SlideShare a Scribd company logo
1 of 54
Download to read offline
Ethical Hacking and
C tCountermeasures
Version 6
Module XLVIModule XLVI
Securing Laptop
ComputersComputers
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.informationweek.com/
Module Objective
Thi d l ill f ili i ith
• Laptop threats
L Th f S i i
This module will familiarize you with:
• Laptop Theft Statistics
• Fingerprint Reader
• Protecting Laptops through Face Recognition
• Bluetooth in Laptopsp p
• Tools
• Securing from Physical Laptop thefts
• Hardware Security for Laptops
Protecting the Sensitive data• Protecting the Sensitive data
• Preventing Laptop Communications from Wireless Threats
• Protecting the Stolen Laptops From Being Used
• Security Tips
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Laptop threats
Securing from Physical
Laptop thefts
Laptop Theft Statistics
Hardware Security for
Laptops
p p
Fingerprint Reader
Protecting the Sensitive
data
Protecting Laptops
through Face Recognition
Preventing Laptop Communications
from Wireless Threats
Bluetooth in Laptop Protecting the Stolen Laptops
From Being Used
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tools Security Tips
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.popularmechanics.com/
Statistics for Stolen and
Recovered LaptopsRecovered Laptops
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://articles.techrepublic.com.com/
Statistics on Security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://articles.techrepublic.com.com/
Percentage of Organizations
Following the Security MeasuresFollowing the Security Measures
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.iacis.org/
Laptop Threats
Physical Security
• Criminals target laptops for quick profits and misuse of the
confidential data
• Laptops containing personal and corporate information canp p g p p
be hacked by the attackers and used for their profits
Information Security
• Corrupting, destroying, or gaining access to a Laptop through
hacking, malicious programs, or social engineering
• Accessing the data through weak passwords and open access
• Application security and vulnerabilities to attack the
vulnerable application
• Attacking the laptops with unencrypted data and unprotected
file systems
C i h d h h bl d i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Copying the data through removable drives, storage
mediums, and unnecessary ports which are not disabled
Laptop Threats (cont’d)
Wireless Security
• Intercepting and monitoring wireless traffic
through various sniffer tools and interception
software
y
• Packet insertion and hijacking attacks into the
sniffed wireless traffic
• Jamming is used where the attacker uses different
wireless devices at different frequencies whichq
creates radio frequency interferences for any
wireless network in vicinity
• Peer to peer attacks is performed by using Ad Hoc
mode
• Man in the middle attack
• Wi-phishing is used by hijackers to setup an
access point with SSID that is used by default on
most access points
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
most access points
Laptop Theft
f l lIf a laptop were lost...
• What information of a strategic nature would be disclosed?
Real examples of this type of information include pending
mergers, new product intellectual property, strategies and
launch plans and previously undisclosed financiallaunch plans, and previously undisclosed financial
operating results
• What information of a tactical nature would be disclosed?
Examples include private compensation information, plans
for organizational changes, proposals to clients, and the
myriad of similar information that can be gained from
reading a person's email, calendar, contacts, or collection of
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g p , , ,
documents and spreadsheets
Laptop Theft (cont’d)
If a laptop were lost...
• What information about the company's network or
computing infrastructure would be revealed that would
facilitate an electronic attack?
Examples of this type of information include usernames and
passwords, dial in numbers, IP addressing schemes, DNS
naming conventions, ISPs used, primary mail servers, and
other networking details related to connecting the laptop toother networking details related to connecting the laptop to
the corporate or Internet environment.
• What personal information about the laptop owner can be
bt i d?
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
obtained?
Fingerprint Reader
Fingerprint Reader enables the user to access theFingerprint Reader enables the user to access the
laptop in a more secured and easy way
It provides higher level of security while accessing
the data or network
BioNet 2 laptop fingerprint reader designed from
Biometric fingerprint reader is specially used for
