pace-it, security+3.1: types of malware

13
Types of malware.

Upload: pace-it-at-edmonds-community-college

Post on 13-Apr-2017

251 views

Category:

Education


1 download

TRANSCRIPT

Page 1: PACE-IT, Security+3.1: Types of Malware

Types of malware.

Page 2: PACE-IT, Security+3.1: Types of Malware

Page 2

Instructor, PACE-IT Program – Edmonds Community College

Areas of Expertise Industry Certification PC Hardware Network

Administration IT Project

Management

Network Design User Training IT Troubleshooting

Qualifications Summary

Education M.B.A., IT Management, Western Governor’s University B.S., IT Security, Western Governor’s University

Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.

Brian K. Ferrill, M.B.A.

Page 3: PACE-IT, Security+3.1: Types of Malware

Page 3

Types of malware.

– Malware defined.

– Common types of malware.

PACE-IT.

Page 4: PACE-IT, Security+3.1: Types of Malware

Page 4

Malware defined.Types of malware.

Page 5: PACE-IT, Security+3.1: Types of Malware

Page 5

Malware defined.

Malware can be defined as any code based (i.e., software based) attack that can be utilized against a system or network.

In most cases, malware has been specifically designed to perform a malicious (causing harm) action. As such, it can also be defined as any software that harms or misuses the system (which can include just slowing the system down).This means that a poorly written software package can also fall into the definition of malware, even if harm was not the intent. Always thoroughly test any software package before deploying it in a production setting. This will help to reduce the chances of introducing unintentional malware into the network.

Types of malware.

Page 6: PACE-IT, Security+3.1: Types of Malware

Page 6

Common types of malware.Types of malware.

Page 7: PACE-IT, Security+3.1: Types of Malware

Page 7

Common types of malware.

– Virus.» Malware that has two jobs—to replicate and to activate.» Requires a host program, a host machine, and user

action to spread.» Viruses only affect drives (e.g., hard drives and USB

drives).» Often contains a destructive payload.

– Trojan.» Malware that hides its purpose by disguising itself as

something that the end user desires.» Used to get the end user to download a virus package.» This is often the method that is used to establish

botnets or zombie nodes.

– Worm.» Similar to a virus, but it replicates itself across a

network without user action.» It doesn’t need a host file in order to operate.» Worms will replicate themselves across networks,

creating havoc.

Types of malware.

Page 8: PACE-IT, Security+3.1: Types of Malware

Page 8

Common types of malware.

– Rootkit.» A software package that gets installed on a system,

giving the attacker privileged access to the system.• Most often, the attacker attempts to hide the rootkit

from the administrator.

– Logic bomb.» A virus that, after getting installed on a system, waits

for a specific event to occur before activating its payload (performing its malicious action).

• The application carrying the logic bomb will function normally until the trigger event occurs.

• Often, logic bombs are triggered by date and time.

– Ransomware.» A virus package that takes over an infected system for

the purpose of extorting money from the end user.• Often, the virus will encrypt all the files and folders on

the infected system—effectively locking out the end user.

Types of malware.

Page 9: PACE-IT, Security+3.1: Types of Malware

Page 9

Common types of malware.

– Botnet.» A collection of infected systems (zombie nodes) under

the control of the attacker. The zombies are used to perform other attacks.

• The zombie controller will often rent out the use of a botnet for other attackers to use.

– Adware.» A software package designed to automatically load

advertisements on a system—usually in the form of pop-up windows.

• The goal is to entice users to purchase something; the result is usually just annoyance and poor system performance.

– Spyware.» Malicious code that collects information about the

system and may change some settings.• May be programed to send the collected information

to an attacker at specific times.• May be programmed to save the collected information

until the attacker performs another action.

Types of malware.

Page 10: PACE-IT, Security+3.1: Types of Malware

Page 10

Common types of malware.

– Polymorphic virus.» A virus package that self-mutates in order to avoid

detection by antivirus applications.• Allows the virus to avoid signature based malware

detection.

– Armored virus.» A virus package that attempts to harden itself against

defensive actions, making it difficult to be decompiled.• Antivirus vendors often decompile (take apart) viruses

when developing countermeasures.

– Backdoor access.» When creating applications, developers often create

backdoors into the programs. Backdoors are a means of accessing an application or service, while bypassing the normal authentication process.

• In most cases, the application is listening on a specific port (e.g., an open port) for a request for access.

» Malware can also be used to open a backdoor into a program, a computer system, or even a network.

Types of malware.

Page 11: PACE-IT, Security+3.1: Types of Malware

Page 11

What was covered.Types of malware.

Malware can be defined as any code based attack that can be used against a system or network. In most cases, the malware is specifically designed to perform a specific attack. Unfortunately, poorly written software may also act as malware (unintentionally)—as it may harm a network or system.

Topic

Malware defined.

Summary

There are many different types of malware. A virus requires a host system and application in order to function. A Trojan is an application that disguises its true purpose (appears to be something other than what it is). A worm replicates across a network and doesn’t require a host system or user interaction. Other types of malware include: rootkits, logic bombs, ransomware, botnets, adware, spyware, polymorphic viruses, armored viruses, and backdoors.

Common types of malware.

Page 12: PACE-IT, Security+3.1: Types of Malware

Page 12

THANK YOU!

Page 13: PACE-IT, Security+3.1: Types of Malware

This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53.PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.