computer hardware day3

Upload: mrinal-verma

Post on 07-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/4/2019 Computer Hardware Day3

    1/21

    Computer Hardwarecommon threats to your PC

    Sarbjeet Prasad

    [email protected]

  • 8/4/2019 Computer Hardware Day3

    2/21

    Malware

    Malware is generally described as a softwareprogram that is surreptitiously and discreetlyplaced on a users computer that performs

    unexpected orunauthorized, but alwaysmalicious, actions. It is a common term usedto refer to viruses, Trojan horse programs,and worms.

    surreptitious adj done in secret or without permission (surreptitiously adv.)

    discreet adj careful to avoid embarrassment when dealing with secret or private matter

    (discreetly adv.)

  • 8/4/2019 Computer Hardware Day3

    3/21

    Symptoms of infection

    Todays malware actively seeks to remain undetected;

    however, you may experience the following problems:

    Overall system performance slows down.

    Files are corrupted or deleted and you are no longer

    able to open them.

    Commonly used programs no longer work properly. Reduction in hard drive and memory space.

    Inability to update antivirus software.

  • 8/4/2019 Computer Hardware Day3

    4/21

    Computer virus

    A computervirus is a program that has the unique

    ability to replicate, and like biological viruses, can

    spread quickly. While some viruses do not carry a

    damage routine, they may only display messages orimages, others may destroy files, reformat your hard

    drive, or cause other damage. If the virus does not

    contain a damage routine, it can cause trouble by

    consuming storage space and memory, anddegrading the overall performance of your computer.

  • 8/4/2019 Computer Hardware Day3

    5/21

    Trojan horse

    ATrojan horse program performs a maliciousaction but has no replication abilities. Like theTrojan horse, a Trojan horse program may

    arrive as a seemingly harmless file orapplication, but actually has hidden maliciousintent within its code. When a Trojan horseprogram is executed, you may experienceunwanted system problems in operation, and

    sometimes loss of valuable data.Trojan Horse n 1. (Greek myth) the huge wooden hollow figure of a horse used by the

    Greeks to enter Troy 2. a trap or trick intended to undermine an enemy.

  • 8/4/2019 Computer Hardware Day3

    6/21

    Computer worm

    A computerworm is a self-containedprogram (or set of programs) that can spreadcopies of itself to other computer systems via

    network connections, email attachments,instant messages (via file-sharingapplications), and by collaborating with othermalware. Some worms may also prevent you

    from accessing security Web sites, or stealthe licenses of installed games andapplications.

  • 8/4/2019 Computer Hardware Day3

    7/21

    Crimeware

    Crimeware is an overall term that describes

    software used forfinancial theft. Crimeware

    can spread via almost any threat vector -including viruses/Trojan horses, programs

    /worms, spyware/adware and others - and

    comprises bots, botnets, and ransomware.

  • 8/4/2019 Computer Hardware Day3

    8/21

    Spyware

    Spyware and adware are closely related

    threats. Spyware is any piece of software,

    installed or employed without yourknowledge, that watches, logs, and reports

    on yourelectronic movements. Commercial

    spyware sells the information it collects to

    marketing entities; criminal spyware uses it tosteal your identityone of the most powerful

    threats facing consumers today.

  • 8/4/2019 Computer Hardware Day3

    9/21

    Adware

    Adware is software that generates electronic

    advertisementssuch as pop-ups or Web

    linkswithout your consent. In manyinstances, adware employs information

    gathered via spyware to display highly

    targeted messaging based on your personal

    preferences and habits.

  • 8/4/2019 Computer Hardware Day3

    10/21

    Spam

    Spam describes any unsolicited communicationsent either via email or instant message (IM)intended for commercial gain. The term spam

    encompasses a broad array of activities, many ofwhichsuch as the distribution ofphishing emails.Recently, image spamspam that displays itsmessage in an image rather than in body texthasemerged in an effort to evade detection. Spammers

    also randomize these images using different sizes,backgrounds, and borders to prevent being blockedby spam signatures.

  • 8/4/2019 Computer Hardware Day3

    11/21

    Phishing

    Phishing is any attempt-via phone, email,

    instant messaging (IM), or fax-to procure your

    personally identifiable information with theintent of stealing your identity (and,

    ultimately, your money). Most of these

    attempts are in the guise of a legitimate

    purpose; in other words, they appear to bevalid, yet are indeed a criminal enterprise.

  • 8/4/2019 Computer Hardware Day3

    12/21

    Botnets

    Botnets are networks of bots, and have been

    identified as a leading cause of phishing - a

    serious form of spam.

    A bot - short for robot

  • 8/4/2019 Computer Hardware Day3

    13/21

    Bots

    Bots are the threats most commonly

    associated with crimeware. A bot - short for

    robotgenerally consists of what havebecome known as multi-stage malware

    components. For example, a botnet may first

    be seeded via a Trojan horse program that

    takes advantage of any one of the number ofvulnerabilities (such as spam).

  • 8/4/2019 Computer Hardware Day3

    14/21

    Bots contd.

    Once seeded, and the PC has been compromised,

    any number of other malware code segments may

    be downloaded to the victimized PC on a whim. An

    increasing amount of botnet activity is being used byorganized crime for malicious purposes. Criminal

    botmasters can control bots from a central location,

    waking them on command to perform an extensive

    range of malicious activities, including spamdistribution, phishing, denial of service (DoS)

    attacks, and extortion

  • 8/4/2019 Computer Hardware Day3

    15/21

    Ransomware

    Ransomware is software that, when executed,

    encrypts word-processing, spreadsheet, and other

    documents for the purposes of extortion. In other

    words, documents are held ransom until victimspurchase a decryption keyeither by sending

    payment via a third-party processor such as PayPal,

    or through buying an item online (the receipt for

    which includes the key). Ransomware is mostcommonly distributed via email or instant messenger

    (IM).

  • 8/4/2019 Computer Hardware Day3

    16/21

    How to protect your PC

    Purchase and install an Internet security

    package that includes antivirus, anti-spam,

    anti-phishing, and intrusion detection andprevention (IDS/IPS) software.

    Note: Many software are FREE for personal

    use i.e. when you are not using yourcomputer for commercial purpose.

  • 8/4/2019 Computer Hardware Day3

    17/21

    How to protect your PC contd.

    Scan email and instant message (IM) file

    attachments with security software.

    Delete all unwanted and suspiciousmessages without opening.

    When surfing the web, use security software

    to protect yourself.

  • 8/4/2019 Computer Hardware Day3

    18/21

    How to protect your PC contd.

    Click on web links sent only by known or

    expected sources.

    Keep all browser and IM security patches upto date.

    Apply all operating system (OS) security

    patches supplied by the OS vendor in a

    timely manner.

  • 8/4/2019 Computer Hardware Day3

    19/21

    Firewall

    A firewall is simply a program orhardware

    device that filters the information coming

    through the Internet connection into yourprivate network orcomputer system. If an

    incoming packet of information is flagged by

    the filters, it is not allowed through.

  • 8/4/2019 Computer Hardware Day3

    20/21

    Firewall

  • 8/4/2019 Computer Hardware Day3

    21/21

    Review

    Malware

    Crimeware

    Security softwareFirewall