Introduction to Computing Week4

Introduction to Computing

Intended Learning Outcomes

• Explain what is Malware

• Recognize different types of Malwares

• Explain what is Computer Security and its importance

• Describe different types of Computer Security

MALWARE & COMPUTER SECURITY

HISTORY OF MALWARE

The term malware was first used by computer scientist and security researcher Yisrael Radai in 1990. However, malware existed long before this.

One of the first known examples of malware was the Creeper virus in 1971, which was created as an experiment by BBN Technologies engineer Robert Thomas. Creeper was designed to infect mainframes on ARPANET. While the program did not alter functions or steal or delete data, it moved from one mainframe to another without permission while displaying a teletype message that read, "I'm the creeper: Catch me if you can." Creeper was later altered by computer scientist Ray Tomlinson, who added the ability to self-replicate to the virus and created the first known computer worm.

The concept of malware took root in the technology industry, and examples of viruses and worms began to appear on Apple and IBM PCs in the early 1980s before becoming popularized following the introduction of the World Wide Web and the commercial internet in the 1990s. Since then, malware -- and the security strategies to prevent it -- have only grown more complex.

WHAT IS MALWARE?

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

WHAT DOES MALWARE DO?

Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way.

Depending on the type of malware and its goal, this harm may present itself differently to the user or endpoint. In some cases, the effect malware has is relatively mild and benign, and in others, it can be disastrous.

HOW DO MALWARE INFECTIONS HAPPEN?

Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks.

For example, malicious programs can be delivered to a system with a USB drive, through popular collaboration tools and drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge.

WHAT ARE THE DIFFERENT TYPES OF MALWARE?

Different types of malware have unique traits and characteristics. Types of malware include the following:

• A virus is the most common type of malware that can execute itself and spread by infecting other programs or files.

• A worm can self-replicate without a host program and typically spreads without any interaction from the malware authors.

• A Trojan horse is designed to appear as a legitimate software program to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.

• Spyware collects information and data on the device and user, as well as observes the user's activity without their knowledge.

• Ransomware infects a user's system and encrypts its data.

Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.

• A rootkit obtains administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.

• A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected computer system that enables threat actors to remotely access it without alerting the user or the system's security programs.

• Adware tracks a user's browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. For example, an advertiser might use cookies to track the webpages a user visits to better target advertising.

• Keyloggers, also called system monitors, track nearly everything a user does on their computer. This includes emails, opened webpages, programs and keystrokes.

HOW TO DETECT MALWARE?

Users may be able to detect malware if they observe unusual activity such as a sudden loss of disk space, unusually slow speeds, repeated crashes or freezes, or an increase in unwanted internet activity and pop-up advertisements.

Antivirus and antimalware software may be installed on a device to detect and remove malware.

These tools can provide real-time protection or detect and remove malware by executing routine system scans.

Malware response plan

Keep these six basic steps in mind when creating your malware response plan

° Identify: Identify which endpoints have been impacted by the attack.

° Communicate: Once the impact of the attack and the point of entry have been identified, communicate your findings to necessary parties ASAP.

° Block: If possible, block any further access from the origin of the malware, such as the originating website, email or IP address.

° Restore: Put affected data back in a known-good state where there is no chance of malware remaining. This can be done with reimaging, rebuilding or a combination of the two.

° Recover: Recover as much affected data as you can using available backups. This is particularly applicable to ransomware attacks.

° Re-examine: Sit back and take a hard look at your current security strategy and what allowed the malware to get through in the first place. By analyzing and sealing these gaps, you protect your organization from a similar attack in the future.

STEPS TO PROTECT COMPUTER

1. Turn on an Internet firewall

2. Keep your operating system up to date

3. Install and maintain antivirus software

4. Install and maintain antispyware

TURN ON AN INTERNET FIREWALL

An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet

KEEP YOUR SYSTEM UPDATED

• Install all security updates as soon as they are available

• Automatic updates provide the best protection

INSTALL ANTIVIRUS SOFTWARE

• Antivirus software can detect and destroy computer viruses before they can cause damage.

• Just like flu shots, for antivirus software to be effective, you must expire keep it up to date. Don’t let it Expire

Install & Maintain Antispyware Software

Use antispyware software so unknown people cannot lurk on your computer and potentially steal your information.

OTHER WAYS TO PROTECT YOUR PC

1. Back up your files regularly

2. Read website privacy statements

3. Install Spyware Blaster

4. Practice safe E-mail

5. Close pop-ups using red “X”

6. Update your Application

7. Lock your screen

Back Up Your Files

• Save to CD or DVD

• Use a Web-based backup service

PRACTICE SAFE E-MAIL

Don’t open e-mail attachments unless you know what they contain and who sent them.

Attachment ends with a .exe, .com, .bat, do not open the attachment unless you know for a fact that it is clean.

Don’t open, forward, or reply to suspicious e-mails

Delete spam

STEPS TO ENSURE COMPUTER SECURITY

Here are some of the easy steps by which you can ensure the security of your computer system:

· Always keep your computer system and software updated to its latest version.

· If you are suspicious about having any malfunction in your system then do check it thoroughly.

· Install a protective firewall in your computer system.

· Adjust your browser settings and remove the risks of malware.

· Install good antivirus software in your system.

· Set a password and protection lock to secure your device.

STEPS TO ENSURE COMPUTER SECURITY

· Make sure that you encrypt your data so that any man cannot get the hang of the information.

· Use a VPN for additional production of your device.

· Do not click emails or links sent to you by unknown members.

· Ignore the pop-ups and do not click on them.

· Perform regular system backups and scans.