1 / 10

Malicious Attacks

Malicious Attacks. By: Albert, Alex, Andon , Ben, Robert. Examples of Malicious Attacks. Malware Infectious Concealment Spyware Phishing Spam Active Hacking. How Computers Become Infected.

winona
Télécharger la présentation

Malicious Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malicious Attacks By: Albert, Alex, Andon, Ben, Robert

  2. Examples of Malicious Attacks • Malware • Infectious • Concealment • Spyware • Phishing • Spam • Active Hacking

  3. How Computers Become Infected • As the number of people using computers increased the number of people targeting computer users has also increased. • With the immergence of The Microsoft Windows operating system the amount of Malware “in the wild” skyrocketed. • By visiting “illicit” websites the chance of infection rises significantly.

  4. Infection • If connected to the internet it is recommended not to visit any websites you don’t trust. Attempt to answer any flashing banners or open any suspicious emails. • Simply being connected to a network is not a risk, IF you maintain your system updates as well any antivirus software

  5. How to Prevent Infection • Anti-virus software • Firewall • Increasing security settings for internet browsers • Updating OS • Being smart (i.e. don’t reply to the Nigerian Prince asking for money)

  6. Steps Taken to Lessen Problem • OS companies constantly releasing updates to patch security holes • Anti-virus programs keep downloading new definition lists • Encryption is used, 256-bit can’t be broken through “brute force”

  7. Types of Damage • Duplicate and distribute virus • Install more malicious programs • Steal keystrokes and passwords • Show advertisements • Take remote control • Attack other systems • Send Spam • Botnet • Slow and overload system • Usually used against Servers • No longer just destroy a computer

  8. Why its an Issue • Reduces efficiency • Privacy violated • Huge cost of prevention and removal • Stealing information

  9. Dealing with Malicious Attacks • Anti-virus software • CMU Provides Symantec or Norton for free • System Restore for windows • If all else fails: reformat • Best practice is to prevent infections

  10. Viruses so far have been really disappointing on the 'disable the internet' front, and time is running out. When Linux/Mac win in a decade or so the game will be over. Title Text:

More Related