The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by keclark03, 2019-03-11 14:24:48

DPR

DPR

TechNo Wave

TechNo Wave is the new wave of technology.

Software and Development

TechNo Wave Senior Leadership

Uriana Medelin: Kameron Clark:

Chief Executive Officer of President of Board and Chief
TechNo Wave Operations of TechNo Wave

Zaria Logan: Jordan Williams:

Chief of Software Senior Software Developer
Development

Objectives

1. The objective of this presentation is for audience and supports to
develop a understanding of what Malicious Software in addition to
understanding how it can affect your technology devices in a
negative way.

a. You will learn the history of Malicious Software during this presentation.
b. You will about the 3 main types of Malicious Software.
c. You will learn the prevention strategies.

What is Malicious Software

1. According to Veracode, Malicious Software aka Malware, is software
that can be used to compromise computer functions, steal data,
bypass access controls, or otherwise cause harm to the host
computer. Malware is a broad term that refers to a variety of
malicious programs. This post will define several of the most
common types of malware; adware, bots, bugs, rootkits, spyware,
Trojan horses, viruses, and worms.

2. The earliest documented viruses began to appear in the early 1970s.
3. Historians often credit the “Creeper Worm,” an experimental

self-replicating program written by Bob Thomas at BBN
Technologies with being the first virus.

History of Malicious Software

1. Historians often credit the “Creeper Worm,” an experimental
self-replicating program written by Bob Thomas at BBN
Technologies with being the first virus.

2. The First Malware was created to create awareness, it gained
access by the ARPANET and copied itself to remote systems where it
displayed the message: “I’m the creeper, catch me if you can!”

3. The First Malware was created to create awareness, it gained access
by the ARPANET and copied itself to remote systems where it
displayed the message: “I’m the creeper, catch me if you can!”

Worm

1. Computer worms are among the most common types of
malware. They spread over computer networks by exploiting
operating system vulnerabilities.

2. Worms typically cause harm to their host networks by consuming
bandwidth and overloading web servers. Computer worms can also
contain “payloads” that damage host computers. Payloads are
pieces of code written to perform actions, designed to steal data,
delete files, or create botnets.

3. Worms often spread by sending mass emails with infected
attachments to users’ contacts.

4. They are detected by running Anti-virus programming and
Anti-spyware programming

Spyware

1. Spyware is a type of malware that functions by spying on user
activity without their knowledge. (Can be found on tablets)

2. These spying capabilities can include activity monitoring,
collecting keystrokes, data harvesting, and more. Ranging from
modifying security settings of software or browsers to interfering
with network connections.

3. Spyware spreads by exploiting software vulnerabilities, bundling
itself with legitimate software, or in Trojans.

4. The factory reset will wipe out everything from apps to your
contacts and saved settings, and for that reason, it’s one of the best
ways to ensure that you get rid of all tracking software that might
be present on the device.

Trojans Horse

1. A Trojan horse is a type of malware that disguises itself as a normal
file or program to trick users into downloading and installing
malware, and can be found on many types of computers such
phones, tablets, and others.

2. A Trojan can give a malicious party remote access to an infected
computer, once accessed the infected computer, it is possible for
the attacker to steal data (logins, financial data, even electronic
money), install more malware, modify files, monitor user activity,
use the computer in botnets, and anonymize internet activity by the
attacker.

3. To rid of trojans use Rkill to terminate suspicious programs.

Detection

1. Virus Detection is a process that users of electronics go through
to assure that their devices are free of any viruses.

2. Virus Detection has a series of steps that, in a summary, scan a
device of all of its storage, history, and downloads to see if or how
your computer developed the virus and works to eliminate the
virus from the device.

3. Once detection of the computer is complete, you should have your

Prevention

1. Prevention is a process to solidify your computer’s status as a safe
device.

2. Prevention also takes a series of steps to complete, although it takes
a longer period of time to finish; It makes sure that once the
computer loses the virus, that the virus does not return to the
computer.

3. Prevention mainly includes timely and routine checks on your
computer to ensure safety at all times.

Removal

1. The first step of the reaction process in to enter safe mode in order
to ensure that nothing else attacks the computer during the process
of acknowledging the virus and the process of eliminating the virus

2. Then next step is to delete temporary files to speed up the
scanning process, free up disk space, and remove some malware.

3. Now you are ready for a download scanner to do its work, you will
download malware scanners which in most cases, will remove
standard infections. If you have downloaded a scanner before, you
should download another one since your current antivirus scanner
didn’t detect the virus at first sight.

Removal (Continued)

4. The last step of this process will be to run a scan with Malwarebytes.
This scan will inspect all of primary storage and download units of your
computer to make sure that there is nothing left unchecked through
the scanning process.

_______________ often spread by sending mass
emails with infected attachments to users’
contacts.

Worms

True or False: The factory reset will wipe out all
tracking software that might be present on the
device.

True

What is Malicious Software?

It is software that can be used to
compromise computer functions,
steal data, bypass access
controls, or otherwise cause harm
to the host computer

Career Connection -Cyber Security Engineer - Remote

1. Web infrastructure setup,
programming and configuration as
needed

2. Design and develop new web
applications, as directed, through
collaboration with management, the
web development team, and/or
customers

3. Maintain and enhance existing web
applications

4. Perform complete testing of web
applications, engaging users as
necessary

5. Design and implement user-driven
templates, databases...

Summary

1. Malware, is software that can be used to compromise computer
functions, steal data, bypass access controls, or otherwise cause
harm to the host computer.

2. Historians often credit the “Creeper Worm,” an experimental
self-replicating program written by Bob Thomas at BBN
Technologies with being the first virus.

3. Computer worms are among the most common types of malware,
Worms often spread by sending mass emails with infected
attachments to users’ contacts.

4. They are detected by running Anti-virus programming and
Anti-spyware programming to rid worms

Summary

1. Spyware is a type of malware that functions by spying on user
activity without their knowledge, capabilities can include activity
monitoring, collecting keystrokes, data harvesting, and more.

2. The factory reset will wipe out everything from apps to your contacts
and saved settings, and for that reason, it’s one of the best ways to
ensure that you get rid of all tracking software that might be present
on the device.

3. A Trojan can give a malicious party remote access to an infected
computer, once accessed the infected computer, it is possible for
the attacker to steal data

4. To rid of trojans use Rkill to terminate suspicious programs.

Biography

“Common Malware Types: Cybersecurity 101.” CA Veracode, 21 Dec. 2018,
www.veracode.com/blog/2012/10/common-malware-types-cybersecurity
-101.

“A Brief History of Malware-Its Evolution and Impact.” Lastline, 14 May
2018,
www.lastline.com/blog/history-of-malware-its-evolution-and-impact/.

Duvauchelle, Joshua. “How to Kill a Computer Worm.” It Still Works, 10
Jan. 2019, www.itstillworks.com/kill-computer-worm-4813694.html.

Video


Click to View FlipBook Version