Você está na página 1de 46

Malware and

Computer Security

CC101 - INTRODUCTION TO COMPUTING


LESSON 12-13 MALWARE AND COMPUTER SECURITY

LEARNING OUTCOMES:
At the end of the session, the students should be
able to:
1. Understand malware and computer security.
2. Learn how to Install different anti-virus software.
3. Implement a simple computer security measures
against malware.

CC101 – INTRODUCTION TO COMPUTING


2
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Introduction to
Computer Security

CC101 – INTRODUCTION TO COMPUTING


3
LESSON 12-13 MALWARE AND COMPUTER SECURITY

What is Computer Security?


•Computer security is refers to techniques for ensuring that
data stored in a computer cannot
be read or compromised by any individuals without
authorization.
•Most computer security measures involve data encryption
and passwords.
•The purpose of computer security is to device ways to
prevent the weaknesses from being
exploited.
•We are addressing three important aspects of any
computer-related system such as confidentiality, integrity,
and availability.
CC101 – INTRODUCTION TO COMPUTING
4
LESSON 12-13 MALWARE AND COMPUTER SECURITY

These are the


three goals in
computing
Security.
1.Confidentiality
2.Integrity
3.Availability

CC101 – INTRODUCTION TO COMPUTING


5
LESSON 12-13 MALWARE AND COMPUTER SECURITY

THREE GOALS IN COMPUTING


SECURITY
One of the challenges in building a secure system is finding the right
balance among the goals, which often conflict.
•Confidentiality: ensures that computer-related
assets are accessed only by authorized parties.
Confidentiality is sometimes called secrecy or
privacy.
•Integrity: it means that assets can be modified only
by authorized parties or only in authorized ways.
•Availability: it means that assets are accessible to
authorized parties at appropriate times.
CC101 – INTRODUCTION TO COMPUTING
6
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Security Concepts

CC101 – INTRODUCTION TO COMPUTING


7
LESSON 12-13 MALWARE AND COMPUTER SECURITY

VULNERABILITY
•Vulnerability is a weakness in the security system.
•Weaknesses can appear in any element of a
computer, both in the hardware, operating system,
and the software.
The types of vulnerabilities we might find as they
apply to the assets of hardware, software, and data.
•These three assets and the connections among
them are all potential security weak points.

CC101 – INTRODUCTION TO COMPUTING


8
LESSON 12-13 MALWARE AND COMPUTER SECURITY

HARDWARE VULNERABILITY
•Hardware is more visible than software, largely
because it is composed of physical objects.
•it is rather simple to attack by adding devices,
changing them, removing them, intercepting the
traffic to them, or flooding them with traffic until
they can no longer function.

CC101 – INTRODUCTION TO COMPUTING


9
LESSON 12-13 MALWARE AND COMPUTER SECURITY

SOFTWARE VULNERABILITY
• Software can be replaced, changed, or destroyed
maliciously, or it can be modified, deleted, or
misplaced accidentally. Whether intentional or not,
these attacks exploit the software’s vulnerabilities.

CC101 – INTRODUCTION TO COMPUTING


10
LESSON 12-13 MALWARE AND COMPUTER SECURITY

SOFTWARE VULNERABILITY
• Sometimes, the attacks are obvious, as when the
software no longer runs. More subtle are attacks in
which the software has been altered but seems to
run normally.

CC101 – INTRODUCTION TO COMPUTING


11
LESSON 12-13 MALWARE AND COMPUTER SECURITY

DATA VULNERABILITY
• a data attack is a more widespread and serious
problem than either a hardware or software attack.
• data items have greater public value than hardware
and software because more people know how to
use or interpret data.

CC101 – INTRODUCTION TO COMPUTING


12
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Threats to Computer
System

CC101 – INTRODUCTION TO COMPUTING


13
LESSON 12-13 MALWARE AND COMPUTER SECURITY

THREATS
• An interception means
that some
unauthorized party has
gained access to an
asset. The outside
party can be a person,
a program, or a
computing system.

CC101 – INTRODUCTION TO COMPUTING


14
LESSON 12-13 MALWARE AND COMPUTER SECURITY

THREATS
• In an interruption is an
asset of the system
becomes lost,
unavailable, or
unusable.

CC101 – INTRODUCTION TO COMPUTING


15
LESSON 12-13 MALWARE AND COMPUTER SECURITY

THREATS
• If an unauthorized
party not only accesses
but tampers with an
asset, is called as a
modification.

