Presented to Compass

Post on 13-May-2015

559 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

The presentation talks about how to keep internet connected workstations clean and secured

Transcript

Digital ThreatsFrom PC to Cell Phone

ByDr.Tapan Sengupta

Digital Threats

All computers connected to network are at risk of digital threats

Extent of threat depends the usage of the PC

Even a stand-alone PC is not risk free

Vulnerabilities

Flaws in computer software that create weaknesses in the overall security of the computer or network.

Improper computer or security configurations.

Threats exploit the weaknesses of vulnerabilities resulting in potential damage to the computer or personal data.

Activities Leading to a Threat

Web SurfingCommunication- email, messagingTransaction ( banking, shopping)File Sharing( data, photo,video)

What Are The Common Threats The basic typesVirus Does not propagate of its own Replicate itself within a single

machine Spread only thru human interactionWorms Use network to propagate itself Replicate anywhere Spread much faster than virus

What A The Common Types Of Threats

SpywareAdwareTrojan HorsesBots & Botnets ( Blended threat)

What A The Common Types Of Threats

SpamPhishingPharmingCrimeware

Misleading Application

Misleading applications, trick consumers into believing a problem exists on their system. Consumers who trust the messages are tricked into purchasing bogus applications for resolution of bogus problems

Sometimes these applications introduce Malware into your system

Known Misleading Application

Win FixerUltimate DefenderSpySheriffMalwareWipeDriveCleanerAVSystemCare

Known Misleading Application

AVSystemCare1stAntiVirusVirusBurstSpywareQuakeAntispywareSoldier

Anatomy Of A Typical Malware

MalwareServer

Keyboard LoggerEtc.

Infected PC

Network Keyboard LoggerEtc.

Un-infected PC

Malware

Account numberCredit Card Info

User Id, password etc.

Step-1

Step-2

What Can These Malware Do?

Destroy or modify your file systemHijack your browserSteal your identityMake your machine crawlUse your credit card, bank accountPopup adsFlood your mail box

E-mail: Watch attachments, not spams

The Internet: Watch downloads not pop-ups

Data Protection: Worry about backups before hackers

Danger vs. Annoyance

What To Do?

Keep software and security patches up to date

Pre-condition for this is to have a legal copy of the

operating system

What To Do?

Apply latest patches(PTFs)Configure security settings for

operating system, internet browser and security software Use a good Anti-virus programUse a well configured firewallUse Multiple anti-malware

software

What To Do?

Develop personal security policies for online behavior

Install a proactive security solution to block threats targeting vulnerabilities

Pay special attention to in configuring firewall

Personal Security Policy

Have email attachments scanned prior to opening

Delete all unwanted messages without opening

If you suspect an email is Spam, do not respond, delete it

Personal Security Policy

Reject all Instant Messages from persons who are not on your list

Do not click on URL links within IM unless from a trusted source

Never answer to the requests for confidential information via email or Instant Message

Personal Security Policy

Scan all files with an Internet Security solution before transferring them to your system

Only transfer files from a well known source

Use Security Software to block all unsolicited outbound communication

Personal Security Policy

Be especially cautious when clicking on pop-up advertisements

Do not respond to pop-up ads promoting system security or performance tools

Do not accept or open suspicious error dialogs from within the browser

LAST BUT NOT THE LEAST

Backup your files regularly

Security Software

The software that I use1. Anti-virus AVG free edition2. Malware AdAware free edition3. SpyBot, S&D4. Windows Defender5. CWshreder6. Firewall Zone Alarm free Note: 1, 3 and 4 run on a nightly schedule,

Wireless SOHO NetworkRouter Configuration

Change Router’s default passwordImplement system security Wep, 64bit recommended Rotate the default transmit keyDisable SS ID BroadcastDisable Remote ManagementEnable router’s built-in firwall

Virus on cell phone

First virus ‘Cabir’ was a research project

‘Cabir’ got twisted around and new viruses were created

Virus, worm – same concepts as PCsPropagates thru Blue ToothPropagates thru MMS

Virus on cell phoneWhat to do

Turn off Bluetooth discoverable mode. Set your phone to "hidden" so other phones can't detect it and send it the virus.

Check security updates to learn about filenames you should keep an eye out for.

Download only from trusted environment

Question any one?

top related