SlideShare a Scribd company logo
1 of 14
Download to read offline
Basic Internet Security
      Marco Marcellini

6 Aprile 2009 – Florence Grand Hotel
Negative trend of Internet Security ?




Fonte: CSI Computer Crime & Security Survey 2008
People are strange...
Recent risk: the worm Conficker (Avr '09)
How Internet Works: TCP/IP
    Your computer is a node of entire network
●


    CHECKIP
●



    WHOIS
●



    TRACERT
●
How Internet Works: WEB, how big is it ?

                                                                          Google year 2000,
                                                                      ●

                                                                          1.060.000.000 of
                                                                          web pages
                                                                          Google in 2009,
                                                                      ●

                                                                          only the word
                                                                          “wedding” takes
                                                                          235.000.000 results
                                                                          More web pages,
                                                                      ●

                                                                          more business,
                                                                          more risks
Google.com in the year 2000 – from Internet Archive www.archive.org
Today's Top Security Challenges
(1) Data security & access control
(2) Identity theft
(3) Viruses and worms
(4) Malware/spyware & malicious web traffic
(5) On line frauds
(6) Hacker attacks
(7) Spam - Phishing
(8) Local network & wireless security
Viruses & malware: possible solutions
THE PROBLEM:         THE SOLUTION:
      Virus               Use and UPDATE an AntiVirus Software
                      ●
  ●

                          Install an Anti-Spyware Program (AVG
                      ●

      Worm
  ●
                          Anti-Spyware, Spybot - Search and
                          Destroy, Lavasoft Ad-Aware)
      Trojan horse
  ●

                          Occasionally Run Online Virus Scans
                      ●

      Backdoor
  ●
                          http://www.kaspersky.com/virusscanner
                      ●


      Spyware             http://housecall.antivirus.com
                      ●
  ●

                          If you receive strange attach, scan on
                      ●

      Hijacker
  ●
                          www.virscan.org
      Keylogger           Visit Microsoft's Windows (Apple)
  ●                   ●

                          Update Site Frequently
Secure your web experience 1/2
    Switch to another browser, like FIREFOX
●


    Switch to alternative o.s. like LINUX
●


    or make your Internet Explorer
●

    more secure, e.g. install SpywareBlaster
    http://www.javacoolsoftware.com/spywareblaster.html
Secure your web experience 2/2
    Educate yourself and be smart about where you
●

    visit and what you click on: www.malwaredomainlist.com
    Install MyWOT extension: www.mywot.com
●




    Use a Firewall, like a personal firewall:
●

    www.webroot.com/En_US/consumer-products-desktopfirewall.html
How to protect your data

    Webmail: use HTTPS instead of HTTP
●


    Packet sniffing, an example with WireShark
●




    Protect your mobile datas TrueCrypt, Free
●

    open-source disk encryption software for
    Windows Vista/XP, Mac OS X, and Linux
E-mail security: tracing the sender
Bookmarks
        Whois tools
     ●

VisualRoute traceroute: connection test, trace IP address, IP trace, IP address locations
Current IP Check
Database Whois del Registro
Whois di GeekTools
Internet Archive: Wayback Machine

       Antispyware software
     ●

Lavasoft: Scarica tutta la gamma Ad-Aware Anniversary Edition
Home - Pagina iniziale di Spybot-S&D!
SpywareBlaster® | Prevent spyware and malware. Free download.

        Online virus scanner
     ●

Free Virus Scan - Kaspersky Lab
HouseCall: Scansione virus online della Trend Micro - Trend Micro Italia
VirSCAN.org - Free Multi-Engine Online Virus Scanner v1.02, Supports 37 AntiVirus Engines!

      Malware domain lists
     ●

Malware Domain List
Comunità della valutazione sulla reputazione del sito Web | WOT Web of Trust

        Security tools
     ●

TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Wireshark: Go deep.
eMailTrackerPro - trace email, spam email, email spam, outlook email spam, email tracking, email tracing, email
Best Firewall Software – Webroot Desktop Firewall Protection
THE END
Relatore:
Marco Marcellini – Tiphys Digital Lifestyle
marco.marcellini@cortonaweb.net
www.tiphys.com


Slides disponibili su www.slideshare.net/mamarcel

More Related Content

Viewers also liked

E-Learning: 21st Century Perspectives on Teaching, Learning, and Technology
E-Learning: 21st Century Perspectives on Teaching, Learning, and TechnologyE-Learning: 21st Century Perspectives on Teaching, Learning, and Technology
E-Learning: 21st Century Perspectives on Teaching, Learning, and TechnologyKiran Budhrani
 
