Identifying and Removing Malware on a Windows System
CSS280-1404B-01 Ethical Hacking
Course Name and Number: _____________________________________________________
Douglas Matthews
Student Name: ________________________________________________________________
Brandon DeLeeuw
Instructor Name: ______________________________________________________________
12/15/2014
Lab Due Date: ________________________________________________________________
Overview
In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans, malware, or other malicious software found on a compromised Windows machine. You completed a scan of the entire computer, learned how to exclude folders to avoid false positives, and understood the importance of maintaining the signatures database. You discovered the difference between a full computer scan and a Resident Shield scan. Finally, you also permanently removed the malware identified by the antivirus software and scheduled the scan to run automatically.
Lab Assessment Questions & Answers
1. Why is it recommended to update the antivirus software’s signature database before performing an antivirus scan on your computer?
Updating the antivirus software with the latest virus definitions ensures the software has the latest information to identify and quarantine threats.
2. What are typical indicators that your computer system is compromised?
Slow response opening, operating system not booting up correctly or no functioning normally, event logs reporting numerous unusual alerts.
3. Where does AVG AntiVirus Business Edition place viruses, Trojans, worms, and other malicious software when it finds them?
It places the virus in a Virus Vault which is a quarantine area where all removed files, viruses go.
.
4. What other viruses, Trojans, worms, or malicious software were identified and quarantined by AVG within the Virus Vault?
Exploit, trojan horse dropper
5. What is the difference between the complete scan and the Resident Shield?
Complete scan, scans the entire computer while resident shield scans a folder.
Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com
Student Lab Manual
You May Also Find These Documents Helpful
-
| ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer…
- 5533 Words
- 23 Pages
Satisfactory Essays -
| Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…
- 3391 Words
- 14 Pages
Good Essays -
6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows…
- 454 Words
- 2 Pages
Good Essays -
And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…
- 345 Words
- 2 Pages
Satisfactory Essays -
Install antivirus software, configuring it to run scans automatically at predefinedtimes and updating the definition files regularly.…
- 546 Words
- 3 Pages
Good Essays -
A virus or malware can impact which of the three tenets of information systems security (confidentiality,…
- 1020 Words
- 6 Pages
Satisfactory Essays -
1. What are the various types of malware? How do worms differ from viruses? Do Trojan…
- 639 Words
- 2 Pages
Good Essays -
Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated.…
- 3629 Words
- 12 Pages
Good Essays -
Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus…
- 1234 Words
- 5 Pages
Powerful Essays -
Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…
- 358 Words
- 2 Pages
Satisfactory Essays -
* Is the virus software configured to scan all the important hard drives and files?…
- 594 Words
- 3 Pages
Good Essays -
Screen shot of the detailed view of the 2nd infection "";"C:\Helix\IR\nirsoft\LSASecretsView.exe";"May be infected by unknown virus Win32/DH{HhMXFE8VGw}";"Moved to Virus Vault"…
- 1527 Words
- 7 Pages
Good Essays -
Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…
- 805 Words
- 3 Pages
Good Essays -
As said by Roger Thompson, chief research officer of AVG, rouge antivirus products are common” The Bad guys are clearly making money at it”. Who hasn’t seen those much hated pop ups stating your computer is infected and needs a scan? Who now is silly enough to actually click on those? One would be surprised. Given that this article was written in 2009, it is still very relevant, and it seems like the more and more we still can’t seem to slow down those pop ups. Although now it seems like those pop ups come out of nowhere without you…
- 722 Words
- 3 Pages
Good Essays -
So in the goal to stop the development of this kind of virus, some companies created antivirus softwares during the 1980s to protect the users from theses problems.…
- 522 Words
- 3 Pages
Satisfactory Essays