SlideShare a Scribd company logo
11
Best Practice to Fight with
Ransomware
2
Big Numbers of 2016
Source: KasperskyLab
3Source: KasperskyLab
4
Agenda
01
Ransomware
Introduction
02
How USG Stops
Ransomware
Something You Need to
Know
USG Provides Comprehensive
Protection
03
5 Tips for Preventing
Ransomware
Prevention Tips
5
What is Ransomware?
• Ransomware is a type of malware that
prevents or limits users from accessing
their system.
• Encrypted system/file is the typical
way Ransomware did.
• This type of malware forces its victims
to pay the ransom through certain
online payment methods in order to
grant access to their systems, or to get
their data back.
6
Common Behaviors of Ransomware
• When hit, it offers users the option of
decrypting 5 files for free—as proof that
decryption is possible.
• Users are also given 96 hours, instead of
72 hours, to pay the ransom fee which
ranges from $500~$1,000.
• In some case, infection could occur
through embedded URL over email or
compromised web site with drive-by
download technics.
TeslaCrypt Ransom Page / Source: Google Search
7
7ev3n-HONE$T Ransom Page / Source: Google Search
8
2016 Ransom Cases
Source: TheHackerNews.com
9
• Once again the heat was felt by
the Los Angeles Valley College
(LAVC) when hackers managed
to infect its computer network
with ransomware and
demanded US$28,000 payment
in Bitcoins to get back online.
• The cyber-attack occurred over
winter break and caused
widespread disruption to online,
financial aid, email and
voicemail systems, including
locking out 1,800 students and
staffs from their computers.
Source: TheHackerNews.com
2017 Ransom Case
10
Typical Threat Infection Method
11
How Ransomware works?
1. Spear-phishing email
2. User opens email 3-1. Fake attached file is executed
4. Files encrypted5. Ransom message is displayed
6. Damage occurred
1212
How USG Stops Ransomware
13
USG provides Comprehensive Protection
1). Anti-Spam stops
phishing email
2). Content Filter stops user
to open unsafe/malicious
link (from email)
3). Anti-Virus protects
user not to download
malware-infected files
4). IDP detects and stops
Ransomware attempting to
contact CC&C
14
Anti-Spam Secured Email In-&-Out
• Enable reputation-based email protection
• Ransomware usually uses spear-phishing emails as 1st step
• Zyxel Anti-Spam protects your network not only from spam as well from
suspicious emails
• Real time protection from cloud-based automated sharing and updating
15
Content Filter Secured Web Connection
• Enable protection on accessing every URL
• When user clicks on the link in emails and attempt to connect, those URL
should be checked
• Zyxel Content Filtering for USG/ZyWALL covers the world’s largest URL
database and keeps updated
16
Anti-Virus Stops Malware-infected Files
• Enable anti-malware protection
• Files attached in the mails should be thoroughly scanned
• Zyxel Anti-Virus protects the users from Viruses, Worms, Trojans, and
Malware including protocols like SMTP and POP3
• Along with SSL Inspection, USG/ZyWALL can further deal with encrypted
emails
17
IDP Monitor Network Behaviors
• Put the threat intelligence on
• Abnormal behaviors should be monitored and detected
• Zyxel Intrusion Detection & Protection closely watch the network
behaviors and detect the attempting connections to the CC&C or
backdoor program.
1818
5 Tips for Preventing Ransomware
19
PREVENT, not REACT
20
Ransomware Prevention Tips – 1/5
1. Security Gateway Provides Comprehensive Protection
• To maximize your protection against malware, including Ransomware.
• To stop threat at different points of your next environment.
21
Ransomware Prevention Tips – 2/5
2. Backup regularly and always keep a recent backup
copy off-site.
• Always do a regular backup of your files and system OS and encrypt your
backup. This way you don't have to worry about Ransomaware threat
because you could easily restore your files or system OS back very soon.
22
Ransomware Prevention Tips – 3/5
3. Patch, patch, patch…
• Malware threat relies on software or application vulnerabilities (or bugs).
When you apply security patches, you give the cybercriminals fewer
options for infecting you with ransomware.
23
Ransomware Prevention Tips – 4/5
4. Be very careful about opening unsolicited attachments
or clicking unfamiliar web link
• Opening an attachment in the received email from unknown sources, or
clicking on a sexy picture/image or a harmless advertisement could
actually redirect you to a malicious web site and might installed a
malicious software.
24
Ransomware Prevention Tips – 5/5
5. User Anti-Virus software on every clients
• Install and keep anti-virus (AV) and personal firewall software up-to-date
on your client devices. Always check downloaded files because AV
software could help keeping your client device free of the most common
malware.
25
Reminding Again
• Always remember to regularly perform system backup on
your PCs
• In case the system is hit, it can be restored and perform seamlessly
26
Free Decryptors:
• https://www.nomoreransom.org/ • https://noransom.kaspersky.com/
2727
Appendix
28
Next Generation USG
 Anti-malware Protection (Anti-Virus)
 Web Security (Content Filter)
 Email Security (Anti-Spam)
 Intrusion Detection & Prevention (IDP)
 SSL Inspection
 Hybrid VPN (IPSec/SSL/L2TP over IPSec)
 Ultra-High Performance
 High-Availability
 Firewall/NAT
 BWM
2929
Next-Gen USG Product Portfolio
Model USG40(W) USG60(W) USG110 USG210 USG310 USG1100 USG1900
Firewall Throughput
(RFC2544)
400 Mbps 1.0 Gbps 1.6 Gbps 1.9 Gbps 5.0 Gbps 6.0 Gbps 7.0 Gbps
UTM
Throughput
50 Mbps 90 Mbps 250 Mbps 300 Mbps 400 Mbps 500 Mbps 600 Mbps
Recommended # of
users
1 ~ 10 10 ~ 25 25 ~ 50 50 ~ 75 75 ~ 200 200 ~ 350 350 ~ 500
Features
/Scalability
Small Business or Branch Office Medium to Large Businesses
3030
VPN Firewall Product Portfolio
Model USG20(W)-VPN ZyWALL 110 ZyWALL 310 ZyWALL 1100 USG2200-VPN
Firewall Throughput
(RFC2544)
350 Mbps 1.6 Gbps 5.0 Gbps 6.0 Gbps 12.0 Gbps
VPN
Throughput
90 Mbps 400 Mbps 650 Mbps 800 Mbps 1.8 Mbps
Max. Concurrent IPSec
VPN Tunnels
10 100 300 1,000 3,000
Features
/Scalability
Small Business or Branch Office Medium to Large Businesses
31
USG/ZyWALL UTM Service License
3232

