digital enemies

11
Digital Digital Enemies Enemies CC CL Abdul Lateef Khan CC CL Abdul Lateef Khan Millennium Toastmasters Millennium Toastmasters August 28, 2007 August 28, 2007

Upload: abdul-lateef

Post on 13-May-2015

728 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Digital Enemies

Digital Digital EnemiesEnemies

CC CL Abdul Lateef KhanCC CL Abdul Lateef Khan

Millennium ToastmastersMillennium Toastmasters

August 28, 2007August 28, 2007

Page 2: Digital Enemies

Digital EnemiesDigital Enemies

Our GoalsOur Goals

What is Malware?What is Malware?

Examples of MalwareExamples of Malware

Spam-malwareSpam-malware

Blended ThreatBlended Threat

Safety MeasuresSafety Measures

Page 3: Digital Enemies

Digital EnemiesDigital Enemies

MalwareMalware

Malicious softwareMalicious software

Set of coded instructions Set of coded instructions

Corrupt files, alter/delete data, distrubute Corrupt files, alter/delete data, distrubute confidential dataconfidential data

Disable hardwareDisable hardware

Deny legitimate user accessDeny legitimate user access

Cause a hard drive to crashCause a hard drive to crash

Page 4: Digital Enemies

Digital EnemiesDigital Enemies

Examples of MalwareExamples of Malware

VirusesViruses- - self replicate within computers & networkself replicate within computers & network

- - alter files and dataalter files and data

- - usually require some action from userusually require some action from user

WormsWorms- - replicate itselfreplicate itself

-- do not alter file, resides in memory do not alter file, resides in memory

- - infect a computer without any user interactioninfect a computer without any user interaction

Page 5: Digital Enemies

Digital EnemiesDigital Enemies

Examples of MalwareExamples of Malware

TrojansTrojans- - hidden within innocuous program/datahidden within innocuous program/data

- - create backdoors and access personal datacreate backdoors and access personal data

- - do not self replicatedo not self replicate

Browser hijackersBrowser hijackers- - alter browser settingsalter browser settings

- - alter default home page/search pagesalter default home page/search pages

- - add bookmarks/pop ups/redirect URL’sadd bookmarks/pop ups/redirect URL’s

Page 6: Digital Enemies

Digital EnemiesDigital Enemies

Serious ThreatsSerious Threats

Spam – MalwareSpam – Malware- - malware and spam working togethermalware and spam working together

- - unwanted e – mailsunwanted e – mails

- - unsolicited / sent in bulkunsolicited / sent in bulk

Blended ThreatBlended Threat- - bundles the worst of viruses, worms, Trojan etc.bundles the worst of viruses, worms, Trojan etc.

- - can initiates, transmit & attack by itselfcan initiates, transmit & attack by itself

- - transport multiple attack in one payloadtransport multiple attack in one payload

Page 7: Digital Enemies

Digital EnemiesDigital Enemies

OverviewOverview

Page 8: Digital Enemies

Digital EnemiesDigital Enemies

Safety MeasuresSafety Measures

Page 9: Digital Enemies

Digital EnemiesDigital Enemies

Safety MeasuresSafety Measures

Keep Operating System up-to-dateKeep Operating System up-to-date

Install Anti VirusInstall Anti Virus

Have a FirewallHave a Firewall

- Hardware- Hardware

- Software- Software

AntispywareAntispyware

Install updatesInstall updates

Page 10: Digital Enemies

Digital EnemiesDigital Enemies

Page 11: Digital Enemies

Digital EnemiesDigital Enemies