0% found this document useful (0 votes)
132 views15 pages

Computer Security Threats

This document discusses different types of computer security threats such as viruses, worms, Trojan horses, bots, spyware, and adware. It provides examples of specific worms like Sasser and Blaster, and Trojans like Trojan:JS/Agent.FA and TrojanDownloader:ASX/Wimad.AT. The document also covers how to protect your computer from these threats and remove infections like the Sasser worm through antivirus software, firewalls, and updating software. Properly securing your computer can save time, money, and protect personal information.

Uploaded by

seema
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views15 pages

Computer Security Threats

This document discusses different types of computer security threats such as viruses, worms, Trojan horses, bots, spyware, and adware. It provides examples of specific worms like Sasser and Blaster, and Trojans like Trojan:JS/Agent.FA and TrojanDownloader:ASX/Wimad.AT. The document also covers how to protect your computer from these threats and remove infections like the Sasser worm through antivirus software, firewalls, and updating software. Properly securing your computer can save time, money, and protect personal information.

Uploaded by

seema
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 15

Computer Security Threats

By: Alan Kerstetter


Instructor: Jason Long
IST 110
June 1st, 2009
Objectives
 Different Types of Computer Security
Threats
 Types of Worms
 Types of Spyware
 How your at Risk
 Threat Removal
Different Types of Computer
Security Threats
 Viruses
 Software program that spreads from
computer to computer
 Interrupts computer operations
 Can corrupt or delete data
 Spread through email
 Can even delete everything on hard drive
Different Types of Computer
Security Threats
 Worms
 Computer software program designed
to copy itself from computer to
computer
 No human interaction is needed to copy
 Clogs computer networks
 Can make loading web pages
take a long time
Different Types of Computer
Security Threats

 Trojan Horses
 Appears as a useful computer
software program
 Program actually damages
computer
 Can disable antivirus software
and remove firewalls
Different Types of Computer
Security Threats
 Bots
 A software program that does automated tasks
on the internet
 Spy-bots:
 surveillance or data mining bots
 utilized to collect data and information from a person
(surfing habits), website or company.
 Hacker-bots:
 browse the internet looking for systems with exploitable
vulnerabilities
 hackers access and manipulate the victim’s files and folders
Different Types of Computer
Security Threats
 Spyware and Adware
 Performs certain tasks
 Without proper consent
 Advertising
 Collecting Personal Information
 Configuring your computer
 Change your home page

 Add additional programs

 Can cause computer to crash


Types of Worms
 Sasser Worm
 What is it?
 Exploits the Local Security Authority Subsystem
Service (LSASS)
 Randomly scans IP addresses for vulnerable
machines infects any that are found
 Symptoms
 You see an LSA Shell crash dialog box
 Computer restarts by itself every few minutes
Types of Worms
 Blaster Worm
 What is it?
 Exploit a Remote Procedure Call (RPC) Distributed Component Object
Model (DCOM)
 Denial of service attacks on some server sites
 Creates a backdoor program that allows attackers to access the infected
system
 Symptoms
 Some users may not notice the worm at all, while others may
notice it infecting their computer
 Computer may restart every few minutes
 May cause Windows to become unresponsive
Types of Trojan Horses
 Trojan:JS/Agent.FA
 What is it?
 A malicious Javascript embedded in a Web page
 The Javascript disables pop-up blockers

 Causing malicious pop-ups that could allow site redirection which


could lead to possible downloading and executing of other
malicious files
 Symptoms
 Presence of one or more pop-up windows that get
past installed popup blockers may be indicative of a
Web page hosting Trojan:JS/Agent.FA.
Types of Trojan Horses
 TrojanDownloader:ASX/Wimad.AT
 What is it?
 Claims to be a detection for malicious Windows
media files
 Encourages users to download and execute arbitrary files
on an affected machine
 Symptoms
 There are no obvious symptoms
 Malicious files open a particular URL when
Windows media file is opened
How Your Computer is at Risk
Removal of Security Threats
 Example of how to remove a Sasser Worm:
 1.) Disconnect from local internet connection
 2.) Close the running program
 3.) Activate Windows Firewall
 4.) Download and Install Patches from Microsoft
Website
 5.) Delete all infected files
 6.) Reboot your computer
 For more detailed instructions
visit http://www.pchell.com/virus/sasser.shtml
Conclusion
 You should always pay close attention to
how your computer is running and keep
all software programs up-to-date
 Protecting you computer can:
 Save you money
 Save you time
 Protect your identity
 Protect personal documents
References
 Microsoft Website
 http://www.microsoft.com/protect/computer/basics.mspx
 Tech FAQ
 http://www.tech-faq.com/internet-bots.shtml
 About.com
 http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-
virus.htm
 Pcell Website
 http://www.pchell.com/virus/sasser.shtml

You might also like