More Related Content

What's hot

Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
ISSA LA
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
Symantec
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension Inc.
 
Ransomware
RansomwareRansomware
Ransomware
Nick Miller
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
Osirium Limited
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
Symantec Security Response
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
dinCloud Inc.
 
Linta
LintaLinta
Linta
galaxy201
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
OK2OK
 
Keeping web servers safe and profitable with Imunify360
Keeping web servers safe and profitable with Imunify360Keeping web servers safe and profitable with Imunify360
Keeping web servers safe and profitable with Imunify360
CloudLinux
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
HTS Hosting
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
Quick Heal Technologies Ltd.
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
Sophos Benelux
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
Charles Steve
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
Marcelo Silva
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
Bright Technology
 
Preventing Today's Malware
Preventing Today's MalwarePreventing Today's Malware
Preventing Today's Malware
David Perkins
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
Sarah Roberts
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
Maaz Ahmed Shaikh
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
InnoTech
 

What's hot (20)

Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA Compliance
 
Ransomware
RansomwareRansomware
Ransomware
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Linta
LintaLinta
Linta
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Keeping web servers safe and profitable with Imunify360
Keeping web servers safe and profitable with Imunify360Keeping web servers safe and profitable with Imunify360
Keeping web servers safe and profitable with Imunify360
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
 
Preventing Today's Malware
Preventing Today's MalwarePreventing Today's Malware
Preventing Today's Malware
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
 

Similar to Best Practice to Fight with Ransomware................

How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....
Bhairave Maulekhi
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
David Sweigert
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
Security Innovation
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
Kevo Meehan
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
anti_virus
anti_virusanti_virus
anti_virus
sharq university
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
sachingwalani24
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Malware
MalwareMalware
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
Mohd Harris Ahmad Jaal
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
jeetendra mandal
 

Similar to Best Practice to Fight with Ransomware................ (20)

How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
anti_virus
anti_virusanti_virus
anti_virus
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Malware
MalwareMalware
Malware
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Best Practice to Fight with Ransomware................

