Computer Security
Going to Cover
• Hardware
• Software
• Malware
• Spam
• Physical Security
• Questions?
Hardware
• Firewall
• Unified Threat Management Device
Software
• Firewall
• Anti-Virus
• Anti-Spyware
• Anti-Spam
• Virus
• Trojan
• Worm
• Other Malware
Malware
• Where are the threats from
– Russian Mafia
– Triads
• When
– Websites (upto 80% of legitimate websites are infected
1in ...
Research by Kaspersky Lab in 2010 suggests that 1 in
every how many legitimate websites is infected by
malware?
50%
25%
20...
• Payload
– Trojan
– Key Logger
– Browser Hijack
What happens
• Sorry I personally don’t believe you are.
– Apple’s penetration of the market
– The lack of security Products
• My advic...
• unsolicited or undesired bulk electronic
messages. There are many types of electronic
spam.
• 50 – 80 % of all emails ar...
Percentage of emails sent in April 2011 were classified
as SPAM?
5%
35%
50%
10%
0%
10%
20%
30%
40%
50%
60%
16.8% 58.7% 72....
• Use an effective anti – spam tool
– Piece of software installed locally
– Carried out at your ISP
– Or through a hosted ...
True or false – to stop receiving spam you should
always click the ‘unsubscribe’ link in the email?
15%
75%
10%
0%
10%
20%...
• Network Devices (Routers, Switches etc.)
• Hard Drive Failure
• End Result of Virus
• Accidental deletion
Physical Secur...
According to IDC statistics, what percentage of
businesses that suffer a major data loss cease trading
within 12 months?
4...
Any Questions?
• These measure can be thought of those similar to the ones we carry out on our cars (checking
lights, fluid levels etc.)
...
• Back up your files. Backing up files helps you protect your information from accidental erasure or
from a hardware failu...
• Change your passwords. Keeping the same passwords increases the likelihood that
someone else will discover your password...
Limbtec Computer Security Presentation
Upcoming SlideShare
Loading in …5
×

Limbtec Computer Security Presentation

474 views

Published on

Slides from the latest presentation given by Martin Limburnfrom Limbtec, at plymouths Breakwater networking Group

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
474
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Virus – A Program that can infect other programs by modifying them to include a possibly evolved, copy of itself.
    Structure – Infection way or ways the virus spreads, Payload: what will it do, trigger: what causes the payload to deploy
    Trojan - A Program that does something undocumented that the programmer intended, but that some users would not approve of if they knew about it.
    Worm – is a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems (Usually via network connections)
    Other Malware –
  • Threats from Russian Mafia, Chinese Triads.
    A lot of the threats are now from websites.
  • Threats from Russian Mafia, Chinese Triads.
    A lot of the threats are now from websites.
  • Threats from Russian Mafia, Chinese Triads.
    A lot of the threats are now from websites.
  • Network Devices – West Mercia Police have arrested several people recently for stealing bandwidth. Did you know you are responsible for anything that goes on through your wireless connection? Make sure your wireless is secure, but also change the password that protects your equipment.
    Hard-drive failure – Back up your data, depending on whose figures you believe up to 80% of businesses that suffer a data loss cease trading within 12 months.
    Data loss could be the end result of a virus, but more likely accidental deletion will be the cause of data there are simple steps that can be taken on the latest versions of windows to prevent this being a problem.
  • Limbtec Computer Security Presentation

