220 likes | 445 Vues
Network Security. By: Daniel Jordan. What is a Virus?. A virus is a program that is designed to infect a host computer and spread to any computer it is executed on. Types of Viruses.
E N D
Network Security By: Daniel Jordan
What is a Virus? • A virus is a program that is designed to infect a host computer and spread to any computer it is executed on.
Types of Viruses • Macro Virus- These types of viruses load themselves into the templates used in common Microsoft office products. These include: Word, Excel, and PowerPoint. They are loaded onto the computer anytime the saved document or file is opened. • Program Virus- These viruses attach themselves to executable files and load themselves onto the computer when the setups are launched. • Boot Virus- These viruses load into the boot sector of the hard disk drive when the system is being booted from a boot disk.
How do they begin infecting? • A virus is loaded onto a computer through opening downloaded and transferred files. • Anytime a file containing a virus is opened on a computer, the virus begin to infect the computer it was loaded on.
Virus Myths • The majority of computer users believe that a virus can infect a computer by opening an email. This is not true. It can only begin infecting a computer when a file attached to the email is opened. • It is also believed that a user can put the computer at risk by viewing a website. This is also not true. A file must be run or opened in order for the virus to begin its infecting. • Computer users also often believe that by downloading a file a virus has infected their computer. This is also not true. A file must be opened or run before the virus can begin infecting.
Windows Anti-Virus Solutions • Norton AntiVirus • McAfee • Kaspersky • Panda • Security Shield • CA • BitDefender • Trend Micro • Webroot • BullGuard
Mac Anti-Virus Solutions • Avast! • ClanXav • MacScan • Norton AntiVirus • Sophos • Intego VirusBarrier • VirusScan • McAfee
Linux Anti-Virus Solutions • AVG • Avira Antivir • BitDefender • Clam AV • FProt • Command AntiVirus • Kasperky
What is Spyware, Adware, and Malware? • Spyware is a piece of software that is used to change the way a computer is setup, to track web surfing habits for advertising purposes, and is also used to collect personal information. • Adware is a piece of software designed to hoard your computer with advertisements. Can often slow web surfing down to a crawl. It can also use RAM space and CPU cycles. • Malware is almost synonymous with spyware and adware. However, it tends to have a more malicious intent to it.
How Are They Contracted? • Adware is often loaded through shareware. Shareware software developers are often paid to include adware. It is also often contracted through advertisements. • Spyware is loaded through opening downloaded applications, through browser plug-in installations, and through clicking on advertisements. • Malware is contracted through the same methods as spyware and adware.
Spyware, Adware, and Malware solutions • Spy Sweeper • Spy Bot- Search and Destroy • Ad-Aware • Windows Defender • CounterSpy • Trend Micro Anti-Spyware • AntiSpy • Spyware Doctor • Pest Patrol • Spyware Be Gone • McAfee Anti-Spyware • Maxion Spy Killer
Phishing • A new form of security threat. • Most commonly defined as any online deception used to acquire credit card numbers, usernames, passwords, and even account information.
How to protect against phishing • The best way to start protecting yourself is to use the keyboard to type in URL’s instead of clicking on links. • Try to use websites that have a logo of a lock on the bottom of your browser window. It is not placed on the website. • The last way to protect yourself is to use security software that blocks against phishing.
Other Risks • Computer users also have to protect themselves from hackers. • To achieve this protection, computer use a piece of software or hardware called a firewall.
Firewalls were created to prevent the intrusion of another person on a personal computer. They were also created to stop computer hackers from taking control of a person’s computer.
Firewalls • Firewalls can be found in software such as Internet Security software. • Firewalls can also be found in many routers from companies such as: D-link, Linksys, and Netgear.
Common Firewall Software • Windows: ZoneAlarm, McAfee, Norton, Webroot, AVG, and Kaspersky • Mac: Apple, Intego, Flying Buttress, Doorstop X, and Firewalk X • Linux: Fwbuilder, Firestarter, Guarddog, Guidedog, and Knetfilter
Works Cited • In order of appearance… • http://www.extension.iastate.edu/Publications/PM1789J.pdf • http://www.learnthenet.com/english/gifs/virus.gif • http://askbobrankin.com/computer-virus.jpg • http://static.howstuffworks.com/gif/virus-ch.jpg • http://www.microsoft.com/protect/computer/basics/virus.mspx • http://6starreview.com/Internet-Security.aspx?Refer=Gols+keyboard=Internet%20Security&gclid=CBPKZPF175ECFQ80SwodrEYdwQ • http://img.planetonline.com/Original/norton_av2007.jpg • http://www.devnetsoftware.com/wp-content/uploads/2007/05/mcafee-virusscan-plus-2007.jpg • http://yasir03.online.fr/imgs/KasperskyAnti-Virus.jpg • http://www.pure-mac.com/virus/html • http://i122.photobucket.com/albums/o272/softarchive/img13/26909_s__avast_pro_v_1.jpg • http://store.solutions-inc.co.uk/image/intego_vb_nig.jpg • http://www.freebyte.com/anivirus/ • http://resnet.uidaho.edu/Images/AVG_Antivirus_System_logo.jpg • http://www.m2tek.com/images/bitdefender10antivir.jpg • http://www.4pcfix.co.nz/Images/spyware.jpg
Works Cited Con’t… • http://www.tech-faq.com/adware.shtml • Http://www.adwarereport.com/mt/archives/000032.html • http://www.microsoft.com/protect/computer/basics/spyware.mspx • http://computer.howstuffworks.com/spyware1.htm • http://www.softwaretipsandtricks.com/windowsxp/articles/590/1/Different-types-of-spyware • http://www.riblio.com/riblio/box_front_spysweeper%5B1%5D.jpeg2.jpg • http://www.fxhstore.com/images/AdAware3DproBox.gif • http://magaria.com/blo/image/counterspy-lores.jpg • http://www.microsoft.com/protect/yourself/phishing/identify.mspx • http://www.networksecurityjournal.com/features/44-ways-protect-phishing/ • http://static.howstuffworks.com/gif/phishing-1.jpg • http://www.dmccormick.org/pictures/firewall.jpg • http://www.codinghorror.com/blog/images/dlink-dgl4500.jpg • http://www.codinghorror.com/blog/images/dlink-dgl4500.jpg • http://www.serif.com/serifextra/products/pcsystemtools/DesktopFirewall/DesktopFirewall.jpg • http://cdn.overstock.com/images/products/3/L10320704.jpg