computer hardware day3
TRANSCRIPT
-
8/4/2019 Computer Hardware Day3
1/21
Computer Hardwarecommon threats to your PC
Sarbjeet Prasad
-
8/4/2019 Computer Hardware Day3
2/21
Malware
Malware is generally described as a softwareprogram that is surreptitiously and discreetlyplaced on a users computer that performs
unexpected orunauthorized, but alwaysmalicious, actions. It is a common term usedto refer to viruses, Trojan horse programs,and worms.
surreptitious adj done in secret or without permission (surreptitiously adv.)
discreet adj careful to avoid embarrassment when dealing with secret or private matter
(discreetly adv.)
-
8/4/2019 Computer Hardware Day3
3/21
Symptoms of infection
Todays malware actively seeks to remain undetected;
however, you may experience the following problems:
Overall system performance slows down.
Files are corrupted or deleted and you are no longer
able to open them.
Commonly used programs no longer work properly. Reduction in hard drive and memory space.
Inability to update antivirus software.
-
8/4/2019 Computer Hardware Day3
4/21
Computer virus
A computervirus is a program that has the unique
ability to replicate, and like biological viruses, can
spread quickly. While some viruses do not carry a
damage routine, they may only display messages orimages, others may destroy files, reformat your hard
drive, or cause other damage. If the virus does not
contain a damage routine, it can cause trouble by
consuming storage space and memory, anddegrading the overall performance of your computer.
-
8/4/2019 Computer Hardware Day3
5/21
Trojan horse
ATrojan horse program performs a maliciousaction but has no replication abilities. Like theTrojan horse, a Trojan horse program may
arrive as a seemingly harmless file orapplication, but actually has hidden maliciousintent within its code. When a Trojan horseprogram is executed, you may experienceunwanted system problems in operation, and
sometimes loss of valuable data.Trojan Horse n 1. (Greek myth) the huge wooden hollow figure of a horse used by the
Greeks to enter Troy 2. a trap or trick intended to undermine an enemy.
-
8/4/2019 Computer Hardware Day3
6/21
Computer worm
A computerworm is a self-containedprogram (or set of programs) that can spreadcopies of itself to other computer systems via
network connections, email attachments,instant messages (via file-sharingapplications), and by collaborating with othermalware. Some worms may also prevent you
from accessing security Web sites, or stealthe licenses of installed games andapplications.
-
8/4/2019 Computer Hardware Day3
7/21
Crimeware
Crimeware is an overall term that describes
software used forfinancial theft. Crimeware
can spread via almost any threat vector -including viruses/Trojan horses, programs
/worms, spyware/adware and others - and
comprises bots, botnets, and ransomware.
-
8/4/2019 Computer Hardware Day3
8/21
Spyware
Spyware and adware are closely related
threats. Spyware is any piece of software,
installed or employed without yourknowledge, that watches, logs, and reports
on yourelectronic movements. Commercial
spyware sells the information it collects to
marketing entities; criminal spyware uses it tosteal your identityone of the most powerful
threats facing consumers today.
-
8/4/2019 Computer Hardware Day3
9/21
Adware
Adware is software that generates electronic
advertisementssuch as pop-ups or Web
linkswithout your consent. In manyinstances, adware employs information
gathered via spyware to display highly
targeted messaging based on your personal
preferences and habits.
-
8/4/2019 Computer Hardware Day3
10/21
Spam
Spam describes any unsolicited communicationsent either via email or instant message (IM)intended for commercial gain. The term spam
encompasses a broad array of activities, many ofwhichsuch as the distribution ofphishing emails.Recently, image spamspam that displays itsmessage in an image rather than in body texthasemerged in an effort to evade detection. Spammers
also randomize these images using different sizes,backgrounds, and borders to prevent being blockedby spam signatures.
-
8/4/2019 Computer Hardware Day3
11/21
Phishing
Phishing is any attempt-via phone, email,
instant messaging (IM), or fax-to procure your
personally identifiable information with theintent of stealing your identity (and,
ultimately, your money). Most of these
attempts are in the guise of a legitimate
purpose; in other words, they appear to bevalid, yet are indeed a criminal enterprise.
-
8/4/2019 Computer Hardware Day3
12/21
Botnets
Botnets are networks of bots, and have been
identified as a leading cause of phishing - a
serious form of spam.
A bot - short for robot
-
8/4/2019 Computer Hardware Day3
13/21
Bots
Bots are the threats most commonly
associated with crimeware. A bot - short for
robotgenerally consists of what havebecome known as multi-stage malware
components. For example, a botnet may first
be seeded via a Trojan horse program that
takes advantage of any one of the number ofvulnerabilities (such as spam).
-
8/4/2019 Computer Hardware Day3
14/21
Bots contd.
Once seeded, and the PC has been compromised,
any number of other malware code segments may
be downloaded to the victimized PC on a whim. An
increasing amount of botnet activity is being used byorganized crime for malicious purposes. Criminal
botmasters can control bots from a central location,
waking them on command to perform an extensive
range of malicious activities, including spamdistribution, phishing, denial of service (DoS)
attacks, and extortion
-
8/4/2019 Computer Hardware Day3
15/21
Ransomware
Ransomware is software that, when executed,
encrypts word-processing, spreadsheet, and other
documents for the purposes of extortion. In other
words, documents are held ransom until victimspurchase a decryption keyeither by sending
payment via a third-party processor such as PayPal,
or through buying an item online (the receipt for
which includes the key). Ransomware is mostcommonly distributed via email or instant messenger
(IM).
-
8/4/2019 Computer Hardware Day3
16/21
How to protect your PC
Purchase and install an Internet security
package that includes antivirus, anti-spam,
anti-phishing, and intrusion detection andprevention (IDS/IPS) software.
Note: Many software are FREE for personal
use i.e. when you are not using yourcomputer for commercial purpose.
-
8/4/2019 Computer Hardware Day3
17/21
How to protect your PC contd.
Scan email and instant message (IM) file
attachments with security software.
Delete all unwanted and suspiciousmessages without opening.
When surfing the web, use security software
to protect yourself.
-
8/4/2019 Computer Hardware Day3
18/21
How to protect your PC contd.
Click on web links sent only by known or
expected sources.
Keep all browser and IM security patches upto date.
Apply all operating system (OS) security
patches supplied by the OS vendor in a
timely manner.
-
8/4/2019 Computer Hardware Day3
19/21
Firewall
A firewall is simply a program orhardware
device that filters the information coming
through the Internet connection into yourprivate network orcomputer system. If an
incoming packet of information is flagged by
the filters, it is not allowed through.
-
8/4/2019 Computer Hardware Day3
20/21
Firewall
-
8/4/2019 Computer Hardware Day3
21/21
Review
Malware
Crimeware
Security softwareFirewall