Malware Protection - Murray State University

Malware Protection - Murray State University

Malware Protection By Joshua T. I. Towers 13.3 $13.3 billion was the direct cost of malware for business in 2006 direct costs are defined as labor costs to analyze, repair and cleanse infected systems, loss of user productivity, loss of

revenue due to loss or degraded performance of system, and other costs directly incurred as the result of a malware attack http://www.computereconomics.com/article.cfm? 29,354,5 32 Microsoft desktop antimalware products cleaned computers in the united

states 29,354,532 times in 2009 http:// www.rendervisionsconsulting.com/ What is Malware? malware is Short for "malicious software," malware refers to software programs designed to damage or do other unwanted

actions on a computer system. http://www.techterms.com/definition/malware Types of Malware Viruses Worms Trojan Horses Spyware RootKits Viruses

Most well know form of malware Replicates self Attaches to files and emails Spreads from machine to machine

http://www.computerfixx.biz/ allaboutinfections2.html Worm Replicates self Spreads through network traffic Attaches to

files http://israelmatzav.blogspot.com/ 2010/09/six-mysteries-about-stuxnetcomputer.html Trojan Horses Can not replicate self Disguised as

interesting or useful programs or links May drop off other forms of malware into your system http://www.linux4windows.com/ Articles/trojan_horse_software.html

Spyware Can not replicate self Usually hidden inside of other more appealing programs and links Accesses

personal info and transmits it back to its source http://removingspywareeasy.com/ RootKits Individual or collection of programs used to gain admin

access with out being detected Turns computers into zombies for the use of their creator http://computer.howstuffworks.com/ zombie-computer.htm

Threats of Malware Efficiency loss Malware can remain active with out your knowledge and slow your computer or network down. Open back doors A back door is a hole in a computers security that can be used by either the creator or, other malware, or hackers. Threats of Malware cont.

Stealing information through the use of such tools as key loggers malware can steal personal information (passwords, credit card numbers, etc.) Downloading of unwanted content Some malware will download unwanted content onto you computer Nature of Malware Evolution As time passes new different malicious acts are

added to the repertoire of malware. Expansion New malware is added to the long list all the time Defense Simple steps for basic protection against malware

Make sure your fire wall is active Keep your operating systems updated Keep your anti-spyware software updated Keep your anti-virus software updated Use strong passwords Anti-Virus Software BitDefender Antivirus Kaspersky Anit-Virus Webroot Antivirus Norton AntiVirus

ESER Nod32 Antivirus AVG AntiVirus G DATA AntiVirus Avira AntiVir Vipre Antivirus Trend Micro Titanium http://anti-virus-software-review.toptenreviews.com/ppcindex.html Criteria for choosing Scope of Protection Effectiveness

Ease of installation and setup Ease of use Features Updates Help and Support The Ridding Simple steps for the removal of some malware Create a backup

Scan for malware Clean the registry Run operating system updates Remove any recently added hardware or software If that doesnt work Safe Mode loads a bare bones version of windows and disables 90% of viruses and

their protection mechanisms. - http:// remove-malware.com/how-to/how-to-removemalware-for-free/ And scan again Whether those steps work or not there are COSTS IN CONCLUSION

Malware protection is very important References http://www.computereconomics.com/article.cfm?id=1225 http://www.techterms.com/definition/malware http://www.spamlaws.com/malware-types.html http://www.itsecurity.com/features/real-cost-of-malware-112807/ http://www.cmsconnect.com/Marketing/viruscalc.htm http://support.microsoft.com/kb/129972 http://www.webopedia.com/TERM/S/spyware.html

http://www.best-spyware-removal.com/what-is-spyware http://compnetworking.about.com/cs/worldwideweb/g/ bldef_worm.htm http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp http://www.zsecurity.com/articles-rootkits.php http://compnetworking.about.com/cs/worldwideweb/g/ bldef_worm.htm http://bigbluewater.com/blog/article/when-is-it-time-to-reload-youroperating-system http://www.microsoft.com/security/pc-security/protect-pc.aspx http://remove-malware.com/how-to/how-to-remove-malware-for-free/ http://www.rendervisionsconsulting.com/blog/malware-trendsstatistics/

http://anti-virus-software-review.toptenreviews.com/ppc-index.html http://www.webroot.com/En_US/csc/malware.html

Recently Viewed Presentations

  • Journey maps and customer hacks: redesigning services at

    Journey maps and customer hacks: redesigning services at

    Observation around library, reading rooms, desks, enquiries (offsite and reftracker) Interviews with senior staff, across all areas. Ad hoc interviews along the way. All of this research resulted in four current state journey maps - Visual representation of the services...
  • Tourists/Leisure Travellers

    Tourists/Leisure Travellers

    Off train marketing- get people on the train. Linking the information. Combining train travel with activities at the destination. Advertising (Radio, TV, Newspaper, Magazines, Social Media, Google, Newsletter, Products, on everyday life (Toilet) poster at the station)
  • PM4: Social Emotional Skill Building for Young Children

    PM4: Social Emotional Skill Building for Young Children

    Support social-emotional learning (SEL) through integration of preschool and school-age evidence based practices. Links with PBIS. EEC Program Wide Implementation . ... Environmental visual cues assist children on where to stand in line and where to stop. Individual Schedule.
  • The Noble Eightfold Path - English Dharma Group

    The Noble Eightfold Path - English Dharma Group

    Understanding cause and effect. Understanding the Four Noble Truths. Right view is the forerunner of the entire path, the guide for all the other factors. It enables us to understand our starting point, our destination, and landmarks to pass as...
  • Inquiries into the Implications of the 2012 Removal

    Inquiries into the Implications of the 2012 Removal

    To observe how the localised management of post-primary guidance counselling services since the Budget 2012 allocation removal has developed in schools. To report on the research findings and make recommendations for future policy, practice and research relating to guidance counselling...
  • Dispersal to the Hawaiian Islands

    Dispersal to the Hawaiian Islands

    Fruits Eaten by Birds Shore bird thought to play major role in transporting of fruits and seeds to the Hawaiian Islands Migrate all of the Pacific Eat large amounts of fruits and seeds Capable of retaining fruits and seeds for...
  • WORD OF THE DAY Two-Front War: a war

    WORD OF THE DAY Two-Front War: a war

    December 8, 1942 the US declared war on Japan…. Four days later, Germany and Italy (allies of Japan) declared war on the United States. America was now engaged in a war on two fronts: European front and the Pacific front....
  • STARBUCKS SLRP - Where Are We?

    STARBUCKS SLRP - Where Are We?

    Starbucks brand has high recognition and positive reputation for high quality product and customer service. Starbucks has a large number of sales points, including company-owned stores and licensed stores (Starbucks retail product) The Company is transitioning from a focus on...