Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore DPR project

DPR project

Published by urianagarcia60, 2019-03-13 15:08:05

Description: DPR project

Search

Read the Text Version

TechNo Wave TechNo Wave is the new wave of technology. Software and Development

TechNo Wave Senior Leadership (first intitial of first name)(last name)@technowave.com

Objectives 1. The objective of this presentation is for audience and supports to develop a understanding of what Malicious Software in addition to understanding how it can affect your technology devices in a negative way. a. You will learn the history of Malicious Software during this presentation. b. You will about the 3 main types of Malicious Software. c. You will learn the prevention strategies.

What is Malicious Software 1. According to Veracode, Malware is a broad term that refers to a variety of malicious programs, is software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer.

History of Malicious Software 1. The earliest documented viruses began to appear in the early 1970s, credited to be the “Creeper Worm,” an experimental self-replicating program written by Bob Thomas at BBN Technologies with being the first virus. 2. The First Malware was created to create awareness, it gained access by the ARPANET and copied itself to remote systems where it displayed the message: “I’m the creeper, catch me if you can!”

Worm 1. Computer worms are among the most common types of malware. They spread over computer networks by exploiting operating system vulnerabilities. 2. Worms typically cause harm to their host networks by consuming bandwidth and overloading web servers. Computer worms can also contain “payloads” that damage host computers. Payloads are pieces of code written to perform actions, designed to steal data, delete files, or create botnets. 3. Worms often spread by sending mass emails with infected attachments to users’ contacts. 4. They are detected by running Anti-virus programming and Anti- spyware programming

Spyware 1. Spyware is a type of malware that functions by spying on user activity without their knowledge. (Can be found on tablets) 2. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting, and more. Ranging from modifying security settings of software or browsers to interfering with network connections. 3. The factory reset will wipe out everything from apps to your contacts and saved settings, and for that reason, it’s one of the best ways to ensure that you get rid of all tracking software that might be present on the device.

Trojans Horse 1. A Trojan horse is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware, and can be found on many types of computers such phones, tablets, and others. 2. A Trojan can give a malicious party remote access to an infected computer, once accessed the infected computer, it is possible for the attacker to steal data (logins, financial data, even electronic money), install more malware, modify files, monitor user activity, use the computer in botnets, and anonymize internet activity by the attacker. 3. To rid of trojans use Rkill to terminate suspicious programs.

Detection 1. Virus Detection is a process that users of electronics go through to assure that their devices are free of any viruses. 2. Virus Detection has a series of steps that, in a summary, scan a device of all of its storage, history, and downloads to see if or how your computer developed the virus and works to eliminate the virus from the device. 3. Once detection of the computer is complete, you should have your

Prevention 1. Prevention is a process to solidify your computer’s status as a safe device. 2. Prevention also takes a series of steps to complete, although it takes a longer period of time to finish; It makes sure that once the computer loses the virus, that the virus does not return to the computer. 3. Prevention mainly includes timely and routine checks on your computer to ensure safety at all times.

Removal 1. The first step of the reaction process in to enter safe mode in order to ensure that nothing else attacks the computer during the process of acknowledging the virus and the process of eliminating the virus 2. Then next step is to delete temporary files to speed up the scanning process, free up disk space, and remove some malware. 3. Now you are ready for a download scanner to do its work, you will download malware scanners which in this case, we will use Norton Anti-Virus Software to remove standard infections. Norton uses signatures and heuristics to identify viruses. If you have downloaded a scanner before, you should download another one since your current antivirus scanner didn’t detect the virus at first sight.

Removal (Continued) 4. The last step of this process will be to run a scan with Malwarebytes. During this process we will be using Norton Power Eraser which matches an application found on a user’s computer with a list of trusted and malicious applications This scan will inspect all of primary storage and download units of your computer to make sure that there is nothing left unchecked through the scanning process.

_______________ often spread by sending mass emails with infected attachments to users’ contacts. Worms

True or False: The factory reset will wipe out all tracking software that might be present on the device. True

What is Malicious Software? It is software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer

Career Connection -Cyber Security Engineer - Remote 1. Web infrastructure setup, programming and configuration as needed 2. Design and develop new web applications, as directed, through collaboration with management, the web development team, and/or customers 3. Maintain and enhance existing web applications 4. Perform complete testing of web applications, engaging users as necessary 5. Design and implement user-driven templates, databases...

Summary 1. Malware, is software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer. 2. Historians often credit the “Creeper Worm,” an experimental self- replicating program written by Bob Thomas at BBN Technologies with being the first virus. 3. Computer worms are among the most common types of malware, Worms often spread by sending mass emails with infected attachments to users’ contacts. 4. They are detected by running Anti-virus programming and Anti- spyware programming to rid worms

Summary 1. Spyware is a type of malware that functions by spying on user activity without their knowledge, capabilities can include activity monitoring, collecting keystrokes, data harvesting, and more. 2. The factory reset will wipe out everything from apps to your contacts and saved settings, and for that reason, it’s one of the best ways to ensure that you get rid of all tracking software that might be present on the device. 3. A Trojan can give a malicious party remote access to an infected computer, once accessed the infected computer, it is possible for the attacker to steal data 4. To rid of trojans use Rkill to terminate suspicious programs.

Biography “Common Malware Types: Cybersecurity 101.” CA Veracode, 21 Dec. 2018, www.veracode.com/blog/2012/10/common-malware-types- cybersecurity-101. “ A Brief History of Malware-Its Evolution and Impact.” Lastline, 14 May 2018, www.lastline.com/blog/history-of-malware-its-evolution-and- impact/. Duvauchelle, Joshua. “How to Kill a Computer Worm.” It Still Works, 10 Jan. 2019, www.itstillworks.com/kill-computer-worm-4813694.html.

Video MAGAZINE


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook