The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Grant Carter, Ethan Lowry, Jerry Hill, Julian Davis

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by grantpcarter1, 2019-03-14 14:44:07

Strike Blockade

Grant Carter, Ethan Lowry, Jerry Hill, Julian Davis

OBJECTIVES Malware

You will learn how to

DETECT

-NEUTRALIZE

ERADICATE

History

➔ When was the first malware discovered?

◆ The first malware was found in 1982 on a mac, it was called “Elk
Cloner”, it showed inverted or false displays and made clicking noises, it
was spread via disk

➔ Why was malware first created?

◆ It was first created as silly, mostly harmless, pranks, that weren’t paid
much attention by the computer community

➔ Who first used the term malware?
◆ Professor Leonard M. Adleman used the term "computer virus" for the
first time in conversation with Fred Cohen in 1981

➔ What is malware?
◆ Malware is a software designed to infect a device, harm it, slow it down,
steal personal info, etc.

Types of Malware

➔ Virus- a piece of code which is capable of copying itself
and typically has a detrimental effect, such as corrupting
the system or destroying data.

➔ Worms- a standalone malware computer program that
replicates itself in order to spread to other computers.

➔ Trojan Horses- A software that tricks people into believing
that the program is something they need/want but in
reality it steals personal information and can hurt the
computer and accounts

Viruses

➔ Virus: a piece of code which is capable of copying itself and typically
has a detrimental effect, such as corrupting the system or destroying
data.

➔ Detection: If files on your computer are mysteriously disappearing
then you might have a virus, antivirus software will also detect
these.

➔ Removal: Download Antivirus software and use it on a regular basis

➔ Prevention: Never click on sketchy links. Never open emails unless
you know for a fact who sent them. Run Anti-virus software on a
regular basis

Worms

➔ Worms: a standalone malware computer program that replicates
itself in order to spread to other computers.

➔ Detection: Your computer will run slower than usual, network
connections might be slow as well.

➔ Removal: Download Antivirus software and use it on a regular basis

➔ Prevention: Never open emails unless you know for a fact who sent
it, use antivirus software on a regular basis

Trojan Horses

➔ Trojan Horses- A software that tricks people into believing that the
program is something they need/want but in reality it steals personal
information and can hurt the computer and accounts

➔ Detection: If there are programs that you don’t remember installing
you might have one. If a link you clicked on didn’t do what it said it
would you might have one.

➔ Removal: Download Antivirus software and use it on a regular basis

➔ Prevention: Don’t click on any links unless you know that they are
trustworthy. Use antivirus software on a regular basis

How to DPR Emotet

➔ We will be teaching you how to Detect, Prevent, and
Remove Emotet from your computer

Emotet

➔ Type of Malware: Emotet is a Trojan Horse
➔ Date Discovered: Emotet was discovered in 2014.
➔ Devices affected: PC’s and Macs are affected.

What Does Emotet Do?

➔ How does it spread? Emotet is spread by spam emails
where it tries to get you to click on a malicious file that
looks like a safe file.

➔ How does is infect the device? Emotet brings other
malware to your computer. Emotet is especially used
with banking malware, which steals your banking info and
money.

How to get rid of
Emotet

➔ How do you get rid of Emotet? To get rid of Emotet you
will need to download a very good antivirus program that
specializes in getting rid of it

How to DPR a Virus

➔ We will be showing how to DPR a Virus that has infected
a computer

Detection

➔ While it is 100% recommended to have a antivirus
software installed, and is necessary for removal of a
virus. It is not necessary (but is recommended) to detect
viruses.

➔ Ways to detect viruses
◆ Use an antivirus software to run checks on your
computer regularly.
◆ Check to see if files on your computer are appearing
or disappearing without you knowing.
◆ Check to see if your device is transmitting lots of data
on the network, if it is you might be infected.

Prevention

➔ There are several ways you can prevent yourself from
getting viruses
◆ Have an antivirus software on your computer and run
it regularly.
◆ Never click on links that you don’t know are safe.
◆ Never open emails that you don’t know who sent it
and are trustworthy.
◆ Always keep your antivirus software as well as your
computer software up to date

Removal

➔ Step 1
◆ Check your device for possible viruses.

Removal

➔ Step 2
◆ If you have the signs of a virus, look for an antivirus
software to download on your computer that
specializes in viruses.

Removal

➔ Step 3
◆ Install the antivirus software (Strikeblockade is the
best one overall and the one you should choose)on
your computer.

Removal

➔ Step 4
◆ Open the antivirus software once it’s installed and tell
it to run a scan on your computer.

Removal

➔ Step 5
◆ Once the antivirus software has found the virus tell it
to isolate the virus.

Removal

➔ Step 6
◆ Once the antivirus software has isolated the virus, tell
it to start removal of the virus.

Removal

➔ Step 7
◆ Once the virus has been removed tell the antivirus
software to start damage control on all of your files.

Removal

➔ Step 8
◆ Once the virus is gone, change all of your passwords
and call your bank to change your financial security
passwords and get a new debit/credit card.

Removal

➔ Step 9
◆ Once you have changed all your passwords, etc, tell
all of your friends, family members and people you
have been in contact with on the internet about what
happened and recommend they run their antivirus
software themselves to make sure they don’t have a
virus as well.

Removal

➔ Step 10
◆ Keep your antivirus software up to date and run scans
on your computer regularly

Review Questions

➔ True or False. You should always click on emails if you
don’t know who the sender is.

Review Questions

➔ The 3 types of malware we went over are _______,
_______, and _______.

Review Questions

➔ Emotet is a malware called a ______ ______.

Career Connection

➔ A career that uses antivirus technology is being an I.T.
Specialist (Information Technology Specialist)

➔ They get paid $55,153 per year on average
➔ They use their technology skills to help install and update

software on computers,help people work their computer,
and install and maintain antivirus software and help get
rid of any malware that gets on the devices

Summary

➔ Our group learned that there are lots of very dangerous
malware threats out there currently.

➔ We learned to never open emails and attachments from
people we don’t know and/or trust.

➔ We learned that it is very important to keep all antivirus
software up to date as well as computer software in
general.

➔ We learned that Trojan Horse malware can be used to
steal your banking info as well as your money

Summary

➔ We learned that worms are standalone malware
computer program that replicates itself in order to
spread to other computers.

➔ We learned that viruses are a piece of code which is
capable of copying itself and typically has a detrimental
effect, such as corrupting the system or destroying data.

➔ We learned to never click on links or download files that
we don’t know for sure are safe

➔ We learned how dangerous the internet actually is and
why we should always protect our devices

Bibliography

➔ Benton, Brian. “Infected! 10 Tips How To Prevent Malware On Your Computer.” Redshift
EN, Redshift EN, 21 Dec. 2018,
www.autodesk.com/redshift/10-tips-on-how-to-prevent-malware-from-infecting-your-com
puter/.

➔ Armendariz, Tommy. “Top Malware Threats and How to Protect Yourself.” Lifewire,
Lifewire, 27 Aug. 2018, www.lifewire.com/top-malware-threats-153641.

➔ G DATA Software AG. “History of Malware.” G DATA Software AG, 14 May 2013,
www.gdata-software.com/seccuritylabs/information/history-of-malware.

Business Card

Magazine Cover

Video LInk

https://drive.google.com/file/d/1C_mWmLLd4yJ7HhnjtkO32E4m_Qy-Fqj2/view?
usp=sharing


Click to View FlipBook Version
Previous Book
Strike Blockade
Next Book
Mahopac News 03.14.19