1 / 18

Information Assurance and Security

Information Assurance and Security. Malware. By: Andrew Mitura. Discussion:. What is Mal Ware? Watch a video: (May 27, 2008) Top 3 virus of 2008? How to prevent Malware? How should companies try and fight off these threats ? Conclusion. Malware………….. .

ronna
Télécharger la présentation

Information Assurance and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Assurance and Security Malware By: Andrew Mitura

  2. Discussion: • What is Mal Ware? • Watch a video: (May 27, 2008) • Top 3 virus of 2008? • How to prevent Malware? • How should companies try and fight off these threats? • Conclusion

  3. Malware………….. • Software designed to infiltrate or damage a computer system without the owner's informed consent.” <http://en.wikipedia.org/wiki/Malware>

  4. Watch a Video • Watch a video: (May 27, 2008)

  5. 3 notable viruses of 2008: • Conficker • Koobface • MacSweeper

  6. Conficker • November 2008 • How: • Infected numerous computers by finding open ports in Windows Networks • NetBIOS • Directory attack on Admin$ shares • later propagated thru the use of removable media. • DDL-based Auto Run Trojan

  7. Conficker damages: • Est. infected computers: 9-15 million. • Notables: • French navy could not fly their planes, due to they could not download flight plans • Virus: • disables safe mode • Kills anti-malware • Disables auto-update

  8. How many people use: FACEBOOK, MySpace, hi5,Bebo, Friendster, and Twitter?

  9. Koobface • July 31, 2008 • How: • sent a link to go to a site from potentially someone you don’t know. Once on the site, users are prompted to update their Adobe Flash player. • Adobe Flash player had been hacked

  10. Koobface Damages: • Between 13 and 19 July, the infection rate has increased by 114% for users from the US and by 198% for the UK users. During the same period, infections of French Twitter users have increased by a whopping 371%.

  11. How many virus have hit a Mac?

  12. MacSweeper • Struck January 17 2008 • 1st virus of the Mac OS X Operating system. • How: • Virus attached itself to the spyware, adware removers of the computer. Coerced users to purchase additional software to remove infection.

  13. So how can we/companies prevent Malware? • Hire an Information Assurance specialist? http://hodes.jobhost.org/viewjob.php?id=600201

  14. What is Information Assurance? • “The technical and managerial measures designed to ensure the confidentiality, possession or control, integrity, authenticity, availability and utility of information and information systems. This term, which has spread from government use into common parlance, is sometimes synonymous with information security.” <http://www.pcmag.com/encyclopedia_term/0,2542,t=information+assurance&i=44936,00.asp>

  15. Information Assurance/NIST Guidelines • Access Control • Awareness and Training • Audit and Accountability • Certification • Accreditation • Security Assessments • Configuration Management • Contingency Planning • Identification and Authentication, • Incident Response • Maintenance • System and Services Acquisition http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf

  16. Conclusion: • So how can we/companies prevent Malware? • Hire an Information Assurance Specialist

  17. Questions:

  18. Information Assurance and Security Malware By: Andrew Mitura

More Related