Top Banner
Nathan J. Gibson, CISSP-CISM-CCNA- MCSA
63

Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Mar 28, 2015

Download

Documents

Edwin Helme
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Nathan J. Gibson, CISSP-CISM-CCNA-MCSA

Page 2: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Virus Trojans Worms Spyware BotNets Social Engineering

Thieves Hackers Sexual predators Harassers

Page 3: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Personal Data Identity Theft Bank Account Information

Hard Drive Space Pornography Storage Hide stolen information Distribute copyrighted material

CPU cycles Cracking code Writing Software

Robot Computer Attack other sites Profit from large BotNet

Page 4: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

E-mail Greeting Cards Chain Letters Hoax

WebPages Phishing Blogs

CD’s, Jump Drives, Floppy Disk Instant Messengers PDA’s

Page 5: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Fake Greeting Cards Appear to come from a friend Links in e-mail point to malicious sites Automatically Downloads malicious files

Chain Letters “Bill Gates is tracking this e-mail” Religious Emails Sue needs your help emails “Forward to Everyone you Know!!!!”

Page 6: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 7: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Hoax E-mails “Diplomat Husband died and left me $100

Million $198.4 Million Lost in 2006 alone Date Line “ To catch an ID Thief”

http://www.msnbc.msn.com/id/17805134/ Investment E-mails Hoax Virus Alert E-mails

Good Times Virus

Page 8: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Teenagers like to make friends Messenger

Skilled in extracting information Blogs

To much sensitive information MySpace - 500 people tested 80% release

sensitive information Pictures reveal a lot of information and

motivate attackers

Page 9: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

AntiVirus AntiSpyware Firewalls Updates Safe Browsing Habits Common Sense and Knowledge Rules

Page 10: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Antivirus Free protection is available

McAfee: http://it.ouhsc.edu/services/desktopmgmnt/antivirussoftware.asp

AVG: http://free.grisoft.com/

Install Scan Immediately

Configure Daily Automatic Updates At least Weekly Scans

Page 11: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Anti Spyware Again Free Protection for all

Spybot S & D: http://www.safer-networking.org/en/download/index.html

Configure Automatic Updates At least Weekly Scans

Page 12: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Firewall Windows XP SP2 comes with a built in Firewall

Turn on/Configure Don’t Ignore Warnings Periodically Check Exceptions

Page 13: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 14: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 15: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 16: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 17: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 18: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Updates Configure to Automatically Update and Install Check Software vendor sites for updates

periodically Don’t postpone/ignore computer notifications.

Page 19: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 20: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 21: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 22: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Safe Browsing Habits Active X

Set Internet Explorer Settings Think before clicking “Yes”

Java Prompts Certificates

Don’t except certificates from people you don’t trust

SSL/Https Internet Explorer Phishing Tools

Page 23: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 24: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Okay! Okay! I understand not to click on everything. But my computer doesn’t give me that prompt.

Configure your security level

Page 25: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 26: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 27: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 28: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 29: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Certificates – SSL – HTTPS Secure & Confidential Internet Requires a degree of Trust

What is Phishing? www.bankofthewest.com vs.

www.bankofthevvest.com How can I be sure the site I am browsing

is legit?

Page 30: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

DOES THIS PROVE MY IDENTITY?

Page 31: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

STATE LICENSE HERE

-- This really proves my Identity

Page 32: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 33: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 34: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 35: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 36: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Your in Luck, Built in Phishing Help!

Page 37: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 38: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 39: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Search Engine & Website Information McAfee Site Advisor - Free

Malicious Downloads Spam e-mail Site Phishing Sites Links to other known bad sites

http://www.siteadvisor.com/download/ie.html

Page 40: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 41: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Common Sense and Knowledge If it is too good to be true….. Research e-mails and websites

www.snopes.com http://hoaxbusters.ciac.org/

Advise Family Members Block them if you have to

Criminal Act???? Mail Fraud(18 USC S1341)

Page 42: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

How to keep your kids safe on the internet1. Parenting

Communicating

2. Technology Enforcing and Monitoring

Page 43: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Step 1: Establish a contract

Times that are allowed Activities that are allowed Punishment for rule violation

Computer should be in an open space and not in their room

Page 44: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Step 2: Separate user accounts for you and your

kids You should have more rights than them to

restrict and monitor their activity Each child should have their own account and

password Trace unauthorized activity to a specific person

Page 45: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 46: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 47: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 48: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 49: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 50: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 51: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 52: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Step 3: Controlling Internet Activity

There are bad sites on the internet Some legit and education sites can be flagged

because of certain content

Page 53: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 54: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 55: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 56: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 57: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 58: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 59: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 60: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Page 61: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Uninstall Chat programs you don’t want them to use

Create an e-mail with your ISP for them You can monitor and view e-mail Block other e-mail sites(e.g. hotmail, yahoo,

etc.) Key Loggers

Messengers E-mail Blogs

Browser History Programs

Page 62: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Configure your modems/routers to disable internet activity during certain hours Consult your ISP Technical support; they will

gladly help you

Page 63: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

QUESTIONS/COMMENTS