    1. 1. Computer Security
    2. 2. Going to Cover • Hardware • Software • Malware • Spam • Physical Security • Questions?
    3. 3. Hardware • Firewall • Unified Threat Management Device
    4. 4. Software • Firewall • Anti-Virus • Anti-Spyware • Anti-Spam
    5. 5. • Virus • Trojan • Worm • Other Malware Malware
    6. 6. • Where are the threats from – Russian Mafia – Triads • When – Websites (upto 80% of legitimate websites are infected 1in 150) – P2P Software (Limewire) • How? – You may see a pop up – You may see nothing Where, When, How will I Know
    7. 7. Research by Kaspersky Lab in 2010 suggests that 1 in every how many legitimate websites is infected by malware? 50% 25% 20% 5% 0% 10% 20% 30% 40% 50% 60% 12 150 275 No response PercentageofRespondents
    8. 8. • Payload – Trojan – Key Logger – Browser Hijack What happens
    9. 9. • Sorry I personally don’t believe you are. – Apple’s penetration of the market – The lack of security Products • My advice is protect your mac now, by installing a 3rd Party Anti-Virus product I’m Safe I use a Mac
    10. 10. • unsolicited or undesired bulk electronic messages. There are many types of electronic spam. • 50 – 80 % of all emails are Spam. • Possibly used as a delivery method for Viruses, worms etc. • Using Bandwidth. • Waste of Storage. SPAM
    11. 11. Percentage of emails sent in April 2011 were classified as SPAM? 5% 35% 50% 10% 0% 10% 20% 30% 40% 50% 60% 16.8% 58.7% 72.9% No response PercentageofRespondents
    12. 12. • Use an effective anti – spam tool – Piece of software installed locally – Carried out at your ISP – Or through a hosted service • When using an address publically, use a different address • Hide email addresses in websites. Spam – what you can do!
    13. 13. True or false – to stop receiving spam you should always click the ‘unsubscribe’ link in the email? 15% 75% 10% 0% 10% 20% 30% 40% 50% 60% 70% 80% TRUE FALSE No response PercentageofRespondents
    14. 14. • Network Devices (Routers, Switches etc.) • Hard Drive Failure • End Result of Virus • Accidental deletion Physical Security
    15. 15. According to IDC statistics, what percentage of businesses that suffer a major data loss cease trading within 12 months? 45% 15% 25% 15% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Up to 30% Up to 50% Up to 70% No response PercentageofRespondents
    16. 16. Any Questions?
    17. 17. • These measure can be thought of those similar to the ones we carry out on our cars (checking lights, fluid levels etc.) • Get information about what's new • Sign up to receive notification when patches are available for the software you have installed. You can usually do this by going to the manufacturer's Web site. • Register new software. Software publishers can keep you informed about patches and updates. You can opt in or opt out of other services they offer. • Subscribe to free Microsoft product security bulletins. Microsoft offers an e-mail alert service for home users, as well as one for IT Professionals and others with a strong understanding of technical issues. (http://www.microsoft.com/technet/security/bulletin/notify.mspx) • Install software updates immediately. Regular Maintenance
    18. 18. • Back up your files. Backing up files helps you protect your information from accidental erasure or from a hardware failure, as well as from damage by hackers. The more virulent types of attacks damage or infect your hard drive and you can lose valuable personal information. When you back up your files, make sure you: – Have a recent backup before installing new software programs or updates. – Use at least a couple of storage disks, to cut down on the risk of one disk becoming damaged or infected. Write the backup date on the label. – Verify that you can read the backup disk. – Do store your backup disks away from your computer. If content is irreplaceable, consider a fireproof box or a safe deposit box. • Let your antivirus software scan your files. Schedule your antivirus software to conduct weekly scans. It can scan data files, executable files, and system files in any combination. If an infection is found, the antivirus software will repair or quarantine specific files. Contact your antivirus vendor's Web site for further clean-up instructions. • Check for software and antivirus signature updates. Software programs for which you are not receiving automatic updates or notifications, check the software publishers' Web sites. • Defragment your Hard Disk. Use the built in Disk defragmenter or a third party utility to keep your hard drives contents organised, and help improve the drives performance. Regular Maintenance (Weekly)
    19. 19. • Change your passwords. Keeping the same passwords increases the likelihood that someone else will discover your password. (See http://www.microsoft.com/protect/yourself/password/create.mspx) • Verify that your antivirus subscription is current. Treat it like car insurance. Don't let it lapse. • Reassess your situation. Your security and privacy needs might have changed due to who is using your computer, how it's being used, or new threats on the Internet. • Tip: • Use the Windows Task Scheduler to schedule routine file maintenance such as automatic disk cleanup, disk defragmenter, and virus scans. Check the Windows Help files for instructions. • Automate your maintenance tasks • Computers are good at this! For example, if you are using Windows XP, Windows Me, or Windows 2000 SP3, you can receive automatic alerts about updates needed to help maintain security and improve operation. Contact your software vendors to see what automated services they provide Regular Maintenance (6 Monthly)

    ×