portable storage devices such as laptops and PDAsportable storage devices such as laptops and PDAs
It offers secured access to the applications like,
valuable logons web links documents image files
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
valuable logons, web links, documents, image files,
and more
Protecting Laptops Through Face
RecognitionRecognition
Face Recognition technology is used to access authentication on the
laptop by recognizing the face as the passwordlaptop by recognizing the face as the password
It takes the snapshot of the user and creates digital shots which serve as
the password
It supports multiple users to allow trusted ones to access the laptop
Features:
• Advanced Face recognition software via
Integrated Camera for authenticating user
• One-key recovery helps to recover operating
system in case of system crash or system
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
system in case of system crash or system
effected by virus
Bluetooth in Laptops
Bluetooth enables two laptop devices to connect with
h h i h f bl d ieach other negating the usage of cables and wires
A Bluetooth enabled laptop tries to pair with another
i d d l b i h k d iintended laptop but not with an unknown device
The Bluetooth laptop devices create an initialization
key PIN code or passkey used for authentication
Attacker can sniff this session to access the dataAttacker can sniff this session to access the data
The information passed between the two laptop
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
devices should be encrypted which is upto 128 bits
Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Laptop Security
Laptops can be secured physically from being stolen orLaptops can be secured physically from being stolen or
lost by using security tools
The tools will let the laptop to be fixed at one place, lock itThe tools will let the laptop to be fixed at one place, lock it
to an immovable device or use secured laptop trolleys
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Laptop Security Tools
Steel Cable Locks Laptop Tie-down Brackets
LapSafe laptop trolley
Portable Laptop Carts Laptop Locker
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Laptop Alarm
Laptop Alarm will emit a loud alarm whenever someone
l ltries to steal your laptop
It emits the loud sound on
• A/C Power Removal
• Mouse Removal
It emits the loud sound on
• Mouse Movement
• Shutdown / Suspend
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Laptop Alarm: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Flexysafe
Flexysafe is the laptops safe security caseFlexysafe is the laptops safe security case
Flexysafe Digital the safe that is designed for people who take theirFlexysafe Digital, the safe that is designed for people who take their
laptop computers home from work
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Master Lock
Master Lock patented lock and cable system
Features
• Locks notebook computer to prevent theft and protect data
• Galvanized steel cable provides strong security and peace of mind
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
eToken
eToken represents the most effectiveeToken represents the most effective
combination for protecting data on your
laptops
It is a strong authentication, with disk
encryption and boot-protection solution
A smart card-based strong authentication
solution ensures PC and laptop security
with two key componentswith two key components
• Physical protection of the encryption keys
• User authentication prior to encryption key
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
access
STOP-Lock
STOP-Lock combines tracking system with a locking
h i h l d himechanism to help deter thieves
It is a highly-visible small metal plate that attaches securely tog y p y
the cover of the laptop
The plate is stamped with unique barcode information thatThe plate is stamped with unique barcode information that
registers the computer with a national database
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
True Crypt
Free open-source disk encryption software
Features
• Creates a virtual encrypted disk within
a file and mounts it as a real disk
• Encrypts an entire partition or storage• Encrypts an entire partition or storage
device such as USB flash drive or hard
drive
• Provides two levels of plausible
d i bili i d fdeniability, in case an adversary forces
you to reveal the password
• No TrueCrypt volume can be identified
• Hidden volume (steganography)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hidden volume (steganography)
True Crypt: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
PAL PC Tracker
PAL PC tracker will track and locate the lost or stolen computerPAL PC tracker will track and locate the lost or stolen computer
