Your SlideShare is downloading. ×
0
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Presented to Compass
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Presented to Compass

561

Published on

The presentation talks about how to keep internet connected workstations clean and secured

The presentation talks about how to keep internet connected workstations clean and secured

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
561
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
30
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Digital Threats From PC to Cell Phone By Dr.Tapan Sengupta
  • 2. Digital Threats <ul><li>All computers connected to network are at risk of digital threats </li></ul><ul><li>Extent of threat depends the usage of the PC </li></ul><ul><li>Even a stand-alone PC is not risk free </li></ul>
  • 3. Vulnerabilities <ul><li>Flaws in computer software that create weaknesses in the overall security of the computer or network. </li></ul><ul><li>Improper computer or security configurations. </li></ul><ul><li>Threats exploit the weaknesses of vulnerabilities resulting in potential damage to the computer or personal data. </li></ul>
  • 4. Activities Leading to a Threat <ul><li>Web Surfing </li></ul><ul><li>Communication- email, messaging </li></ul><ul><li>Transaction ( banking, shopping) </li></ul><ul><li>File Sharing( data, photo,video) </li></ul>
  • 5. What Are The Common Threats The basic types <ul><li>Virus </li></ul><ul><li>Does not propagate of its own </li></ul><ul><li>Replicate itself within a single machine </li></ul><ul><li>Spread only thru human interaction </li></ul><ul><li>Worms </li></ul><ul><li>Use network to propagate itself </li></ul><ul><li>Replicate anywhere </li></ul><ul><li>Spread much faster than virus </li></ul>
  • 6. What A The Common Types Of Threats <ul><li>Spyware </li></ul><ul><li>Adware </li></ul><ul><li>Trojan Horses </li></ul><ul><li>Bots & Botnets ( Blended threat) </li></ul>
  • 7. What A The Common Types Of Threats <ul><li>Spam </li></ul><ul><li>Phishing </li></ul><ul><li>Pharming </li></ul><ul><li>Crimeware </li></ul>
  • 8. Misleading Application <ul><li>Misleading applications, trick consumers into believing a problem exists on their system. Consumers who trust the messages are tricked into purchasing bogus applications for resolution of bogus problems </li></ul><ul><li>Sometimes these applications introduce Malware into your system </li></ul>
  • 9. Known Misleading Application <ul><li>Win Fixer </li></ul><ul><li>Ultimate Defender </li></ul><ul><li>SpySheriff </li></ul><ul><li>MalwareWipe </li></ul><ul><li>DriveCleaner </li></ul><ul><li>AVSystemCare </li></ul>
  • 10. Known Misleading Application <ul><li>AVSystemCare </li></ul><ul><li>1stAntiVirus </li></ul><ul><li>VirusBurst </li></ul><ul><li>SpywareQuake </li></ul><ul><li>AntispywareSoldier </li></ul>
  • 11. Anatomy Of A Typical Malware Malware Server Keyboard Logger Etc. Infected PC Network Keyboard Logger Etc. Un-infected PC Malware Account number Credit Card Info User Id, password etc. Step-1 Step-2
  • 12. What Can These Malware Do? <ul><li>Destroy or modify your file system </li></ul><ul><li>Hijack your browser </li></ul><ul><li>Steal your identity </li></ul><ul><li>Make your machine crawl </li></ul><ul><li>Use your credit card, bank account </li></ul><ul><li>Popup ads </li></ul><ul><li>Flood your mail box </li></ul>
  • 13. Danger vs. Annoyance <ul><li>E-mail: Watch attachments, not spams </li></ul><ul><li>The Internet: Watch downloads not pop-ups </li></ul><ul><li>Data Protection: Worry about backups before hackers </li></ul>
  • 14. What To Do? <ul><li>Keep software and security patches up to date </li></ul><ul><li>Pre-condition for this is to have a legal copy of the operating system </li></ul>
  • 15. What To Do? <ul><li>Apply latest patches(PTFs) </li></ul><ul><li>Configure security settings for operating system, internet browser and security software </li></ul><ul><ul><li>Use a good Anti-virus program </li></ul></ul><ul><ul><li>Use a well configured firewall </li></ul></ul><ul><ul><li>Use Multiple anti-malware software </li></ul></ul>
  • 16. What To Do? <ul><li>Develop personal security policies for online behavior </li></ul><ul><li>Install a proactive security solution to block threats targeting vulnerabilities </li></ul><ul><li>Pay special attention to in configuring firewall </li></ul>
  • 17. Personal Security Policy <ul><li>Have email attachments scanned prior to opening </li></ul><ul><li>Delete all unwanted messages without opening </li></ul><ul><li>If you suspect an email is Spam, do not respond, delete it </li></ul>
  • 18. Personal Security Policy <ul><li>Reject all Instant Messages from persons who are not on your list </li></ul><ul><li>Do not click on URL links within IM unless from a trusted source </li></ul><ul><li>Never answer to the requests for confidential information via email or Instant Message </li></ul>
  • 19. Personal Security Policy <ul><li>Scan all files with an Internet Security solution before transferring them to your system </li></ul><ul><li>Only transfer files from a well known source </li></ul><ul><li>Use Security Software to block all unsolicited outbound communication </li></ul>
  • 20. Personal Security Policy <ul><li>Be especially cautious when clicking on pop-up advertisements </li></ul><ul><li>Do not respond to pop-up ads promoting system security or performance tools </li></ul><ul><li>Do not accept or open suspicious error dialogs from within the browser </li></ul>
  • 21. LAST BUT NOT THE LEAST <ul><li>Backup your files regularly </li></ul>
  • 22. Security Software <ul><li>The software that I use </li></ul><ul><li>Anti-virus AVG free edition </li></ul><ul><li>Malware AdAware free edition </li></ul><ul><li>SpyBot, S&D </li></ul><ul><li>Windows Defender </li></ul><ul><li>CWshreder </li></ul><ul><li>Firewall Zone Alarm free </li></ul><ul><li>Note: 1, 3 and 4 run on a nightly schedule, </li></ul>
  • 23. Wireless SOHO Network Router Configuration <ul><li>Change Router’s default password </li></ul><ul><li>Implement system security </li></ul><ul><li>Wep, 64bit recommended </li></ul><ul><li>Rotate the default transmit key </li></ul><ul><li>Disable SS ID Broadcast </li></ul><ul><li>Disable Remote Management </li></ul><ul><li>Enable router’s built-in firwall </li></ul>
  • 24. Virus on cell phone <ul><li>First virus ‘Cabir’ was a research project </li></ul><ul><li>‘Cabir’ got twisted around and new viruses were created </li></ul><ul><li>Virus, worm – same concepts as PCs </li></ul><ul><li>Propagates thru Blue Tooth </li></ul><ul><li>Propagates thru MMS </li></ul>
  • 25. Virus on cell phone What to do <ul><li>Turn off Bluetooth discoverable mode. Set your phone to &quot;hidden&quot; so other phones can't detect it and send it the virus. </li></ul><ul><li>Check security updates to learn about filenames you should keep an eye out for. </li></ul><ul><li>Download only from trusted environment </li></ul>
  • 26. <ul><li>Question any one? </li></ul>

×