E learning presentation (update 2012)
E learning presentation (update 2012)E learning presentation (update 2012)
E learning presentation (update 2012)Santiago Moral
 
From E-Learning to Social Learning
From E-Learning to Social LearningFrom E-Learning to Social Learning
From E-Learning to Social LearningJane Hart
 

Viewers also liked (6)

E-Learning: 21st Century Perspectives on Teaching, Learning, and Technology
E-Learning: 21st Century Perspectives on Teaching, Learning, and TechnologyE-Learning: 21st Century Perspectives on Teaching, Learning, and Technology
E-Learning: 21st Century Perspectives on Teaching, Learning, and Technology
 
3.3 Internet Services
3.3 Internet Services3.3 Internet Services
3.3 Internet Services
 
E learning presentation (update 2012)
E learning presentation (update 2012)E learning presentation (update 2012)
E learning presentation (update 2012)
 
E learning ppt
E learning pptE learning ppt
E learning ppt
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
From E-Learning to Social Learning
From E-Learning to Social LearningFrom E-Learning to Social Learning
From E-Learning to Social Learning
 

Similar to Basic Internet Security (for Association of Bridal Consultants - Italy)

Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Codeguest66dc5f
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentationxia_bofa
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationChris Gates
 
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionDrivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionWayne Huang
 
Top 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTop 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTeleport
 
RSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP TrainingRSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP TrainingJim Manico
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416Anthony Arrott
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber SeguridadCristian Garcia G.
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 

Similar to Basic Internet Security (for Association of Bridal Consultants - Italy) (20)

Recent Rogueware
Recent RoguewareRecent Rogueware
Recent Rogueware
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionDrivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
 
B&W Netsparker overview
B&W Netsparker overviewB&W Netsparker overview
B&W Netsparker overview
 
Top 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTop 10 Hacks of the Last Decade
Top 10 Hacks of the Last Decade
 
RSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP TrainingRSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP Training
 
Twinverse
TwinverseTwinverse
Twinverse
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 
Fireshark - Brucon 2010
Fireshark - Brucon 2010Fireshark - Brucon 2010
Fireshark - Brucon 2010
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 

More from Marco Marcellini

GDPR introduzione al nuovo Regolamento per la Protezione Dati
GDPR introduzione al nuovo Regolamento per la Protezione DatiGDPR introduzione al nuovo Regolamento per la Protezione Dati
GDPR introduzione al nuovo Regolamento per la Protezione DatiMarco Marcellini
 
Digital forensic: metodologie di analisi della prova digitale
Digital forensic: metodologie di analisi della prova digitaleDigital forensic: metodologie di analisi della prova digitale
Digital forensic: metodologie di analisi della prova digitaleMarco Marcellini
 
Smart City: cosa significa progettare città intelligenti. Esempi europei e it...
Smart City: cosa significa progettare città intelligenti. Esempi europei e it...Smart City: cosa significa progettare città intelligenti. Esempi europei e it...
Smart City: cosa significa progettare città intelligenti. Esempi europei e it...Marco Marcellini
 
Il ruolo degli OpenData nella progettazione della Smart City
Il ruolo degli OpenData nella progettazione della Smart CityIl ruolo degli OpenData nella progettazione della Smart City
Il ruolo degli OpenData nella progettazione della Smart CityMarco Marcellini
 
Agenda Digitale: prospettive e problemi
Agenda Digitale: prospettive e problemiAgenda Digitale: prospettive e problemi
Agenda Digitale: prospettive e problemiMarco Marcellini
 
La comunicazione ai tempi dei social
La comunicazione ai tempi dei socialLa comunicazione ai tempi dei social
La comunicazione ai tempi dei socialMarco Marcellini
 
Legge 33/2013 Amministrazione trasparente, cosa cambia nei siti web della PA
Legge 33/2013 Amministrazione trasparente, cosa cambia nei siti web della PALegge 33/2013 Amministrazione trasparente, cosa cambia nei siti web della PA
Legge 33/2013 Amministrazione trasparente, cosa cambia nei siti web della PAMarco Marcellini
 
