Top Banner

of 53

03 Secure The Computer.pptx

Feb 13, 2018

Download

Documents

Musa Muhamad
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/23/2019 03 Secure The Computer.pptx

    1/53

    Copyright 2014 CyberSecurityMalaysia

    Secure theComputer

  • 7/23/2019 03 Secure The Computer.pptx

    2/53

    2

    Nowadays, everyone has computers,digital data, online identity andaccount credentials Not everyone isserious about security

    !ut malicious hac"ers are constantlyloo"ing #or wea"nesses o# their preyin order to success#ully e$ecute theirmalicious activities on the internet

    %n this session, we&ll e$amine ourcommon mista"es and how hac"erse$ploit that mista"es

    Let us think likes HACKERS!

    Introduction

  • 7/23/2019 03 Secure The Computer.pptx

    3/53

    '

    Goals

    Hackers Perspective(ac"ers are constantly )nding#or the wea"ness o# eachcomponents to ensure the

    success o# malicious attac"

    sers PerspectiveMost users are more #ocusedon how to use computer to dotheir daily tas"s but not somuch about their security

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    4/53

    4

    "#ectives

    *indows +ogon assword -ntivirus So#tware .perating System -pplication atches /pdate %nternet -ccess Networ"ing evices

    $ternal evices .nline Sur)ng

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    5/53

    $% &indo's Lo(on

    &indo's Lo(on +ogon Screen Screen Saver

    /serManagement

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    6/53

    3

    Lo(on Screen

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    7/53

    Pass'ord Protected Screen Saver

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    8/53

    5

    Access Control

    &ork)Related In*ormation company in#ormation

    6structure, process,

    systems7 corporate email business applications

    access business servers access business documents customer in#ormation vendor in#ormation

    Personal)Related

    In*ormation personal in#ormation personal emails online ban"ing social networ"ing personal documents

    personal photos your dirty little secrets

  • 7/23/2019 03 Secure The Computer.pptx

    9/53

    Copyright 2011 CyberSecurity Malaysia 8

    So*t'are Ke+lo((er

    9he :eylogger allows you to secretly trac"all activities #rom all computer users andautomatically receive logs to a desire e;mail

  • 7/23/2019 03 Secure The Computer.pptx

    10/5310

    ser ,ana(ement

  • 7/23/2019 03 Secure The Computer.pptx

    11/53

    11

    -% Pass'ord

    Pass'ord assword

    Strength

    Managing-ccounts

    Managingassword

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    12/53

    Copyright 2011 CyberSecurity Malaysia 12

    Pass'ord Stren(th

    https.//'''0microso*t0com/securit+/pc)

  • 7/23/2019 03 Secure The Computer.pptx

    13/53

    1'

    ,ana(in( Accounts234 SE

    SA,E

    serna

    mePass'ord

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    14/53

    Avoid creatin( pass'ords that use.

    2ictionar+ 'ords in an+ lan(ua(e0

    &ords spelled "ack'ards5 common misspellin(s5 anda""reviations0

    Se6uences or repeated characters0$amples= 12'435,222222, abcde#g, or ad>acent letters on your "eyboard6?werty7

    Personal in*ormation0@our name, birthday, driverAs license,

    passport number, or similar in#ormation 14

    ,ana(in( Pass'ord

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    15/53

    1

    2an(erous Pass'ord

  • 7/23/2019 03 Secure The Computer.pptx

    16/53

    13

    7% Antivirus So*t'are

    AntivirusSo*t'are -ntivirus

    Categories .nline Scanner Signature

    /pdates

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    17/53

    1

    Antivirus Cate(ories

    Bree dition -ntivirusCommercial -ntivirus

    .nline Scanner

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    18/53

    Copyright 2011 CyberSecurity Malaysia 15

    Antivirus Comparatives

    http.//'''0av)comparatives0or(/

  • 7/23/2019 03 Secure The Computer.pptx

    19/53

    Copyright 2011 CyberSecurity Malaysia 18

    nline Scanner

  • 7/23/2019 03 Secure The Computer.pptx

    20/53

    Copyright 2011 CyberSecurity Malaysia 20

    &indo's Securit+ Center

    s Start 8 Control Panel 8 Securit+ 8 Check this computers securit

  • 7/23/2019 03 Secure The Computer.pptx

    21/53

    21

    Si(nature pdates

    irus

    e)nition

    Computer

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    22/53

    22

    9% peratin( S+stem

    peratin(S+stem Service ac"

    alidate *in D.Ece

    Microso#tSupport

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    23/53

    2'

