Protecting against Malicious Code

Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.

  • Viruses have the ability to damage or destroy files on a computer system and are spread by sharing an already infected removable media, opening malicious email attachments, and visiting malicious web pages.
  • Worms are a type of virus that self-propagates from computer to computer. Its functionality is to use all of your computer’s resources, which can cause your computer to stop responding.
  • Trojan Horses are computer programs that are hiding a virus or a potentially damaging program. It is not uncommon that free software contains a Trojan horse making a user think they are using legitimate software, instead the program is performing malicious actions on your computer.
  • Malicious data files are non-executable files—such as a Microsoft Word document, an Adobe PDF, a ZIP file, or an image file—that exploits weaknesses in the software program used to open it. Attackers frequently use malicious data files to install malware on a victim’s system, commonly distributing the files via email, social media, and websites.
Protecting Against Malicious Code

How can you protect yourself against malicious code?

Following these security practices can help you reduce the risks associated with malicious code:

  • Install and maintain antivirus software
  • Use caution with links and attachments
  • Block pop-up advertisements
  • Use an account with limited permissions
  • Disable external media AutoRun and AutoPlay features
  • Change your passwords
  • Keep software updated
  • Back up data
  • Install or enable a firewall
  • Use anti-spyware tools
  • Monitor accounts
  • Avoid using public Wi-Fi

Protecting against Ransomware

Ransomware is a type of malware threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to connected systems, including shared storage drives and other accessible computers.

If the threat actor’s ransom demands are not met (i.e., if the victim does not pay the ransom), the files or encrypted data will usually remain encrypted and unavailable to the victim. Even after a ransom has been paid to unlock encrypted files, threat actors will sometimes demand additional payments, delete a victim’s data, refuse to decrypt the data, or decline to provide a working decryption key to restore the victim’s access. The Federal Government

Protecting Against Ransomware

What can I do to prevent ransomware infections?

  • Update and patch your computer.
  • Use caution with links and when entering website addresses.
  • Open email attachments with caution.
  • Keep your personal information safe.
  • Verify email senders.
  • Inform yourself.
  • Use and maintain preventative software programs.

What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization’s network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization

Avoiding-Social-Engineering Attacks

How do you avoid being a victim?

  • Be suspicious of unsolicited phone calls, visits, or email messages
  • Do not provide personal information or information about your organization
  • Do not reveal personal or financial information in email
  • Don’t send sensitive information over the internet before checking a website’s security.
  • Pay attention to the URL of a website.
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly.
  • Install and maintain anti-virus software, firewalls, and email filters
  • Take advantage of any anti-phishing features offered by your email client and web browser.

Staying Safe on Social Networking Sites

While most people using these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information that’s available. The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting individuals to meet them in person. That could lead to a dangerous situation. The personal information can also be used to conduct a social engineering attack. Using information that you provide about your location, hobbies, interests, and friends, a malicious person could impersonate a trusted friend or convince you that they have the authority to access other personal or financial data.

Additionally, because of the popularity of these sites, attackers may use them to distribute malicious code. Sites that offer applications developed by third parties are particularly susceptible. Attackers may be able to create customized applications that appear to be innocent while infecting your computer or sharing your information without your knowledge.

Staying Safe on Social Media

How can you protect yourself?

  • Limit the amount of personal information you post
  • Remember that the internet is a public resource
  • Be wary of strangers
  • Be skeptical
  • Evaluate your settings
  • Be wary of third-party applications
  • Use strong passwords
  • Check privacy policies
  • Keep software, particularly your web browser, up to date
  • Use and maintain anti-virus software