It sends stealth signal which include the user’s computer tracingg p g
details
When the user connects to the Internet, it will send a stealth email
t th d hi h t i t l ti f thmessage to the user and server which contains exact location of the
pre-defined email address set by the user
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
PAL PC Tracker: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cryptex
Cryptex provides an unbreakable, 448-bit encryption data storage on
l tlaptops
It keeps the data safe by creating an encrypting vault on the hard
drive
It will disappear from the view when the vault is locked
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cryptex: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Dekart Private Disk Multifactor
Private Disk Multifactor is a disk encryption program that secures
fid ti l d t l tconfidential data on laptops
It provides proactive protection against viruses, Trojans, adware,
spyware and unauthorized network accessspyware, and unauthorized network access
Sensitive data is not only encrypted, but are protected with Dekart's
innovative Disk Firewall mechanisminnovative Disk Firewall mechanism
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Laptop Anti-Theft
L t A ti Th ft i d t th hLaptop Anti-Theft recognizes and traces through
both internal and external networks for LAN/WAN
configurations to pin point actual location of the
lost or stolen laptop
Once installed invisibly on your laptop system,
Laptop Anti-Theft sends a stealth e-mail messagep p g
containing it's exact location to a pre-determined e-
mail address set by the owner
Each signal contains all the required information
on the status and physical location of your laptop
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Inspice Trace
Inspice Trace is a
location tracking
program that emails youprogram that emails you
the precise location of
your stolen or lost laptop
It lets you unrecoverably
destroy sensitive data in
l t i fyour laptop in case of
theft
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ZTRACE GOLD
ZTRACE GOLD is an invisible software security
application that traces the location of missing laptopsapplication that traces the location of missing laptops
for recovery
It is undetectable and unerasable on a laptop's hard
drive
If the laptop is reported missing, a patent pending
process occurs for the ZTRACE Recovery Team to
identify the computer's exact physical locationy p p y
The ZTRACE Recovery Team coordinates with local
law enforcement for a completely outsourced recovery
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
p y y
solution
ZTRACE GOLD: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
SecureTrieve Pro
SecureTrieve Pro is a software tool that encrypts,
d i i i l fil f lprotects and retrieves critical files from a lost or
stolen laptop
It automatically retrieves critical files remotely
from your missing laptop
It offers very powerful encryption capabilities
It goes through firewalls to find the exact location
of your stolen laptop
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
of your stolen laptop
XTool Laptop Tracker
XTool Laptop Tracker supports all the recovery
th d I t t C ll ID WiFi W bC GPSmethods: Internet, Caller ID, WiFi, WebCam, GPS,
Remote Forensic Tools
It cannot be detected by anti-virus programs and can
bypass 90% of all corporate and personal firewalls
XTool Laptop Tracker Agent is small and uses
encryption to transmit the collected data to the XTool
Monitoring CenterMonitoring Center
It utilizes worldwide Internet monitoring and unique
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g q
dial-up monitoring coverage
XTool Laptop Tracker:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XTool Encrypted Disk
XTool Encrypted Disk is a centrally managed proactive remoteXTool Encrypted Disk is a centrally managed proactive remote
laptop security solution
It ensures the intellectual property, important information and
confidential data stored on your remote laptops is secure
Protect remote users from data security threats by encrypting
sensitive information and preventing unauthorized access to
important and confidential filesp
Define alerts to enforce data security policies
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XTool Encrypted Disk:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XTool Asset Auditor
XTool Asset Auditor is a centrally managed auditing
service
It uses a low bandwidth agent to remotely collect
information about hardware components, software
installed and application usageinstalled and application usage
The zero-touch auditing solution makes keeping track of
your mobile computer's hardware and software contentsyour mobile computer's hardware and software contents
