Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The battle for safety


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

The battle for safety

  1. 1. The Battle for Internet Safety Vic Laurie
  2. 2. What We Will Cover <ul><li>What has changed and why the Internet security problem is so serious </li></ul><ul><li>The minimum defenses that the home PC owner must use </li></ul><ul><li>Steps for additional safety </li></ul>
  3. 3. The Bad News <ul><li>Security problems are inherent and getting worse </li></ul><ul><ul><li>Organized criminal gangs involved </li></ul></ul><ul><li>Defenses require work and vigilance </li></ul><ul><li>Greater security means less convenience </li></ul><ul><li>There is no perfect defense </li></ul><ul><li>No one has yet written software that guards against gullibility or greed </li></ul>
  4. 4. The Good News <ul><li>With reasonable care, most PC users can probably avoid any serious problem </li></ul><ul><li>If a system does get infected with malware, regular backups will help </li></ul>
  5. 5. The Problem Is Inherent <ul><li>The Internet was designed with an idealistic concept of a completely open community where everybody is equal and anonymous </li></ul><ul><ul><li>Sociopaths, criminals, and stupidity were not considered </li></ul></ul><ul><li>The design did not take into account billions of untrained users </li></ul><ul><li>Windows was not originally designed for the Internet </li></ul><ul><ul><li>Millions of old unsafe Windows PCs remain </li></ul></ul><ul><li>Social engineering is now the main threat </li></ul>
  6. 6. Types of Threats <ul><li>Downloads to your computer </li></ul><ul><ul><li>Steal passwords- key loggers </li></ul></ul><ul><ul><li>Extort payments </li></ul></ul><ul><ul><li>Phony anti-virus </li></ul></ul><ul><ul><li>Run your computer </li></ul></ul><ul><li>Phishing </li></ul><ul><ul><li>Nigerian and similar scams </li></ul></ul><ul><ul><li>Phony bank sites </li></ul></ul>
  7. 7. Bad Statistics <ul><li>In 2009, more than 25 million different unique malware programs were identified, more than all the malware programs ever created in all previous years. </li></ul><ul><li>Some antimalware vendors report that 48 percent of the computers they scan are infected </li></ul>
  8. 11. An ad online showing bulk credit card numbers for sale
  9. 13. How Much Security Is Enough? <ul><li>Trade-off between security and usefulness </li></ul><ul><li>The more security, the less convenience </li></ul><ul><li>How to strike the proper balance? </li></ul><ul><li>Depends on skill and usage habits of PC owner </li></ul>
  10. 14. 21 ZoneAlarm Internet Security 35 Trend Micro Internet Security Pro 19 PC Security Shield 24 Panda Internet Security 15 Norton Internet Security 2010 26 Norman Internet Security Suite 19 McAfee Internet Security 15 Kaspersky Internet Security 40 BitDefender Internet Security Boot Time Increase (sec) Suite
  11. 15. Different Types of Protection <ul><li>Firewalls </li></ul><ul><li>Antivirus- signature and heuristics </li></ul><ul><li>Anti-spyware </li></ul><ul><li>Anti-trojan </li></ul><ul><li>Rootkit detectors </li></ul><ul><li>Link scanners </li></ul><ul><li>Intrusion and behavioral detection </li></ul><ul><li>Sandboxes </li></ul>
  12. 16. Criteria for Basic Defense for Average Home User <ul><li>Has to be simple </li></ul><ul><li>Has to be unobtrusive with few judgment calls </li></ul><ul><li>Has to be automated as much as possible </li></ul><ul><li>Has to be easy on system resources </li></ul>
  13. 17. Minimum Defenses for Average PC User <ul><li>Windows firewall </li></ul><ul><li>Microsoft Security Essentials </li></ul><ul><li>Automatic Windows updates </li></ul><ul><li>Latest Internet browser with site filters </li></ul><ul><ul><li>Internet Explorer 8, Firefox 3.6+, Chrome </li></ul></ul><ul><li>Anti-spyware program </li></ul><ul><ul><li>Malwarebytes </li></ul></ul><ul><li>In Windows Vista and 7, use limited accounts </li></ul><ul><li>With children, use parental controls </li></ul><ul><li>Regular backups </li></ul><ul><li>Monitor all online accounts </li></ul>
  14. 18. Additional Defenses <ul><li>Use strong passwords </li></ul><ul><ul><li>Password managers, e.g ., LastPass </li></ul></ul><ul><li>Intrusion detection software </li></ul><ul><ul><li>WinPatrol </li></ul></ul><ul><li>Rootkit detector </li></ul><ul><ul><li>Sophos </li></ul></ul><ul><li>Use update software to check applications </li></ul><ul><ul><li>Secunia Personal Software Inspector ( ) </li></ul></ul><ul><li>Turn off scripting </li></ul><ul><ul><li>NoScript extension for Firefox </li></ul></ul>
  15. 19. More Security <ul><li>Two-way firewall </li></ul><ul><li>Use Sandboxie </li></ul><ul><li>Scan all downloads </li></ul><ul><ul><li>Virus Total ( ) </li></ul></ul><ul><li>View email in text mode </li></ul><ul><li>Use DNS provider with filtering </li></ul><ul><li>Use virtual machines </li></ul><ul><li>Surf from a USB key </li></ul><ul><li>Run Linux </li></ul>
  16. 20. Useful References <ul><li>The Best Free Security Software for PC </li></ul><ul><ul><li> </li></ul></ul><ul><li>How to Block Bad Websites </li></ul><ul><ul><li> </li></ul></ul>
  17. 22. Menu from “Safety” button in Internet Explorer 8
  18. 23. Firefox Site Filtering
  19. 26. Network Security <ul><li>Encrypt wireless router </li></ul><ul><li>Change wireless router password </li></ul><ul><li>Do not access sensitive information while using public wi-fi </li></ul>
  20. 27. Privacy Issues <ul><li>Settings for private browsing on browsers </li></ul><ul><li>Blocking cookies </li></ul><ul><li>Blocking Flash cookies </li></ul><ul><li>Anonymizers </li></ul>
  21. 29. The End