awesome stuff cyber security tyler hoover auburn university
TRANSCRIPT
![Page 1: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/1.jpg)
S
Awesome StuffCyber Security
Tyler HooverAuburn University
![Page 2: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/2.jpg)
Malware
What is Malware?
Why is malware used?
Who uses malware?
What is most common type?
How do you fight it?
![Page 3: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/3.jpg)
Types of malware
Viruses
Worms
Trojan Horses
Rootkits
Ransomware
Botnets
Spyware KeyLoggers
Adware
![Page 4: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/4.jpg)
Viruses
Main purpose is replication to infect multiple subsystems or programs on an infected machine.
Defining feature of virus is self-replication and installation without user consent.
Polymorphic Viruses
Windows is the most targeted.
Big name Viruses: Love Letter Virus Pikachu Virus Sasser Virus
![Page 5: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/5.jpg)
Worms
Replicate in order to infect.
Difference between worms and viruses?
Big name bugs: Morris Mydoom Conficker Welchia
![Page 6: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/6.jpg)
Trojan Horses
Zues
Sub7/Sub7Server
Agent.btz
ZeroAccess
![Page 7: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/7.jpg)
Spyware/Adware
October 16, 1995 – First use of word spyware on usenet. Until 2000 was used to describe software used for
espionage.
Companies like to use different types of spyware for monitoring employees. This is called commercial spyware.
In 2004 it was estimated that 80% of all computers had some form of spyware.
![Page 8: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/8.jpg)
Ransomware
![Page 9: Awesome Stuff Cyber Security Tyler Hoover Auburn University](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649ee85503460f94bfa413/html5/thumbnails/9.jpg)
Rootkits
First documented rootkit was NTRootkit. It targeted Windows NT machines.
Rootkits modify the OS to make it easier for malware to hide.
Sony BMG scandal Used CDs to install rootkit onto machine to help
prevent piracy.