7/23/2019 03 Secure The Computer.pptx
1/53
Copyright 2014 CyberSecurityMalaysia
Secure theComputer
7/23/2019 03 Secure The Computer.pptx
2/53
2
Nowadays, everyone has computers,digital data, online identity andaccount credentials Not everyone isserious about security
!ut malicious hac"ers are constantlyloo"ing #or wea"nesses o# their preyin order to success#ully e$ecute theirmalicious activities on the internet
%n this session, we&ll e$amine ourcommon mista"es and how hac"erse$ploit that mista"es
Let us think likes HACKERS!
Introduction
7/23/2019 03 Secure The Computer.pptx
3/53
'
Goals
Hackers Perspective(ac"ers are constantly )nding#or the wea"ness o# eachcomponents to ensure the
success o# malicious attac"
sers PerspectiveMost users are more #ocusedon how to use computer to dotheir daily tas"s but not somuch about their security
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
4/53
4
"#ectives
*indows +ogon assword -ntivirus So#tware .perating System -pplication atches /pdate %nternet -ccess Networ"ing evices
$ternal evices .nline Sur)ng
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
5/53
$% &indo's Lo(on
&indo's Lo(on +ogon Screen Screen Saver
/serManagement
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
6/53
3
Lo(on Screen
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
7/53
Pass'ord Protected Screen Saver
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
8/53
5
Access Control
&ork)Related In*ormation company in#ormation
6structure, process,
systems7 corporate email business applications
access business servers access business documents customer in#ormation vendor in#ormation
Personal)Related
In*ormation personal in#ormation personal emails online ban"ing social networ"ing personal documents
personal photos your dirty little secrets
7/23/2019 03 Secure The Computer.pptx
9/53
Copyright 2011 CyberSecurity Malaysia 8
So*t'are Ke+lo((er
9he :eylogger allows you to secretly trac"all activities #rom all computer users andautomatically receive logs to a desire e;mail
7/23/2019 03 Secure The Computer.pptx
10/5310
ser ,ana(ement
7/23/2019 03 Secure The Computer.pptx
11/53
11
-% Pass'ord
Pass'ord assword
Strength
Managing-ccounts
Managingassword
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
12/53
Copyright 2011 CyberSecurity Malaysia 12
Pass'ord Stren(th
https.//'''0microso*t0com/securit+/pc)
7/23/2019 03 Secure The Computer.pptx
13/53
1'
,ana(in( Accounts234 SE
SA,E
serna
mePass'ord
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
14/53
Avoid creatin( pass'ords that use.
2ictionar+ 'ords in an+ lan(ua(e0
&ords spelled "ack'ards5 common misspellin(s5 anda""reviations0
Se6uences or repeated characters0$amples= 12'435,222222, abcde#g, or ad>acent letters on your "eyboard6?werty7
Personal in*ormation0@our name, birthday, driverAs license,
passport number, or similar in#ormation 14
,ana(in( Pass'ord
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
15/53
1
2an(erous Pass'ord
7/23/2019 03 Secure The Computer.pptx
16/53
13
7% Antivirus So*t'are
AntivirusSo*t'are -ntivirus
Categories .nline Scanner Signature
/pdates
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
17/53
1
Antivirus Cate(ories
Bree dition -ntivirusCommercial -ntivirus
.nline Scanner
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
18/53
Copyright 2011 CyberSecurity Malaysia 15
Antivirus Comparatives
http.//'''0av)comparatives0or(/
7/23/2019 03 Secure The Computer.pptx
19/53
Copyright 2011 CyberSecurity Malaysia 18
nline Scanner
7/23/2019 03 Secure The Computer.pptx
20/53
Copyright 2011 CyberSecurity Malaysia 20
&indo's Securit+ Center
s Start 8 Control Panel 8 Securit+ 8 Check this computers securit
7/23/2019 03 Secure The Computer.pptx
21/53
21
Si(nature pdates
irus
e)nition
Computer
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
22/53
22
9% peratin( S+stem
peratin(S+stem Service ac"
