1 / 21

Administrator Protect against Malware

Administrator Protect against Malware. b y: Brittany Slisher and Gary Asciutto. Top Malware to know about: We will address: Viruses, Worms, Trojan horse and Rootkits. Best ways for user prevent against Malware. How administrators get rid of Malware.

charis
Download Presentation

Administrator Protect against Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

  2. Top Malware to know about: We will address: Viruses, Worms, Trojan horse and Rootkits. • Best ways for user prevent against Malware. • How administrators get rid of Malware. • Dealing with the after effects of a Malware infested computer. Overview

  3. Malware is also known as malicious software which is used to access a computer system without the owner knowing or their consent. This type of software is used to damage a system anywhere from causing data loss to destroying an entire system. • Viruses - Trojan Horse • Worms - Rootkits 1. Malware includes:

  4. A virus is a program designed to spread from one computer to another and to interfere with computer operations • Can corrupt or delete data, attach itself to email messages to spread, or erase everything on your hard drive Viruses

  5. These are a type of software that works off the network to send copies of itself to other computers. • Most of the damage comes from productivity lost by infected computers and the labor hours to get rid of the worm Worms

  6. This is a type of program that claims to be something that it isn’t. Most times this Malware creates a backdoor on its attack system. Trojan Horse

  7. This is a program that is installed on a computer system and is used to hide Malware. • Gives admin level access while hiding its activity • Can do anything an admin can do Rootkits

  8. The best ways for an administrator to prevent against Malware

  9. Use a firewall • Use Anti-virus software • Keep on updating • Backup, Backup, Backup 2. Preventing against Malware

  10. A firewall is designed to deny unauthorized and unwanted network access/transmissions based on a set of rules from the system administrator. Use a Firewall

  11. This is the type of software that is used to detect, prevent and remove different kinds of Malware. A few examples would be AVG, Norton, BitDefender and MacAfee. This type of software can have a high price to it or be free. Use Anti-virus software

  12. Updates are there for patching up vulnerable software before they can be exploited by Malware. Keep on Updating

  13. Make sure your system is backed up on a regular basis just in case the system is compromised. Better to be safe than sorry. Backup, Backup, Backup

  14. How administrators actually get rid of Malware

  15. There are many steps to getting rid of Malware, you just have to know the right approach and which one would be the best choice. • Execute a System Restore • Run Scans • Clean install 3. The steps to getting rid of Malware

  16. This way is quick and easy, although that being said it only handles lite amounts of Malware. Best for systems that are caught during the early stages of infection. Execute a System Restore

  17. This is the process of running Malware removal programs. There are many choices, some are free and others can be costly. Choosing a good one or two will be most efficient. • Top Removal Programs: Spybot Search and Destroy, SUPERAntiSpyware, ComboFix, Malwarebytes’ Anti-Malware, and HijackThis. Run Scans

  18. This is for the real unfortunate systems that can’t be easily or moderately fixed. This is the process of wiping the system clean and starting over by reinstalling the operating system. Clean install

  19. How administrators deal with the after effects of a Malware infested systems

  20. Here are a few main concerns: • Move, Create, Corrupted or Delete files • Watch for a high consumption of the computer’s memory and bandwidth • Keep a look out for back doors • Random Windows registry entries, unusual processes and hid files 4. Concerns to look out for on a once Malware infested system

  21. Malware can come in many forms, and if not protected can cause damage to a computer system. • The best ways to prevent malware from getting on and messing up your system are firewalls, antivirus, update, and backup. • Once Malware is on the system, to remove try a system restore, use antivirus scans or go with a clean installation. • After effects include back doors, random registry entries, and corrupted files Conclusion

More Related