+ All Categories
Home > Documents > By Joshua T. I. Towers. 13.3 $13.3 billion was the direct cost of malware for business in 2006...

By Joshua T. I. Towers. 13.3 $13.3 billion was the direct cost of malware for business in 2006...

Date post: 19-Dec-2015
Category:
View: 216 times
Download: 2 times
Share this document with a friend
Popular Tags:
23
Malware Protection By Joshua T. I. Towers
Transcript

Malware ProtectionBy

Joshua T. I. Towers

13.3

$13.3 billion was the direct cost of malware for business in 2006

“direct costs are defined as labor costs to analyze, repair and cleanse infected systems, loss of user productivity, loss of revenue due to loss or degraded performance of system, and other costs directly incurred as the result of a malware attack”

http://www.computereconomics.com/article.cfm?id=1225

29,354,532Microsoft desktop anti-malware products cleaned computers in the united states 29,354,532 times in 2009

http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/

What is Malware?

malware is “Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.”

- http://www.techterms.com/definition/malware

Types of Malware

Viruses

Worms

Trojan Horses

Spyware

RootKits

Viruses

•Most well know

form of malware

•Replicates self

•Attaches to files

and emails

•Spreads from

machine to

machine http://www.computerfixx.biz/allaboutinfections2.html

Worm

•Replicates self

•Spreads through network traffic

•Attaches to files

http://israelmatzav.blogspot.com/2010/09/six-mysteries-about-stuxnet-computer.html

Trojan Horses

•Can not replicate self•Disguised as interesting or useful programs or links•May drop off other forms of malware into your system

http://www.linux4windows.com/Articles/trojan_horse_software.html

Spyware

•Can not replicate self•Usually hidden inside of other more appealing programs and links•Accesses personal info and transmits it back to its source

http://removingspywareeasy.com/

RootKits

•Individual or collection of programs used to gain admin access with out being detected•Turns computers into zombies for the use of their creator

http://computer.howstuffworks.com/zombie-computer.htm

Threats of MalwareEfficiency loss

Malware can remain active with out your knowledge and slow your computer or network down.

Open back doors A back door is a hole in a computers security

that can be used by either the creator or, other malware, or hackers.

Threats of Malware cont.Stealing information

through the use of such tools as key loggers malware can steal personal information (passwords, credit card numbers, etc.)

Downloading of unwanted contentSome malware will download unwanted

content onto you computer

Nature of MalwareEvolution

As time passes new different malicious acts are added to the repertoire of malware.

Expansion New malware is added to the long list all the

time

DefenseSimple steps for basic protection against

malwareMake sure your fire wall is activeKeep your operating systems updatedKeep your anti-spyware software updatedKeep your anti-virus software updated Use strong passwords

Anti-Virus SoftwareBitDefender AntivirusKaspersky Anit-Virus

Webroot AntivirusNorton AntiVirus

ESER Nod32 AntivirusAVG AntiVirus

G DATA AntiVirusAvira AntiVir

Vipre AntivirusTrend Micro Titanium

http://anti-virus-software-review.toptenreviews.com/ppc-index.html

Criteria for choosingScope of Protection

Effectiveness

Ease of installation and setup

Ease of use

Features

Updates

Help and Support

The RiddingSimple steps for the removal of some

malware

Create a backup

Scan for malware

Clean the registry

Run operating system updates

Remove any recently added hardware or

software

If that doesn’t work

“Safe Mode loads a “bare bones” version of windows and disables 90% of viruses and their protection mechanisms.” - http://remove-malware.com/how-to/how-to-remove-malware-for-free/

And scan again

Whether those steps work or not there are

COSTS

IN CONCLUSION Malware protection is very important

http://www.computereconomics.com/article.cfm?id=1225http://www.techterms.com/definition/malwarehttp://www.spamlaws.com/malware-types.htmlhttp://www.itsecurity.com/features/real-cost-of-malware-112807/http://www.cmsconnect.com/Marketing/viruscalc.htmhttp://support.microsoft.com/kb/129972http://www.webopedia.com/TERM/S/spyware.htmlhttp://www.best-spyware-removal.com/what-is-spywarehttp://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htmhttp://www.webopedia.com/DidYouKnow/Internet/2004/virus.asphttp://www.zsecurity.com/articles-rootkits.phphttp://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htmhttp://bigbluewater.com/blog/article/when-is-it-time-to-reload-your-operating-systemhttp://www.microsoft.com/security/pc-security/protect-pc.aspxhttp://remove-malware.com/how-to/how-to-remove-malware-for-free/http://www.rendervisionsconsulting.com/blog/malware-trends-statistics/http://anti-virus-software-review.toptenreviews.com/ppc-index.htmlhttp://www.webroot.com/En_US/csc/malware.htmlhttp://en.wikipedia.org/wiki/Malwarehttp://www.zsecurity.com/articles-rootkits.php

References


Recommended