1 / 9

Internet Threats

Internet Threats . By Lucas Fernández Mosquera . Malware. A malware is a software designed to infiltrate a computer system without the owner's informed consent . In this presentation I will analyse the three most common and harming type of malware: Virus Trojan Worm Non harming malware.

deo
Download Presentation

Internet Threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Threats By Lucas Fernández Mosquera

  2. Malware A malware is a software designed to infiltrate a computer system without the owner's informed consent. In this presentation I will analyse the three most common and harming type of malware: Virus Trojan Worm Non harming malware

  3. Virus A computer virus is a program that, at difference of the Worms or Trojans, it can copy itself, and affects a single computer. It can also spread from a computer to another when sent over a Network or the Internet, or else, carried on a removable medium. The most known and harmful virus was the Chernobyl.

  4. Chernobyl Virus It is considered to be one of the most harmful widely circulated virus, overwriting critical information on infected system drives, and more importantly, in some cases corrupting the system BIOS. It used to attacked on 26th of each month (depending on the version), erasing the hard disk and eliminating the flash ROM BIOS system. Back to malware

  5. Trojan • A non-self-replicating malware that appears to perform a desirable function for the user, but instead, facilitates unauthorized access to the user's computer system. One of the most popular Trojans is the Mocmex.

  6. Mocmex • Mocmex collects passwords for online games. The virus is able to recognize and block antivirus protection from more than a hundred security companies and the Windows built-in firewall. Mocmex downloads files from remote locations and hides randomly named files on infected computers. Therefore, the virus is difficult to remove. It is believed that it caused several damage in the system of a toy production company. Back to malware

  7. Worm • A computer worm is a self-replicating Malware computer program which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. The most popular worm is the Sasser worm.

  8. Sasser Worm • News agency Agence France-Presse had all communication satellite blocked for hours. • The U.S. flight company Delta Air Lines having to cancel several trans-atlantic flights because its computer systems had been swamped by the worm. • The Nordic insurance company If and their Finnish owners, Sampo Bank, came to a complete halt and had to close their 130 offices in Finland. • The British Coastguard had its electronic mapping service disabled for a few hours. Technical Characteristics Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. It spreads by exploiting the system through a vulnerable network port. Thus it is particularly virulent in that it can spread without user intervention, but it is also easily stopped by a properly configured firewall or by downloading system updates from Windows Update. Back to menu All this work was made based on the Wikipedia encyclopedia´s definitions

  9. Spyware • The Spyware is the only malware that is not harmful. It is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as key loggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. Back to menu

More Related