protection is provided for free to NOVA students  NOVA students can download it from Blackboard using their myNOVA username and password  https://learn.vccs.edu/webapps/portal/execute/tabs/tabAction?tab_tab_gr oup_id=_23_1  Microsoft Security Essentials can be downloaded for free from Microsoft Website  http://www.microsoft.com/en-us/download/details.aspx?id=5201
  • 19. What is Anti-Virus software  Antivirus software is an application to protect your system and scan it for viruses, worms and Trojan horses  Most viruses have characteristics that are common to families of virus  Antivirus software looks for these characteristics, or fingerprints, to identify and naturalize viruses before they impact you  More free Anti-Virus software, like Malwarebytes, Spybot, Trend Micro and more
  • 20. User Education  The second method preventing viruses is user education  Not to open suspicious files  To scan every disk, email, and document they receive before they open them  The security settings should be on high within the application they use  Update the antivirus software at all times
  • 21. Symptoms of Virus Infection  Programs of your system start to load more slowly  Unusual files appears on your hard drive, or files disappear from your system  Many viruses delete key files in your system to make it inoperable  Program size changes from installed version, because virus is attaching itself to the program  Browser, word processing application, or other software exhibit unusual operating characteristics.  System suddenly doesn’t reboot or gives unexpected error messages during startup
  • 22. Hands-on Activity  Scanning your system using Microsoft Baseline Security Analyzer  Install the free Microsoft Baseline Security Analyzer  Start Microsoft Baseline Security Analyzer  Choose scan this computer  You will have a choice which computer to scan  Choose this computer  Click on start Scan  View the report details when the scan concludes
  • 23. Resources  CompTIA Security +, Deluxe Study Guide, Third Edition  By: Emmett Dulaney