Information Security
Security Offerings
Endpoint Protection

CrowdStrike Falcon is Northwestern's licensed software application for protecting your computer against viruses and other malware and is free to all faculty, staff and students.

Endpoint protection technology seeks to prevent a program from inserting itself into your computer with the intent of compromising the confidentiality, integrity, or availability of data, applications, or operating system, or of otherwise annoying or disrupting you. Malware (malicious software) may attach itself to a file or application; deliver a payload without your knowledge or permission; insert itself as a service or process to intercept sensitive information and/or keystrokes and deliver it to a third-party; or compromise your computer and use it to launch compromises against other computers.

Types of Malware

Adware is essentially abusive advertising. This includes pop-up ads and "bundled" software such as browser toolbars. Some adware is innocuous advertising, but other instances of adware can potentially damage your computer or steal your information. It is never a good idea to knowingly install or click on adware. When downloading software, be sure it is not also asking permission to download additional software on top of the desired product and when browsing be sure to use pop-up blockers or script blockers. 

Ransomware encrypts a computer's data so that it is inaccessible without a password. The ransomware distributor will then demand a certain amount of money, sent through an anonymous method like bitcoin, in order to decrypt the computer. There is sometimes a time limitation for payment. After this time limit, the computer's files will be deleted. The best way to recover from ransomware is to recover your data from a backup. 

Rootkits allow access to sensitive files that usually are not modified by computer users - at least not directly. Rootkits can include viruses, worms, and Trojan horses. These programs will modify the computer, steal personal information, execute malicious files, and potentially create bots. Rootkits, unlike adware and ransomware, will typically attempt to stay hidden from the user.

Spyware will record activity on your computer and transmit the data elsewhere. This includes login information, browser history, and potentially other information. Spyware will try to remain hidden so that it won't be removed. It can also modify security and network settings.

Trojan Horse
A Trojan Horse will trick a user into downloading malicious software. These programs will pretend to be something else that you are trying to download, but instead will give someone else access to your computer to steal information and install additional malware.

Viruses are malicious programs that will attempt to spread from machine to machine. They can attach themselves to files and programs shared between computers in order to infect as many machines as possible.

Worms are spread through networks, finding security vulnerabilities in programs and operating systems to infect machines. They can damage your computer, steal or delete information, and install bots.