    Service Pack

    http.//'indo's0microso*t0com/en)

    S/'indo's/do'nloads/service)packsCopyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    24/53

    24

    :alidate &indo's and ;ce

    http.//'''0microso*t0com/(enuine/validate/

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    25/53

    2

    ,icroso*t

  • 7/23/2019 03 Secure The Computer.pptx

    26/53

    23

    ,icroso*t Product Li*ec+cle

    http.//support0microso*t0com/(p/li*eselect

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    27/53

    2

    >% Application

    Application aid -pplication Crac"ed

    -pplication Malicious

    -pplication

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    28/53

    25

    Paid Application

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    29/53

    28

    Cracked Application

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    30/53

    '0

    Ro(ue Antivirus

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    31/53

    '1

    Potentiall+ n'anted Pro(ram

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    32/53

    '2

    ?% Patches pdates

    Patches pdates Service ac" *indows

    /pdates 9hird arty

    /pdates

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    33/53

    Copyright 2011 CyberSecurity Malaysia ''

    ,icroso*t 2o'nload Center

    http.//'''0microso*t0com/do'nload/en/de*ault0as 1

  • 7/23/2019 03 Secure The Computer.pptx

    34/53

    '4

    &indo's pdates

  • 7/23/2019 03 Secure The Computer.pptx

    35/53

    Copyright 2011 CyberSecurity Malaysia '

    4hird Part+ pdates

    http.//secunia0com/vulnera"ilit+@scanni

  • 7/23/2019 03 Secure The Computer.pptx

    36/53

  • 7/23/2019 03 Secure The Computer.pptx

    37/53

    '

    &ired 3et'ork

    RE,4E C2EEBEC4I3

    :IRS ,AL&ARE

    &ED APP A44ACKS

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    38/53

    Copyright 2011 CyberSecurity Malaysia '5

    &ireless 3et'ork

  • 7/23/2019 03 Secure The Computer.pptx

    39/53

    '8

    % 3et'orkin( 2evices

    3et'orkin(2evices Microso#t

    :eyboard *ebcam

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    40/53

    40

    &ireless ,icroso*t Ke+"oard

    https.//'''0dreamla"0net/=les/articles/-@,hF@ke+"oard@insecurities0pd*

    9he team o# reamlab 9echnologies has hac"ed two wireless"eyboards #rom Microso#t reamlab warns that it is possible toFsniGH the "eyboard stro"es ; possible to capture and decrypt"eystro"es ; user names, passwords, ban" details or con)dentialcorrespondence can be very easily copied

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    41/53

    41

    &e"cam

    &e"cam

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    42/53

    42

    % E1ternal 2evices

    E1ternal 2evices 9humb rive $ternal (

    CI

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    43/53

    4'

    AutoPla+

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    44/53

    44

    $% nline Sur=n(

    nline Sur=n( !rowser Malicious

    website hishing website

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    45/53

    Copyright 2011 CyberSecurity Malaysia 4

    &e" Dro'ser

  • 7/23/2019 03 Secure The Computer.pptx

    46/53

    Copyright 2011 CyberSecurity Malaysia 43

    Dro'ser Pre*erences

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    47/53

    Copyright 2011 CyberSecurity Malaysia 4

    Clear Dro'sin( 2ata

  • 7/23/2019 03 Secure The Computer.pptx

    48/53

    45

    ,alicious &e"site

  • 7/23/2019 03 Secure The Computer.pptx

    49/53

    Copyright 2011 CyberSecurity Malaysia 48

    Phishin( Attacks

  • 7/23/2019 03 Secure The Computer.pptx

    50/53

    0

    Check the Suspicious &e"site

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    51/53

    1

    Summar+

    *indows +ogon assword

    -ntivirusSo#tware

    .perating

    System -pplication

    atches /pdate %nternet -ccess Networ"ing

    evices $ternal

    evices

    Act

    Now!

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    52/53

    2

    Action 4ime!

    If you think technology can solve your security problems,then you don't understand the problems and you don'tunderstand the technology

    - Bruce chneier

    Netboo" +aptop es"top

    Copyright 2014 CyberSecurity Malaysia

  • 7/23/2019 03 Secure The Computer.pptx

    53/53