effortless and available no matter where they travel
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XTool Asset Auditor: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XTool Remote Delete
The XTool Remote Delete enables users to remotely andy
securely delete sensitive data to prevent unauthorized
access to important and confidential files
It minimizes data security breaches
It provides a feedback that confirms what files were found
and deleted from the target computerand deleted from the target computer
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XTool Remote Delete:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Countermeasures and SecurityCountermeasures and Security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Securing from Physical Laptop
TheftsThefts
Use Remote Laptop Security to prevent access to the
secured datasecured data
Use a docking station
• Docking station permanently affixes the laptop to the desktop
and also locks the laptop securely at one place
Eject the PCMCIA NIC cards when the laptop is not in usej p p
Use a personal firewall to the laptop
Use security gadgets like motion detection and alarms to
alert you when the laptop is moved by a third party
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Use tracking software to trace the laptop using traceable
signals when the laptop is lost or stolen
Hardware Security for Laptops
Security cable locking devices fix the laptopy g p p
to an immovable object
Cable alarms alert the user at the time of
malicious activities
Key lock locks down the laptop to the
surface where it is most used
A remote control storage case is used for
the laptops to protect from thefts
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
the laptops to protect from thefts
Protecting the Sensitive Data
Use the NTFS file system which provides file level security and
protects from laptop thieves
Disable the Guest Account
Rename the Administrator Account
Consider creating a dummy Administrator account
P t th l t l d i f b i di l dPrevent the last logged-in user name from being displayed
Enable EFS (Encrypting File System)
Disable the Infrared Port on the laptop
Backup the data before leaving
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Consider using offline storage for transporting sensitive
documents
Preventing Laptop Communications
from Wireless Threats
Enabling Wired Equivalent Privacy (WEP) / Wi-Fi Protected
A (WPA) h i l kAccess (WPA) on the wireless network
MAC address control allows the wireless connections from
d h dd i d i h filMAC card whose MAC address is stored in the filter
End to end encryption where the conversation is in the
encrypted mode
VPN (Virtual Private Network) protects the information
transmitted over wireless links
Access points evaluation checks for any rogue access points in
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
wireless networks
Protecting the Stolen Laptops
from Being Usedfrom Being Used
Set the BIOS password which prevents the machine from
ti i ith th ti h th d i i t fcontinuing with the operations when the password is incorrect for
three consecutive attempts
Set Login password to successfully login to the computerSet Login password to successfully login to the computer
Encrypting the file systemEncrypting the file system
Use Biometric authentication mechanism (such as, fingerprint
d f d l dreader, face reader, retinal pattern reader etc.)
Use of tracing and tracking software's
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Use of tracing and tracking software s
Security Tips
Install anti-virus software and firewalls
Use cable locks on laptops as visual deterrents
Use asset tracking and recovery software
I t i d d d t t tiInvest in advanced data protection
Back-up valuable data on a scheduled basis
Keep laptops unnoticeableKeep laptops unnoticeable
Avoid leaving unsecured notebooks unattended
Encrypt your dataEncrypt your data
Never leave access numbers or passwords in your carrying case
Use alarm bells
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Lock unwanted ports
Summary
Criminals target laptops for quick profits and misuse of theCriminals target laptops for quick profits and misuse of the
confidential data
Interception and monitoring wireless traffic through various snifferp g g
tools and interception software
MAC address control allows the wireless connections from MAC card
whose MAC address is stored in the filter
WPA is used as an extensive level of security for wireless LAN’sWPA is used as an extensive level of security for wireless LAN s
Face Recognition technology is used to access the laptop by
i i h f h d
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
recognizing the face as the password
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