Stalking e cyber bullismo, tecniche di attacco e possibilità di difesa
Stalking e cyber bullismo, tecniche di attacco e possibilità di difesaStalking e cyber bullismo, tecniche di attacco e possibilità di difesa
Stalking e cyber bullismo, tecniche di attacco e possibilità di difesaMarco Marcellini
 
Presentazione progetto MaecParco
Presentazione progetto MaecParcoPresentazione progetto MaecParco
Presentazione progetto MaecParcoMarco Marcellini
 
Internet kids security for parents and teachers
Internet kids security for parents and teachersInternet kids security for parents and teachers
Internet kids security for parents and teachersMarco Marcellini
 
LIBRO Internet a misura di bambino
LIBRO Internet a misura di bambinoLIBRO Internet a misura di bambino
LIBRO Internet a misura di bambinoMarco Marcellini
 
Internet a misura di bambino
Internet a misura di bambinoInternet a misura di bambino
Internet a misura di bambinoMarco Marcellini
 
Presentazione Profilo salute 2008 Valdichiana Aretina
Presentazione Profilo salute 2008 Valdichiana AretinaPresentazione Profilo salute 2008 Valdichiana Aretina
Presentazione Profilo salute 2008 Valdichiana AretinaMarco Marcellini
 
XML, TEI e codifica dei testi
XML, TEI e codifica dei testiXML, TEI e codifica dei testi
XML, TEI e codifica dei testiMarco Marcellini
 
Web 2.0 e condivisione del sapere: Marco Marcellini Milano 24 Maggio
Web 2.0 e condivisione del sapere: Marco Marcellini Milano 24 MaggioWeb 2.0 e condivisione del sapere: Marco Marcellini Milano 24 Maggio
Web 2.0 e condivisione del sapere: Marco Marcellini Milano 24 MaggioMarco Marcellini
 

More from Marco Marcellini (15)

GDPR introduzione al nuovo Regolamento per la Protezione Dati
GDPR introduzione al nuovo Regolamento per la Protezione DatiGDPR introduzione al nuovo Regolamento per la Protezione Dati
GDPR introduzione al nuovo Regolamento per la Protezione Dati
 
Digital forensic: metodologie di analisi della prova digitale
Digital forensic: metodologie di analisi della prova digitaleDigital forensic: metodologie di analisi della prova digitale
Digital forensic: metodologie di analisi della prova digitale
 
Smart City: cosa significa progettare città intelligenti. Esempi europei e it...
Smart City: cosa significa progettare città intelligenti. Esempi europei e it...Smart City: cosa significa progettare città intelligenti. Esempi europei e it...
Smart City: cosa significa progettare città intelligenti. Esempi europei e it...
 
Il ruolo degli OpenData nella progettazione della Smart City
Il ruolo degli OpenData nella progettazione della Smart CityIl ruolo degli OpenData nella progettazione della Smart City
Il ruolo degli OpenData nella progettazione della Smart City
 
Agenda Digitale: prospettive e problemi
Agenda Digitale: prospettive e problemiAgenda Digitale: prospettive e problemi
Agenda Digitale: prospettive e problemi
 
La comunicazione ai tempi dei social
La comunicazione ai tempi dei socialLa comunicazione ai tempi dei social
La comunicazione ai tempi dei social
 
Legge 33/2013 Amministrazione trasparente, cosa cambia nei siti web della PA
Legge 33/2013 Amministrazione trasparente, cosa cambia nei siti web della PALegge 33/2013 Amministrazione trasparente, cosa cambia nei siti web della PA
Legge 33/2013 Amministrazione trasparente, cosa cambia nei siti web della PA
 
Stalking e cyber bullismo, tecniche di attacco e possibilità di difesa
Stalking e cyber bullismo, tecniche di attacco e possibilità di difesaStalking e cyber bullismo, tecniche di attacco e possibilità di difesa
Stalking e cyber bullismo, tecniche di attacco e possibilità di difesa
 
Presentazione progetto MaecParco
Presentazione progetto MaecParcoPresentazione progetto MaecParco
Presentazione progetto MaecParco
 
Internet kids security for parents and teachers
Internet kids security for parents and teachersInternet kids security for parents and teachers
Internet kids security for parents and teachers
 
LIBRO Internet a misura di bambino
LIBRO Internet a misura di bambinoLIBRO Internet a misura di bambino
LIBRO Internet a misura di bambino
 
Internet a misura di bambino
Internet a misura di bambinoInternet a misura di bambino
Internet a misura di bambino
 
