administrator protect against malware by: brittany slisher and gary asciutto

21
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Upload: lucinda-arabella-ryan

Post on 29-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Administrator Protect against Malware

by: Brittany Slisher and Gary Asciutto

Page 2: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Overview

1. Top Malware to know about: We will address: Viruses, Worms, Trojan horse and Rootkits.

2. Best ways for user prevent against Malware.

3. How administrators get rid of Malware.4. Dealing with the after effects of a

Malware infested computer.

Page 3: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

1. Malware includes:

Malware is also known as malicious software which is used to access a computer system without the owner knowing or their consent. This type of software is used to damage a system anywhere from causing data loss to destroying an entire system.

- Viruses - Trojan Horse- Worms - Rootkits

Page 4: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Viruses

- A virus is a program designed to spread from one computer to another and to interfere with computer operations

- Can corrupt or delete data, attach itself to email messages to spread, or erase everything on your hard drive

Page 5: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Worms

- These are a type of software that works off the network to send copies of itself to other computers.

- Most of the damage comes from productivity lost by infected computers and the labor hours to get rid of the worm

Page 6: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Trojan Horse

- This is a type of program that claims to be something that it isn’t. Most times this Malware creates a backdoor on its attack system.

Page 7: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Rootkits

- This is a program that is installed on a computer system and is used to hide Malware.

- Gives admin level access while hiding its activity- Can do anything an admin can do

Page 8: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

The best ways for an administrator to prevent against Malware

Page 9: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

2. Preventing against Malware

- Use a firewall- Use Anti-virus software- Keep on updating- Backup, Backup, Backup

Page 10: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Use a Firewall

- A firewall is designed to deny unauthorized and unwanted network access/transmissions based on a set of rules from the system administrator.

Page 11: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Use Anti-virus software

This is the type of software that is used to detect, prevent and remove different kinds of Malware. A few examples would be AVG, Norton, BitDefender and MacAfee. This type of software can have a high price to it or be free.

Page 12: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Keep on Updating

Updates are there for patching up vulnerable software before they can be exploited by Malware.

Page 13: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Backup, Backup, Backup

- Make sure your system is backed up on a regular basis just in case the system is compromised. Better to be safe than sorry.

Page 14: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

How administrators actually get rid of

Malware

Page 15: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

3. The steps to getting rid of Malware

There are many steps to getting rid of Malware, you just have to know the right approach and which one would be the best choice.

- Execute a System Restore- Run Scans- Clean install

Page 16: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Execute a System Restore

- This way is quick and easy, although that being said it only handles lite amounts of Malware. Best for systems that are caught during the early stages of infection.

Page 17: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Run Scans

This is the process of running Malware removal programs. There are many choices, some are free and others can be costly. Choosing a good one or two will be most efficient.

Top Removal Programs: Spybot Search and Destroy, SUPERAntiSpyware, ComboFix, Malwarebytes’ Anti-Malware,

and HijackThis.

Page 18: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Clean install

- This is for the real unfortunate systems that can’t be easily or moderately fixed. This is the process of wiping the system clean and starting over by reinstalling the operating system.

Page 19: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

How administrators deal with the after effects of a Malware infested systems

Page 20: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

4. Concerns to look out for on a once Malware infested system

Here are a few main concerns:

- Move, Create, Corrupted or Delete files - Watch for a high consumption of the computer’s

memory and bandwidth- Keep a look out for back doors- Random Windows registry entries, unusual

processes and hid files

Page 21: Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto

Conclusion

1. Malware can come in many forms, and if not protected can cause damage to a computer system.

2. The best ways to prevent malware from getting on and messing up your system are firewalls, antivirus, update, and backup.

3. Once Malware is on the system, to remove try a system restore, use antivirus scans or go with a clean installation.

4. After effects include back doors, random registry entries, and corrupted files