More Related Content

What's hot (20)

Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
Ce hv6 module 62 case studies
Ce hv6 module 62 case studiesCe hv6 module 62 case studies
Ce hv6 module 62 case studies
 
File000136
File000136File000136
File000136
 
File000139
File000139File000139
File000139
 
File000142
File000142File000142
File000142
 
File000149
File000149File000149
File000149
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 
File000152
File000152File000152
File000152
 
File000138
File000138File000138
File000138
 
File000150
File000150File000150
File000150
 
File000143
File000143File000143
File000143
 
File000151
File000151File000151
File000151
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
File000144
File000144File000144
File000144
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
File000175
File000175File000175
File000175
 

Viewers also liked

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorismVi Tính Hoàng Nam
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageVi Tính Hoàng Nam
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesVi Tính Hoàng Nam
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsVi Tính Hoàng Nam
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesVi Tính Hoàng Nam
 
Ce hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversCe hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversVi Tính Hoàng Nam
 
Ce hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersCe hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersVi Tính Hoàng Nam
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsVi Tính Hoàng Nam
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresVi Tính Hoàng Nam
 
Ce hv6 module 65 patch management
Ce hv6 module 65 patch managementCe hv6 module 65 patch management
Ce hv6 module 65 patch managementVi Tính Hoàng Nam
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesVi Tính Hoàng Nam
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceVi Tính Hoàng Nam
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 

Viewers also liked (18)

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Ceh v5 module 21 cryptography
Ceh v5 module 21 cryptographyCeh v5 module 21 cryptography
Ceh v5 module 21 cryptography
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionage
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online games
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniques
 
Ce hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversCe hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database servers
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Ce hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersCe hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsers
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasures
 
Ce hv6 module 65 patch management
Ce hv6 module 65 patch managementCe hv6 module 65 patch management
Ce hv6 module 65 patch management
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 

Similar to Securing Laptops Guide

Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignPriyanka Aash
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile securitySatya Harish
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016joebursell
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 

Similar to Securing Laptops Guide (20)

Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 

More from Vi Tính Hoàng Nam

CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

More from Vi Tính Hoàng Nam (20)

CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 
I phone v1.2_e
I phone v1.2_eI phone v1.2_e
I phone v1.2_e
 
Android v1.3 e
Android v1.3 eAndroid v1.3 e
Android v1.3 e
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Securing Laptops Guide