Presentazione Profilo salute 2008 Valdichiana Aretina
Presentazione Profilo salute 2008 Valdichiana AretinaPresentazione Profilo salute 2008 Valdichiana Aretina
Presentazione Profilo salute 2008 Valdichiana Aretina
 
XML, TEI e codifica dei testi
XML, TEI e codifica dei testiXML, TEI e codifica dei testi
XML, TEI e codifica dei testi
 
Web 2.0 e condivisione del sapere: Marco Marcellini Milano 24 Maggio
Web 2.0 e condivisione del sapere: Marco Marcellini Milano 24 MaggioWeb 2.0 e condivisione del sapere: Marco Marcellini Milano 24 Maggio
Web 2.0 e condivisione del sapere: Marco Marcellini Milano 24 Maggio
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Basic Internet Security (for Association of Bridal Consultants - Italy)

  • 1. Basic Internet Security Marco Marcellini 6 Aprile 2009 – Florence Grand Hotel
  • 2. Negative trend of Internet Security ? Fonte: CSI Computer Crime & Security Survey 2008
  • 4. Recent risk: the worm Conficker (Avr '09)
  • 5. How Internet Works: TCP/IP Your computer is a node of entire network ● CHECKIP ● WHOIS ● TRACERT ●
  • 6. How Internet Works: WEB, how big is it ? Google year 2000, ● 1.060.000.000 of web pages Google in 2009, ● only the word “wedding” takes 235.000.000 results More web pages, ● more business, more risks Google.com in the year 2000 – from Internet Archive www.archive.org
  • 7. Today's Top Security Challenges (1) Data security & access control (2) Identity theft (3) Viruses and worms (4) Malware/spyware & malicious web traffic (5) On line frauds (6) Hacker attacks (7) Spam - Phishing (8) Local network & wireless security
  • 8. Viruses & malware: possible solutions THE PROBLEM: THE SOLUTION: Virus Use and UPDATE an AntiVirus Software ● ● Install an Anti-Spyware Program (AVG ● Worm ● Anti-Spyware, Spybot - Search and Destroy, Lavasoft Ad-Aware) Trojan horse ● Occasionally Run Online Virus Scans ● Backdoor ● http://www.kaspersky.com/virusscanner ● Spyware http://housecall.antivirus.com ● ● If you receive strange attach, scan on ● Hijacker ● www.virscan.org Keylogger Visit Microsoft's Windows (Apple) ● ● Update Site Frequently
  • 9. Secure your web experience 1/2 Switch to another browser, like FIREFOX ● Switch to alternative o.s. like LINUX ● or make your Internet Explorer ● more secure, e.g. install SpywareBlaster http://www.javacoolsoftware.com/spywareblaster.html
  • 10. Secure your web experience 2/2 Educate yourself and be smart about where you ● visit and what you click on: www.malwaredomainlist.com Install MyWOT extension: www.mywot.com ● Use a Firewall, like a personal firewall: ● www.webroot.com/En_US/consumer-products-desktopfirewall.html
  • 11. How to protect your data Webmail: use HTTPS instead of HTTP ● Packet sniffing, an example with WireShark ● Protect your mobile datas TrueCrypt, Free ● open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux
  • 13. Bookmarks Whois tools ● VisualRoute traceroute: connection test, trace IP address, IP trace, IP address locations Current IP Check Database Whois del Registro Whois di GeekTools Internet Archive: Wayback Machine Antispyware software ● Lavasoft: Scarica tutta la gamma Ad-Aware Anniversary Edition Home - Pagina iniziale di Spybot-S&D! SpywareBlaster® | Prevent spyware and malware. Free download. Online virus scanner ● Free Virus Scan - Kaspersky Lab HouseCall: Scansione virus online della Trend Micro - Trend Micro Italia VirSCAN.org - Free Multi-Engine Online Virus Scanner v1.02, Supports 37 AntiVirus Engines! Malware domain lists ● Malware Domain List Comunità della valutazione sulla reputazione del sito Web | WOT Web of Trust Security tools ● TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux Wireshark: Go deep. eMailTrackerPro - trace email, spam email, email spam, outlook email spam, email tracking, email tracing, email Best Firewall Software – Webroot Desktop Firewall Protection
  • 14. THE END Relatore: Marco Marcellini – Tiphys Digital Lifestyle marco.marcellini@cortonaweb.net www.tiphys.com Slides disponibili su www.slideshare.net/mamarcel