1 / 23

Malware Protection

Malware Protection. By Joshua T. I. Towers. 13.3. $13.3 billion was the direct cost of malware for business in 2006

mckile
Download Presentation

Malware Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malware Protection By Joshua T. I. Towers

  2. 13.3 $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair and cleanse infected systems, loss of user productivity, loss of revenue due to loss or degraded performance of system, and other costs directly incurred as the result of a malware attack”

  3. http://www.computereconomics.com/article.cfm?id=1225

  4. 29,354,532 Microsoft desktop anti-malware products cleaned computers in the united states 29,354,532 times in 2009

  5. http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/

  6. What is Malware? • malware is “Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.” - http://www.techterms.com/definition/malware

  7. Types of Malware Viruses Worms Trojan Horses Spyware RootKits

  8. Viruses Most well know form of malware Replicates self Attaches to files and emails Spreads from machine to machine http://www.computerfixx.biz/allaboutinfections2.html

  9. Worm Replicates self Spreads through network traffic Attaches to files http://israelmatzav.blogspot.com/2010/09/six-mysteries-about-stuxnet-computer.html

  10. Trojan Horses Can not replicate self Disguised as interesting or useful programs or links May drop off other forms of malware into your system http://www.linux4windows.com/Articles/trojan_horse_software.html

  11. Spyware Can not replicate self Usually hidden inside of other more appealing programs and links Accesses personal info and transmits it back to its source http://removingspywareeasy.com/

  12. RootKits Individual or collection of programs used to gain admin access with out being detected Turns computers into zombies for the use of their creator http://computer.howstuffworks.com/zombie-computer.htm

  13. Threats of Malware • Efficiency loss • Malware can remain active with out your knowledge and slow your computer or network down. • Open back doors • A back door is a hole in a computers security that can be used by either the creator or, other malware, or hackers.

  14. Threats of Malware cont. • Stealing information • through the use of such tools as key loggers malware can steal personal information (passwords, credit card numbers, etc.) • Downloading of unwanted content • Some malware will download unwanted content onto you computer

  15. Nature of Malware • Evolution • As time passes new different malicious acts are added to the repertoire of malware. • Expansion • New malware is added to the long list all the time

  16. Defense Simple steps for basic protection against malware • Make sure your fire wall is active • Keep your operating systems updated • Keep your anti-spyware software updated • Keep your anti-virus software updated • Use strong passwords

  17. Anti-Virus Software BitDefender Antivirus KasperskyAnit-Virus Webroot Antivirus Norton AntiVirus ESER Nod32 Antivirus AVG AntiVirus G DATA AntiVirus AviraAntiVir Vipre Antivirus Trend Micro Titanium http://anti-virus-software-review.toptenreviews.com/ppc-index.html

  18. Criteria for choosing Scope of Protection Effectiveness Ease of installation and setup Ease of use Features Updates Help and Support

  19. The Ridding • Simple steps for the removal of some malware • Create a backup • Scan for malware • Clean the registry • Run operating system updates • Remove any recently added hardware or software

  20. If that doesn’t work • “Safe Mode loads a “bare bones” version of windows and disables 90% of viruses and their protection mechanisms.” - http://remove-malware.com/how-to/how-to-remove-malware-for-free/ • And scan again

  21. Whether those steps work or not there are COSTS

  22. IN CONCLUSION Malware protection is very important

  23. References http://www.computereconomics.com/article.cfm?id=1225 http://www.techterms.com/definition/malware http://www.spamlaws.com/malware-types.html http://www.itsecurity.com/features/real-cost-of-malware-112807/ http://www.cmsconnect.com/Marketing/viruscalc.htm http://support.microsoft.com/kb/129972 http://www.webopedia.com/TERM/S/spyware.html http://www.best-spyware-removal.com/what-is-spyware http://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htm http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp http://www.zsecurity.com/articles-rootkits.php http://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htm http://bigbluewater.com/blog/article/when-is-it-time-to-reload-your-operating-system http://www.microsoft.com/security/pc-security/protect-pc.aspx http://remove-malware.com/how-to/how-to-remove-malware-for-free/ http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/ http://anti-virus-software-review.toptenreviews.com/ppc-index.html http://www.webroot.com/En_US/csc/malware.html http://en.wikipedia.org/wiki/Malware http://www.zsecurity.com/articles-rootkits.php

More Related