  • 1. Ethical Hacking and C tCountermeasures Version 6 Module XLVIModule XLVI Securing Laptop ComputersComputers
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.informationweek.com/
  • 3. Module Objective Thi d l ill f ili i ith • Laptop threats L Th f S i i This module will familiarize you with: • Laptop Theft Statistics • Fingerprint Reader • Protecting Laptops through Face Recognition • Bluetooth in Laptopsp p • Tools • Securing from Physical Laptop thefts • Hardware Security for Laptops Protecting the Sensitive data• Protecting the Sensitive data • Preventing Laptop Communications from Wireless Threats • Protecting the Stolen Laptops From Being Used • Security Tips EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow Laptop threats Securing from Physical Laptop thefts Laptop Theft Statistics Hardware Security for Laptops p p Fingerprint Reader Protecting the Sensitive data Protecting Laptops through Face Recognition Preventing Laptop Communications from Wireless Threats Bluetooth in Laptop Protecting the Stolen Laptops From Being Used EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tools Security Tips
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.popularmechanics.com/
  • 6. Statistics for Stolen and Recovered LaptopsRecovered Laptops EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://articles.techrepublic.com.com/
  • 7. Statistics on Security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://articles.techrepublic.com.com/
  • 8. Percentage of Organizations Following the Security MeasuresFollowing the Security Measures EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.iacis.org/
  • 9. Laptop Threats Physical Security • Criminals target laptops for quick profits and misuse of the confidential data • Laptops containing personal and corporate information canp p g p p be hacked by the attackers and used for their profits Information Security • Corrupting, destroying, or gaining access to a Laptop through hacking, malicious programs, or social engineering • Accessing the data through weak passwords and open access • Application security and vulnerabilities to attack the vulnerable application • Attacking the laptops with unencrypted data and unprotected file systems C i h d h h bl d i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Copying the data through removable drives, storage mediums, and unnecessary ports which are not disabled
  • 10. Laptop Threats (cont’d) Wireless Security • Intercepting and monitoring wireless traffic through various sniffer tools and interception software y • Packet insertion and hijacking attacks into the sniffed wireless traffic • Jamming is used where the attacker uses different wireless devices at different frequencies whichq creates radio frequency interferences for any wireless network in vicinity • Peer to peer attacks is performed by using Ad Hoc mode • Man in the middle attack • Wi-phishing is used by hijackers to setup an access point with SSID that is used by default on most access points EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited most access points
  • 11. Laptop Theft f l lIf a laptop were lost... • What information of a strategic nature would be disclosed? Real examples of this type of information include pending mergers, new product intellectual property, strategies and launch plans and previously undisclosed financiallaunch plans, and previously undisclosed financial operating results • What information of a tactical nature would be disclosed? Examples include private compensation information, plans for organizational changes, proposals to clients, and the myriad of similar information that can be gained from reading a person's email, calendar, contacts, or collection of EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g p , , , documents and spreadsheets
  • 12. Laptop Theft (cont’d) If a laptop were lost... • What information about the company's network or computing infrastructure would be revealed that would facilitate an electronic attack? Examples of this type of information include usernames and passwords, dial in numbers, IP addressing schemes, DNS naming conventions, ISPs used, primary mail servers, and other networking details related to connecting the laptop toother networking details related to connecting the laptop to the corporate or Internet environment. • What personal information about the laptop owner can be bt i d? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited obtained?
  • 13. Fingerprint Reader Fingerprint Reader enables the user to access theFingerprint Reader enables the user to access the laptop in a more secured and easy way It provides higher level of security while accessing the data or network BioNet 2 laptop fingerprint reader designed from Biometric fingerprint reader is specially used for portable storage devices such as laptops and PDAsportable storage devices such as laptops and PDAs It offers secured access to the applications like, valuable logons web links documents image files EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited valuable logons, web links, documents, image files, and more
  • 14. Protecting Laptops Through Face RecognitionRecognition Face Recognition technology is used to access authentication on the laptop by recognizing the face as the passwordlaptop by recognizing the face as the password It takes the snapshot of the user and creates digital shots which serve as the password It supports multiple users to allow trusted ones to access the laptop Features: • Advanced Face recognition software via Integrated Camera for authenticating user • One-key recovery helps to recover operating system in case of system crash or system EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited system in case of system crash or system effected by virus
  • 15. Bluetooth in Laptops Bluetooth enables two laptop devices to connect with h h i h f bl d ieach other negating the usage of cables and wires A Bluetooth enabled laptop tries to pair with another i d d l b i h k d iintended laptop but not with an unknown device The Bluetooth laptop devices create an initialization key PIN code or passkey used for authentication Attacker can sniff this session to access the dataAttacker can sniff this session to access the data The information passed between the two laptop EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited devices should be encrypted which is upto 128 bits
