Date post: | 07-Feb-2016 |
Category: |
Documents |
Upload: | ishwarkp17 |
View: | 19 times |
Download: | 0 times |
Job Description
Associate Threat Research Engineer
(Malware Analyst)
• Examine, identify, and understand the nature of cyber-threats such as viruses, worms, bots, rootkits, and Trojan horses.
• Perform research of malicious software and exploitation tactics.
• Provide a detail-oriented technical report of the malware, identification parameters and advanced capabilities.
Key Skills
• C• C++• Operating Systems• Networking
Module – I
Malware
Internet-The Black Side
Introduction to
Malwares
What is Malwares?
• Malware is for “Malicious Software”.
Examples of Malwares
Examples of Malwares
• Virus
• Worms
• Trojan Horses
Examples of Malwares
• Virus
• Worms
• Trojan Horses
Examples of Malwares
• Virus
• Worms
• Trojan Horses
Trojan Horses
How to protect your computer from Malware…???
How to protect your computer from Malware…???
• Make sure automatic updating is turned on to get all the latest
security updates.
• Keep your firewall turned on.
• Don't open spam email messages or click links on suspicious
websites.
• Download Microsoft Security Essentials, which is free, or another
reputable antivirus and anti-malware program .
• Scan your computer with the Microsoft Safety Scanner.
Warning• Cybercriminals sometimes try to trick you into downloading rogue
(fake) security software that claims to protect you against malware.
This rogue security software might ask you to pay for a fake
product, install malware on your computer, or steal your personal
information.
• Don't click links in email messages and avoid websites that offer
free software—especially free antivirus software.
End of Module - I