CC101 – INTRODUCTION TO COMPUTING


16
LESSON 12-13 MALWARE AND COMPUTER SECURITY

THREATS
• An unauthorized party
might create a
fabrication of counterfeit
objects on a computing
system.
• The intruder may insert
spurious transactions to
a network
communication system
or add records to an
existing database.
CC101 – INTRODUCTION TO COMPUTING
17
LESSON 12-13 MALWARE AND COMPUTER SECURITY

THREATS
What are the major threats to system security?
Here's a list of the top 10 security threats you should be aware of.

1. Privilege Escalation 6. Spam


2. Virus 7. Adware
3. Worm 8. Rootkits
4. Trojan 9. Botnets
5. Spyware 10.Logic Bomb

CC101 – INTRODUCTION TO COMPUTING


18
LESSON 12-13 MALWARE AND COMPUTER SECURITY

How to Arm Yourself Against


These Threats
• The list of system security threats is extensive and
growing. A defense strategy that includes anti-virus
software, system patching and timely software
updates are key to combating the problem. For system
administrators and end-users alike, understanding the
differences between these threats are the first step
towards being able to eradicate them.

CC101 – INTRODUCTION TO COMPUTING


19
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Potential Losses during


attacks

CC101 – INTRODUCTION TO COMPUTING


20
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Mapping cyber incidents to


potential losses
SOMETIMES, it’s easy to understand
the concept of cybercrime and
cybersecurity but difficult to really
picture how exactly a hacker can cause
you damage – and the extent of your
damage.

CC101 – INTRODUCTION TO COMPUTING


21
LESSON 12-13 MALWARE AND COMPUTER SECURITY

3rd party data confidentiality breach


This is a scenario where you give out information about your
clients or customers, with personally identifiable information.
There are some stellar examples out there, including Uber and
Equifax, that made headlines for weeks. For Equifax, the “hack”
event cost its CEO his job.
• Potential losses:
• Incident response costs
• Breach of privacy compensation
• Reputational damage
• Regulatory and legal defense costs
• Fines and penalties
• Directors and officers liability

CC101 – INTRODUCTION TO COMPUTING


22
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Own data confidentiality breach


This is usually a case where a hacker steals information
and “knowledge” stored in a company’s computer.
Sometimes, the ramifications can be severe.
• Potential losses:
• Intellectual property theft
• Directors and officers liability

CC101 – INTRODUCTION TO COMPUTING


23
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Operational technology malfunction


A lot of the technology in your office and factory is
electronic – and controlled with a command from a
nearby computer. In short, they’re programmable. If
hacked, they could cause significant damage to your
staff and even your customers.
• Business interruption
• Fines and penalties
• Physical asset damage
• Bodily injury and death
• Director and officers liability

CC101 – INTRODUCTION TO COMPUTING


24
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Network communication malfunction


With a lot of internal and external business relationships
dependent on networks, their malfunctioning can cause
severe damage to the company and its business.
• Potential losses:
• Business interruption
• Reputational damage
• Directors and officers liability

CC101 – INTRODUCTION TO COMPUTING


25
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Inadvertent disruption of a 3rd party system


Now this is something that’s easy to understand. Imagine owning a
device that you use to connect with a key supplier or client. Say, a
direct link to their software that allows you to query their inventory
and plan your purchases or sales.
• Potential losses:
• Network security failure liability
• Regulatory and legal defense costs

CC101 – INTRODUCTION TO COMPUTING


26
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Disruption of an external service provider


Again, an easy one to understand. Imagine relying on a CRM
or an ERP package that’s delivered to you as a service, via
the cloud. Now, imagine that the cloud and the provider are
hacked. It could potentially damage your workflow and
disrupt “bus
Potential losses: Contingent business interruptioniness as
usual” for a while.

CC101 – INTRODUCTION TO COMPUTING


27
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Disruption of an external service provider


Again, an easy one to understand. Imagine relying on a CRM
or an ERP package that’s delivered to you as a service, via
the cloud. Now, imagine that the cloud and the provider are
hacked. It could potentially damage your workflow and
disrupt “bus
Potential losses: Contingent business interruptioniness as
usual” for a while.