alidate *in D.Ece
Microso#tSupport
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
23/53
2'
Service Pack
http.//'indo's0microso*t0com/en)
S/'indo's/do'nloads/service)packsCopyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
24/53
24
:alidate &indo's and ;ce
http.//'''0microso*t0com/(enuine/validate/
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
25/53
2
,icroso*t
7/23/2019 03 Secure The Computer.pptx
26/53
23
,icroso*t Product Li*ec+cle
http.//support0microso*t0com/(p/li*eselect
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
27/53
2
>% Application
Application aid -pplication Crac"ed
-pplication Malicious
-pplication
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
28/53
25
Paid Application
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
29/53
28
Cracked Application
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
30/53
'0
Ro(ue Antivirus
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
31/53
'1
Potentiall+ n'anted Pro(ram
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
32/53
'2
?% Patches pdates
Patches pdates Service ac" *indows
/pdates 9hird arty
/pdates
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
33/53
Copyright 2011 CyberSecurity Malaysia ''
,icroso*t 2o'nload Center
http.//'''0microso*t0com/do'nload/en/de*ault0as 1
7/23/2019 03 Secure The Computer.pptx
34/53
'4
&indo's pdates
7/23/2019 03 Secure The Computer.pptx
35/53
Copyright 2011 CyberSecurity Malaysia '
4hird Part+ pdates
http.//secunia0com/vulnera"ilit+@scanni
7/23/2019 03 Secure The Computer.pptx
36/53
7/23/2019 03 Secure The Computer.pptx
37/53
'
&ired 3et'ork
RE,4E C2EEBEC4I3
:IRS ,AL&ARE
&ED APP A44ACKS
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
38/53
Copyright 2011 CyberSecurity Malaysia '5
&ireless 3et'ork
7/23/2019 03 Secure The Computer.pptx
39/53
'8
% 3et'orkin( 2evices
3et'orkin(2evices Microso#t
:eyboard *ebcam
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
40/53
40
&ireless ,icroso*t Ke+"oard
https.//'''0dreamla"0net/=les/articles/-@,hF@ke+"oard@insecurities0pd*
9he team o# reamlab 9echnologies has hac"ed two wireless"eyboards #rom Microso#t reamlab warns that it is possible toFsniGH the "eyboard stro"es ; possible to capture and decrypt"eystro"es ; user names, passwords, ban" details or con)dentialcorrespondence can be very easily copied
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
41/53
41
&e"cam
&e"cam
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
42/53
42
% E1ternal 2evices
E1ternal 2evices 9humb rive $ternal (
CI
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
43/53
4'
AutoPla+
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
44/53
44
$% nline Sur=n(
nline Sur=n( !rowser Malicious
website hishing website
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
45/53
Copyright 2011 CyberSecurity Malaysia 4
&e" Dro'ser
7/23/2019 03 Secure The Computer.pptx
46/53
Copyright 2011 CyberSecurity Malaysia 43
Dro'ser Pre*erences
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
47/53
Copyright 2011 CyberSecurity Malaysia 4
Clear Dro'sin( 2ata
7/23/2019 03 Secure The Computer.pptx
48/53
45
,alicious &e"site
7/23/2019 03 Secure The Computer.pptx
49/53
Copyright 2011 CyberSecurity Malaysia 48
Phishin( Attacks
7/23/2019 03 Secure The Computer.pptx
50/53
0
Check the Suspicious &e"site
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
51/53
1
Summar+
*indows +ogon assword
-ntivirusSo#tware
.perating
System -pplication
atches /pdate %nternet -ccess Networ"ing
evices $ternal
evices
Act
Now!
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
52/53
2
Action 4ime!
If you think technology can solve your security problems,then you don't understand the problems and you don'tunderstand the technology
- Bruce chneier
Netboo" +aptop es"top
Copyright 2014 CyberSecurity Malaysia
7/23/2019 03 Secure The Computer.pptx
53/53