  • 16. Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Laptop Security Laptops can be secured physically from being stolen orLaptops can be secured physically from being stolen or lost by using security tools The tools will let the laptop to be fixed at one place, lock itThe tools will let the laptop to be fixed at one place, lock it to an immovable device or use secured laptop trolleys EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Laptop Security Tools Steel Cable Locks Laptop Tie-down Brackets LapSafe laptop trolley Portable Laptop Carts Laptop Locker EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. Laptop Alarm Laptop Alarm will emit a loud alarm whenever someone l ltries to steal your laptop It emits the loud sound on • A/C Power Removal • Mouse Removal It emits the loud sound on • Mouse Movement • Shutdown / Suspend EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. Laptop Alarm: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. Flexysafe Flexysafe is the laptops safe security caseFlexysafe is the laptops safe security case Flexysafe Digital the safe that is designed for people who take theirFlexysafe Digital, the safe that is designed for people who take their laptop computers home from work EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Master Lock Master Lock patented lock and cable system Features • Locks notebook computer to prevent theft and protect data • Galvanized steel cable provides strong security and peace of mind EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. eToken eToken represents the most effectiveeToken represents the most effective combination for protecting data on your laptops It is a strong authentication, with disk encryption and boot-protection solution A smart card-based strong authentication solution ensures PC and laptop security with two key componentswith two key components • Physical protection of the encryption keys • User authentication prior to encryption key EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited access
  • 24. STOP-Lock STOP-Lock combines tracking system with a locking h i h l d himechanism to help deter thieves It is a highly-visible small metal plate that attaches securely tog y p y the cover of the laptop The plate is stamped with unique barcode information thatThe plate is stamped with unique barcode information that registers the computer with a national database EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. True Crypt Free open-source disk encryption software Features • Creates a virtual encrypted disk within a file and mounts it as a real disk • Encrypts an entire partition or storage• Encrypts an entire partition or storage device such as USB flash drive or hard drive • Provides two levels of plausible d i bili i d fdeniability, in case an adversary forces you to reveal the password • No TrueCrypt volume can be identified • Hidden volume (steganography) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hidden volume (steganography)
  • 26. True Crypt: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. PAL PC Tracker PAL PC tracker will track and locate the lost or stolen computerPAL PC tracker will track and locate the lost or stolen computer It sends stealth signal which include the user’s computer tracingg p g details When the user connects to the Internet, it will send a stealth email t th d hi h t i t l ti f thmessage to the user and server which contains exact location of the pre-defined email address set by the user EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. PAL PC Tracker: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. Cryptex Cryptex provides an unbreakable, 448-bit encryption data storage on l tlaptops It keeps the data safe by creating an encrypting vault on the hard drive It will disappear from the view when the vault is locked EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. Cryptex: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Dekart Private Disk Multifactor Private Disk Multifactor is a disk encryption program that secures fid ti l d t l tconfidential data on laptops It provides proactive protection against viruses, Trojans, adware, spyware and unauthorized network accessspyware, and unauthorized network access Sensitive data is not only encrypted, but are protected with Dekart's innovative Disk Firewall mechanisminnovative Disk Firewall mechanism EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 32. Laptop Anti-Theft L t A ti Th ft i d t th hLaptop Anti-Theft recognizes and traces through both internal and external networks for LAN/WAN configurations to pin point actual location of the lost or stolen laptop Once installed invisibly on your laptop system, Laptop Anti-Theft sends a stealth e-mail messagep p g containing it's exact location to a pre-determined e- mail address set by the owner Each signal contains all the required information on the status and physical location of your laptop EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Inspice Trace Inspice Trace is a location tracking program that emails youprogram that emails you the precise location of your stolen or lost laptop It lets you unrecoverably destroy sensitive data in l t i fyour laptop in case of theft EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. ZTRACE GOLD ZTRACE GOLD is an invisible software security application that traces the location of missing laptopsapplication that traces the location of missing laptops for recovery It is undetectable and unerasable on a laptop's hard drive If the laptop is reported missing, a patent pending process occurs for the ZTRACE Recovery Team to identify the computer's exact physical locationy p p y The ZTRACE Recovery Team coordinates with local law enforcement for a completely outsourced recovery EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p y y solution
  • 35. ZTRACE GOLD: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. SecureTrieve Pro SecureTrieve Pro is a software tool that encrypts, d i i i l fil f lprotects and retrieves critical files from a lost or stolen laptop It automatically retrieves critical files remotely from your missing laptop It offers very powerful encryption capabilities It goes through firewalls to find the exact location of your stolen laptop EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited of your stolen laptop