CC101 – INTRODUCTION TO COMPUTING


28
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Deletion or corruption of data


Getting your computer or corporate network infected with
malware not only risks your data but might also corrupt or
delete it. This data, whether on your own computer or on
another computer on your network, might be sensitive and
critical to your business operations.
• Potential losses:
• Data and software loss
• Regulatory and legal defense costs
• Product liability
• Directors and officers liability
CC101 – INTRODUCTION TO COMPUTING
29
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Deletion or corruption of data


Getting your computer or corporate network infected with
malware not only risks your data but might also corrupt or
delete it. This data, whether on your own computer or on
another computer on your network, might be sensitive and
critical to your business operations.
• Potential losses:
• Data and software loss
• Regulatory and legal defense costs
• Product liability
• Directors and officers liability
CC101 – INTRODUCTION TO COMPUTING
30
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Encryption of data
The most popular of the lot, this cyber incident
encompasses all the ransomware out there that infects
your computer, locks your data, and forces you to pay a
price for ignoring the threats in the cyberworld.
It’s affected everyone – from employees at government
organizations to private citizens running small businesses.
• Potential losses:
• Cyber ransom and extortion
• Directors and officers liability

CC101 – INTRODUCTION TO COMPUTING


31
LESSON 12-13 MALWARE AND COMPUTER SECURITY

Cyber fraud or theft


Finally, everyone’s nightmare – having your account hacked
and all your money stolen. Whether of personal or
company accounts, it can have severe ramifications and
cause a lasting impact.
In most cases, unfortunately, the monies are difficult to
recover.

• Potential losses:
• Financial theft and/or fraud
• Directors and officers’ liability

CC101 – INTRODUCTION TO COMPUTING


32
LESSON 12-13 MALWARE AND COMPUTER SECURITY

What makes a
system secure?

CC101 – INTRODUCTION TO COMPUTING


33
LESSON 12-13 MALWARE AND COMPUTER SECURITY

HOW TO SECURE THE COMPUTER


There are two ways
1.Physical secure
2.Other secure methods

CC101 – INTRODUCTION TO COMPUTING


34
LESSON 12-13 MALWARE AND COMPUTER SECURITY

PHYSICALLY SECURE COMPUTERS


• Obtain physical
computer locks for all
your computers

CC101 – INTRODUCTION TO COMPUTING


35
LESSON 12-13 MALWARE AND COMPUTER SECURITY

PHYSICALLY SECURE COMPUTERS


• Attach mobile
proximity alarms to
your computers.

CC101 – INTRODUCTION TO COMPUTING


36
LESSON 12-13 MALWARE AND COMPUTER SECURITY

PHYSICALLY SECURE COMPUTERS


• Store computers in an
area with secure
access.
•Or place the computers
in a locked room

CC101 – INTRODUCTION TO COMPUTING


37
LESSON 12-13 MALWARE AND COMPUTER SECURITY

SECURE THE COMPUTER


• Choose a web
browser based on its
security and
vulnerabilities
because most
malware will come
through via your web
browser

CC101 – INTRODUCTION TO COMPUTING


38
LESSON 12-13 MALWARE AND COMPUTER SECURITY

SECURE THE COMPUTER


• When downloading
software (including
antivirus software),
get it from a trusted
source

CC101 – INTRODUCTION TO COMPUTING


39
LESSON 12-13 MALWARE AND COMPUTER SECURITY

SECURE THE COMPUTER


• install good antivirus
software because
Antivirus software is
designed to deal with
modern malware
including viruses,
Trojans, key loggers,
rootkits, and worms.

CC101 – INTRODUCTION TO COMPUTING


40
LESSON 12-13 MALWARE AND COMPUTER SECURITY

SECURE THE COMPUTER


• Download and install
a firewall

CC101 – INTRODUCTION TO COMPUTING


41
LESSON 12-13 MALWARE AND COMPUTER SECURITY

SECURE THE COMPUTER


• Close all ports.
Hackers use port
scanning (Ubuntu
Linux has all ports
closed by default)

CC101 – INTRODUCTION TO COMPUTING


42
LESSON 12-13 MALWARE AND COMPUTER SECURITY

LABORATORY ACTIVITY
• Each group should have at least one terminal.
• Install latest Anti-virus Software
• Describe the functions of each antivirus software

CC101 – INTRODUCTION TO COMPUTING


43
LESSON 5- EVOLUTION OF COMPUTER

References
• https://www.pluralsight.com/blog/it-ops/top-10-
security-threats
• https://techwireasia.com/2018/03/mapping-cyber-
incidents-potential-losses/

CC101 – INTRODUCTION TO COMPUTING


44
LESSON 12-13 MALWARE AND COMPUTER SECURITY

THANK YOU
HAVE A
SECURED
WORLD
CC101 – INTRODUCTION TO COMPUTING
45
END

CC101 - INTRODUCTION TO COMPUTING

Você também pode gostar