  • 1. 11 Best Practice to Fight with Ransomware
  • 2. 2 Big Numbers of 2016 Source: KasperskyLab
  • 4. 4 Agenda 01 Ransomware Introduction 02 How USG Stops Ransomware Something You Need to Know USG Provides Comprehensive Protection 03 5 Tips for Preventing Ransomware Prevention Tips
  • 5. 5 What is Ransomware? • Ransomware is a type of malware that prevents or limits users from accessing their system. • Encrypted system/file is the typical way Ransomware did. • This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back.
  • 6. 6 Common Behaviors of Ransomware • When hit, it offers users the option of decrypting 5 files for free—as proof that decryption is possible. • Users are also given 96 hours, instead of 72 hours, to pay the ransom fee which ranges from $500~$1,000. • In some case, infection could occur through embedded URL over email or compromised web site with drive-by download technics. TeslaCrypt Ransom Page / Source: Google Search
  • 7. 7 7ev3n-HONE$T Ransom Page / Source: Google Search
  • 8. 8 2016 Ransom Cases Source: TheHackerNews.com
  • 9. 9 • Once again the heat was felt by the Los Angeles Valley College (LAVC) when hackers managed to infect its computer network with ransomware and demanded US$28,000 payment in Bitcoins to get back online. • The cyber-attack occurred over winter break and caused widespread disruption to online, financial aid, email and voicemail systems, including locking out 1,800 students and staffs from their computers. Source: TheHackerNews.com 2017 Ransom Case
  • 11. 11 How Ransomware works? 1. Spear-phishing email 2. User opens email 3-1. Fake attached file is executed 4. Files encrypted5. Ransom message is displayed 6. Damage occurred
  • 12. 1212 How USG Stops Ransomware
  • 13. 13 USG provides Comprehensive Protection 1). Anti-Spam stops phishing email 2). Content Filter stops user to open unsafe/malicious link (from email) 3). Anti-Virus protects user not to download malware-infected files 4). IDP detects and stops Ransomware attempting to contact CC&C
  • 14. 14 Anti-Spam Secured Email In-&-Out • Enable reputation-based email protection • Ransomware usually uses spear-phishing emails as 1st step • Zyxel Anti-Spam protects your network not only from spam as well from suspicious emails • Real time protection from cloud-based automated sharing and updating
  • 15. 15 Content Filter Secured Web Connection • Enable protection on accessing every URL • When user clicks on the link in emails and attempt to connect, those URL should be checked • Zyxel Content Filtering for USG/ZyWALL covers the world’s largest URL database and keeps updated
  • 16. 16 Anti-Virus Stops Malware-infected Files • Enable anti-malware protection • Files attached in the mails should be thoroughly scanned • Zyxel Anti-Virus protects the users from Viruses, Worms, Trojans, and Malware including protocols like SMTP and POP3 • Along with SSL Inspection, USG/ZyWALL can further deal with encrypted emails
  • 17. 17 IDP Monitor Network Behaviors • Put the threat intelligence on • Abnormal behaviors should be monitored and detected • Zyxel Intrusion Detection & Protection closely watch the network behaviors and detect the attempting connections to the CC&C or backdoor program.
  • 18. 1818 5 Tips for Preventing Ransomware
  • 20. 20 Ransomware Prevention Tips – 1/5 1. Security Gateway Provides Comprehensive Protection • To maximize your protection against malware, including Ransomware. • To stop threat at different points of your next environment.
  • 21. 21 Ransomware Prevention Tips – 2/5 2. Backup regularly and always keep a recent backup copy off-site. • Always do a regular backup of your files and system OS and encrypt your backup. This way you don't have to worry about Ransomaware threat because you could easily restore your files or system OS back very soon.
  • 22. 22 Ransomware Prevention Tips – 3/5 3. Patch, patch, patch… • Malware threat relies on software or application vulnerabilities (or bugs). When you apply security patches, you give the cybercriminals fewer options for infecting you with ransomware.
  • 23. 23 Ransomware Prevention Tips – 4/5 4. Be very careful about opening unsolicited attachments or clicking unfamiliar web link • Opening an attachment in the received email from unknown sources, or clicking on a sexy picture/image or a harmless advertisement could actually redirect you to a malicious web site and might installed a malicious software.
  • 24. 24 Ransomware Prevention Tips – 5/5 5. User Anti-Virus software on every clients • Install and keep anti-virus (AV) and personal firewall software up-to-date on your client devices. Always check downloaded files because AV software could help keeping your client device free of the most common malware.
  • 25. 25 Reminding Again • Always remember to regularly perform system backup on your PCs • In case the system is hit, it can be restored and perform seamlessly
  • 26. 26 Free Decryptors: • https://www.nomoreransom.org/ • https://noransom.kaspersky.com/
  • 28. 28 Next Generation USG  Anti-malware Protection (Anti-Virus)  Web Security (Content Filter)  Email Security (Anti-Spam)  Intrusion Detection & Prevention (IDP)  SSL Inspection  Hybrid VPN (IPSec/SSL/L2TP over IPSec)  Ultra-High Performance  High-Availability  Firewall/NAT  BWM
  • 29. 2929 Next-Gen USG Product Portfolio Model USG40(W) USG60(W) USG110 USG210 USG310 USG1100 USG1900 Firewall Throughput (RFC2544) 400 Mbps 1.0 Gbps 1.6 Gbps 1.9 Gbps 5.0 Gbps 6.0 Gbps 7.0 Gbps UTM Throughput 50 Mbps 90 Mbps 250 Mbps 300 Mbps 400 Mbps 500 Mbps 600 Mbps Recommended # of users 1 ~ 10 10 ~ 25 25 ~ 50 50 ~ 75 75 ~ 200 200 ~ 350 350 ~ 500 Features /Scalability Small Business or Branch Office Medium to Large Businesses
  • 30. 3030 VPN Firewall Product Portfolio Model USG20(W)-VPN ZyWALL 110 ZyWALL 310 ZyWALL 1100 USG2200-VPN Firewall Throughput (RFC2544) 350 Mbps 1.6 Gbps 5.0 Gbps 6.0 Gbps 12.0 Gbps VPN Throughput 90 Mbps 400 Mbps 650 Mbps 800 Mbps 1.8 Mbps Max. Concurrent IPSec VPN Tunnels 10 100 300 1,000 3,000 Features /Scalability Small Business or Branch Office Medium to Large Businesses
  • 32. 3232