  • 37. XTool Laptop Tracker XTool Laptop Tracker supports all the recovery th d I t t C ll ID WiFi W bC GPSmethods: Internet, Caller ID, WiFi, WebCam, GPS, Remote Forensic Tools It cannot be detected by anti-virus programs and can bypass 90% of all corporate and personal firewalls XTool Laptop Tracker Agent is small and uses encryption to transmit the collected data to the XTool Monitoring CenterMonitoring Center It utilizes worldwide Internet monitoring and unique EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g q dial-up monitoring coverage
  • 38. XTool Laptop Tracker: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. XTool Encrypted Disk XTool Encrypted Disk is a centrally managed proactive remoteXTool Encrypted Disk is a centrally managed proactive remote laptop security solution It ensures the intellectual property, important information and confidential data stored on your remote laptops is secure Protect remote users from data security threats by encrypting sensitive information and preventing unauthorized access to important and confidential filesp Define alerts to enforce data security policies EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 40. XTool Encrypted Disk: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. XTool Asset Auditor XTool Asset Auditor is a centrally managed auditing service It uses a low bandwidth agent to remotely collect information about hardware components, software installed and application usageinstalled and application usage The zero-touch auditing solution makes keeping track of your mobile computer's hardware and software contentsyour mobile computer's hardware and software contents effortless and available no matter where they travel EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. XTool Asset Auditor: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. XTool Remote Delete The XTool Remote Delete enables users to remotely andy securely delete sensitive data to prevent unauthorized access to important and confidential files It minimizes data security breaches It provides a feedback that confirms what files were found and deleted from the target computerand deleted from the target computer EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. XTool Remote Delete: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. Countermeasures and SecurityCountermeasures and Security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. Securing from Physical Laptop TheftsThefts Use Remote Laptop Security to prevent access to the secured datasecured data Use a docking station • Docking station permanently affixes the laptop to the desktop and also locks the laptop securely at one place Eject the PCMCIA NIC cards when the laptop is not in usej p p Use a personal firewall to the laptop Use security gadgets like motion detection and alarms to alert you when the laptop is moved by a third party EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Use tracking software to trace the laptop using traceable signals when the laptop is lost or stolen
  • 47. Hardware Security for Laptops Security cable locking devices fix the laptopy g p p to an immovable object Cable alarms alert the user at the time of malicious activities Key lock locks down the laptop to the surface where it is most used A remote control storage case is used for the laptops to protect from thefts EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited the laptops to protect from thefts
  • 48. Protecting the Sensitive Data Use the NTFS file system which provides file level security and protects from laptop thieves Disable the Guest Account Rename the Administrator Account Consider creating a dummy Administrator account P t th l t l d i f b i di l dPrevent the last logged-in user name from being displayed Enable EFS (Encrypting File System) Disable the Infrared Port on the laptop Backup the data before leaving EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Consider using offline storage for transporting sensitive documents
  • 49. Preventing Laptop Communications from Wireless Threats Enabling Wired Equivalent Privacy (WEP) / Wi-Fi Protected A (WPA) h i l kAccess (WPA) on the wireless network MAC address control allows the wireless connections from d h dd i d i h filMAC card whose MAC address is stored in the filter End to end encryption where the conversation is in the encrypted mode VPN (Virtual Private Network) protects the information transmitted over wireless links Access points evaluation checks for any rogue access points in EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited wireless networks
  • 50. Protecting the Stolen Laptops from Being Usedfrom Being Used Set the BIOS password which prevents the machine from ti i ith th ti h th d i i t fcontinuing with the operations when the password is incorrect for three consecutive attempts Set Login password to successfully login to the computerSet Login password to successfully login to the computer Encrypting the file systemEncrypting the file system Use Biometric authentication mechanism (such as, fingerprint d f d l dreader, face reader, retinal pattern reader etc.) Use of tracing and tracking software's EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Use of tracing and tracking software s
  • 51. Security Tips Install anti-virus software and firewalls Use cable locks on laptops as visual deterrents Use asset tracking and recovery software I t i d d d t t tiInvest in advanced data protection Back-up valuable data on a scheduled basis Keep laptops unnoticeableKeep laptops unnoticeable Avoid leaving unsecured notebooks unattended Encrypt your dataEncrypt your data Never leave access numbers or passwords in your carrying case Use alarm bells EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Lock unwanted ports
  • 52. Summary Criminals target laptops for quick profits and misuse of theCriminals target laptops for quick profits and misuse of the confidential data Interception and monitoring wireless traffic through various snifferp g g tools and interception software MAC address control allows the wireless connections from MAC card whose MAC address is stored in the filter WPA is used as an extensive level of security for wireless LAN’sWPA is used as an extensive level of security for wireless LAN s Face Recognition technology is used to access the laptop by i i h f h d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited recognizing the face as the password
  • 53. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 54. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited