SlideShare a Scribd company logo
1 of 47
© 2007 NetSol Technologies, Inc. All rights reserved 1
Session Two
Online Security, Threats &
Countermeasures
© 2007 NetSol Technologies, Inc. All rights reserved 2
Online Security, Threats &
Countermeasures
 E-Mails
 Messengers
 Communities
 Maps / GPS
3
Preventing Password
from Hacking
© 2007 NetSol Technologies, Inc. All rights reserved 4
Preventing Password from Hacking
Your password should be like your
Toothbrush, how?
 Choose a good password
 Use the password everyday
 Don’t share your password with anyone
 Change your password regularly
© 2007 NetSol Technologies, Inc. All rights reserved 5
Preventing Password from Hacking (Cont…)
 Attacks
Brute Force Attacks
Dictionary Attacks
Password Guessing
Scripts
Man-in-the-middle attacks
Social Engineering
Shoulder Surfing / Video Recording
Spy-ware/Key Loggers
Keyboard Interceptor
© 2007 NetSol Technologies, Inc. All rights reserved 6
Preventing Password from Hacking
(Cont…)
Controls which should be managed properly:
 Length
 Legibility
 Life
 Last passwords’ history
 Limited attempts
 Lockout duration
 Log of failed attempts
 Limited Login time
 Logon banner
 Last username
 Last successful logon
© 2007 NetSol Technologies, Inc. All rights reserved 7
Preventing Password from Hacking
(Cont…)
Password/Pin should include:
 Upper-and lowercase letters
 Numbers (e.g. replace s with 5)
 And special characters (e.g. replace a with @)
 More words or first letter of each word of sentence
Password/Pin should NOT be:
 User Name/mother’s name
 Country / City Name etc.
 Date/year of birth
 Digits of Phone No.
 Dictionary Words
 Saved/Written anywhere
Should be different for different accounts
© 2007 NetSol Technologies, Inc. All rights reserved 8
Preventing Password from Hacking
(Cont…)
 Protocols sending password as plain text:
 File Transfer Protocol (FTP)
 Password Authentication Protocol (PAP)
 Sites accepting password as plain text?
 Which don’t offer SSL protocol
 How can we know about SSL protocol?
 Yellow Lock icon on browser
 Hacker Profiling Project (HPP) isecom.org
9
Avoiding Viruses &
Worms
© 2007 NetSol Technologies, Inc. All rights reserved 10
Avoiding Viruses & Worms
 Prevention is better than cure
 Vaccination. Vaccine?
E.g. Antivirus program
© 2007 NetSol Technologies, Inc. All rights reserved 11
Avoiding Viruses & Worms (Cont...)
 Types of Malicious Code:
 Viruses
 Worms
 Trojan Horses
 Hoaxes
 Logic Bombs
 Malicious Applets
 Trap Doors
 Hidden Code
 DOS Attacks
 Zombies / BotNets
© 2007 NetSol Technologies, Inc. All rights reserved 12
Trojan Horse
© 2007 NetSol Technologies, Inc. All rights reserved 13
Avoiding Viruses & Worms (Cont...)
Sources of Viruses & Worms
 Removable Medium
 Local Area Networks
 World Wide Web
 Wireless Network
 E-mail
 File Sharing
© 2007 NetSol Technologies, Inc. All rights reserved 14
Avoiding Viruses & Worms (Cont...)
Preventive Measures
 Keep removable medium Read-only
 Permissions of shared media
 Lock Hard Disk Boot Sector (from BIOS)
 Admin mode vs. normal user mode
 Software Firewall
 Backup Periodically
© 2007 NetSol Technologies, Inc. All rights reserved 15
Avoiding Viruses & Worms (Cont...)
Preventive Measures for Mobile Phones:
 Sure about the consequences of ‘Yes’ btn.
 Destroy unknown MMS messages
 Unknown Bluetooth Connections
© 2007 NetSol Technologies, Inc. All rights reserved 16
Source: http://www.antiphishing.org
© 2007 NetSol Technologies, Inc. All rights reserved 17
Source: http://www.antiphishing.org
© 2007 NetSol Technologies, Inc. All rights reserved 18
Avoiding Viruses & Worms (Cont...)
Preventive Measures for E-mail & WWW
 Spoofed e-mail address
 Unexpected attachments
 .exe, .com, .cmd, .vbs, .js, .scr, .bat, .reg etc.
attachments
 Macros of documents
 “amazon.com/skdjfhskjdfskgf/ws” and
“amazon.com.skdjfhskjdfskgf.ws”
 DNS Poisoning
 Multilingual domain name. MSN.com, ΜSΝ.com
© 2007 NetSol Technologies, Inc. All rights reserved 19
Avoiding Viruses & Worms (Cont...)
Multilingual
© 2007 NetSol Technologies, Inc. All rights reserved 20
© 2007 NetSol Technologies, Inc. All rights reserved 21
Antivirus Types
 Signature based
 Behavior based
 Software based
 Hardware based
22
Protecting Identity
© 2007 NetSol Technologies, Inc. All rights reserved 23
Protecting Identity
© 2007 NetSol Technologies, Inc. All rights reserved 24
Protecting Identity (Cont…)
© 2007 NetSol Technologies, Inc. All rights reserved 25
Protecting Identity (Cont…)
© 2007 NetSol Technologies, Inc. All rights reserved 26
Protecting Identity (Cont…)
© 2007 NetSol Technologies, Inc. All rights reserved 27
Protecting Identity (Cont…)
 Disclosing your Account/Credit Card (CC)
Info. on e-mail / Phone
 Debit card v. Credit card for E-payment
 Photocopies of Cards
 Use CC Only with “yellow lock” website
 Keep your CC/ATM receipts
 Mother’s maiden name
 Selling your computer/mobile
 Having used computer/mobile
© 2007 NetSol Technologies, Inc. All rights reserved 28
Protecting Identity (Cont…)
 CC with photo
 CC Statement Security
 Your Letterbox
 Shred, to avoid dumpster diving
 Warnings/information by the Browser
 Websites of illegal software / cracks etc.
 Cracked / Illegally patched software
 Phishing
© 2007 NetSol Technologies, Inc. All rights reserved 29
Guidelines by SBP (7 pages)
Source: http://www.sbp.org.pk/psd/2006/CardHolders_Guide_URDU.pdf
© 2007 NetSol Technologies, Inc. All rights reserved 30
© 2007 NetSol Technologies, Inc. All rights reserved 31
© 2007 NetSol Technologies, Inc. All rights reserved 32
© 2007 NetSol Technologies, Inc. All rights reserved 33
Source: http://www.antiphishing.org
© 2007 NetSol Technologies, Inc. All rights reserved 34
Source: http://www.antiphishing.org
© 2007 NetSol Technologies, Inc. All rights reserved 35
Most Targeted Industry Sectors
Source: http://www.antiphishing.org
© 2007 NetSol Technologies, Inc. All rights reserved 36
Protecting Identity (Cont…)
 Aprox.10 million Identity thefts/year in
USA
 19 people/minute
 Becoming no.1 crime after drug trafficking
 Left in cabs of London during 6 months:
4973 Laptops
5939 Pocket PCs.
63135 Mobile phonesSource: East California University, www.ecu.edu
© 2007 NetSol Technologies, Inc. All rights reserved 37
Protecting Identity (Cont…)
Technical Countermeasures:
 Encryption
 Digital certificate, Pvt. Pub. Key pair
 Authenticity of Identity
 Digital Signature
 Secure Private Key
 Two factor authentication
 Secure Socket Layer (SSL)
© 2007 NetSol Technologies, Inc. All rights reserved 38
© 2007 NetSol Technologies, Inc. All rights reserved 39
© 2007 NetSol Technologies, Inc. All rights reserved 40
© 2007 NetSol Technologies, Inc. All rights reserved 41
Protecting Identity (Cont…)
Frauds:
 Certificate issued by an un trusted party
 Expired Certificate
 Certificate of someone else’s Site
© 2007 NetSol Technologies, Inc. All rights reserved 42
© 2007 NetSol Technologies, Inc. All rights reserved 43
© 2007 NetSol Technologies, Inc. All rights reserved 44
© 2007 NetSol Technologies, Inc. All rights reserved 45
Protecting Identity (Cont…)
© 2007 NetSol Technologies, Inc. All rights reserved 46
?
© 2007 NetSol Technologies, Inc. All rights reserved 47
Thank
You

More Related Content

What's hot

Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyFiroze Hussain
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security StandardsConferencias FIST
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityTharindunuwan9
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On InternetAna Meskovska
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specificationsSsendiSamuel
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 

What's hot (20)

Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono sutikno   nisd2013 - transforming cybersecuritySarwono sutikno   nisd2013 - transforming cybersecurity
Sarwono sutikno nisd2013 - transforming cybersecurity
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Information security policy
Information security policyInformation security policy
Information security policy
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
IT Policy
IT PolicyIT Policy
IT Policy
 

Viewers also liked

New Threats to Data Security
New Threats to Data SecurityNew Threats to Data Security
New Threats to Data SecurityDriveSavers, Inc.
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and dataAnthonywheeler
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityAVG Technologies AU
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityAVG Technologies AU
 
Explosive presentation-AWESOME Business opportunity await you!
Explosive presentation-AWESOME Business opportunity await you!Explosive presentation-AWESOME Business opportunity await you!
Explosive presentation-AWESOME Business opportunity await you!Ratanak Roth Oeurn
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecuritysommerville-videos
 
Solving the Language Barrier
Solving the Language BarrierSolving the Language Barrier
Solving the Language BarrierLuis Medina
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Bill gates presentation
Bill gates presentationBill gates presentation
Bill gates presentationdonmos
 
Presentatie nedap071010
Presentatie nedap071010Presentatie nedap071010
Presentatie nedap071010MarcelPater
 
The teacher librarian as resource creator: Developing learning websites
The teacher librarian as resource creator: Developing learning websitesThe teacher librarian as resource creator: Developing learning websites
The teacher librarian as resource creator: Developing learning websitesjherring
 
02 классификация документов
02 классификация документов02 классификация документов
02 классификация документовLidia Pivovarova
 
Martin karlssons vykortssamling stadshotellet
Martin karlssons vykortssamling   stadshotelletMartin karlssons vykortssamling   stadshotellet
Martin karlssons vykortssamling stadshotellethembygdsigtuna
 

Viewers also liked (19)

New Threats to Data Security
New Threats to Data SecurityNew Threats to Data Security
New Threats to Data Security
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
Salim ghauri
Salim ghauriSalim ghauri
Salim ghauri
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Explosive presentation-AWESOME Business opportunity await you!
Explosive presentation-AWESOME Business opportunity await you!Explosive presentation-AWESOME Business opportunity await you!
Explosive presentation-AWESOME Business opportunity await you!
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
NetSol Investor Presentation
NetSol Investor Presentation NetSol Investor Presentation
NetSol Investor Presentation
 
Solving the Language Barrier
Solving the Language BarrierSolving the Language Barrier
Solving the Language Barrier
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Bill gates presentation
Bill gates presentationBill gates presentation
Bill gates presentation
 
Presentatie nedap071010
Presentatie nedap071010Presentatie nedap071010
Presentatie nedap071010
 
The teacher librarian as resource creator: Developing learning websites
The teacher librarian as resource creator: Developing learning websitesThe teacher librarian as resource creator: Developing learning websites
The teacher librarian as resource creator: Developing learning websites
 
IET Welcome
IET WelcomeIET Welcome
IET Welcome
 
02 классификация документов
02 классификация документов02 классификация документов
02 классификация документов
 
Scrum on rails
Scrum on railsScrum on rails
Scrum on rails
 
3. open innov organization
3. open innov organization3. open innov organization
3. open innov organization
 
Matkalla metaverseen?
Matkalla metaverseen?Matkalla metaverseen?
Matkalla metaverseen?
 
Martin karlssons vykortssamling stadshotellet
Martin karlssons vykortssamling   stadshotelletMartin karlssons vykortssamling   stadshotellet
Martin karlssons vykortssamling stadshotellet
 

Similar to Online Security

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
01-intro-thompson.ppt
01-intro-thompson.ppt01-intro-thompson.ppt
01-intro-thompson.pptSadiaMuqaddas
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network SecurityAsif Raza
 
01-intro-thompson.ppt
01-intro-thompson.ppt01-intro-thompson.ppt
01-intro-thompson.pptROHITCHHOKER3
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxChapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxmccormicknadine86
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingIvanti
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 

Similar to Online Security (20)

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
Data security
Data securityData security
Data security
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
 
Mobile security
Mobile securityMobile security
Mobile security
 
01-intro-thompson.ppt
01-intro-thompson.ppt01-intro-thompson.ppt
01-intro-thompson.ppt
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
01-intro-thompson.ppt
01-intro-thompson.ppt01-intro-thompson.ppt
01-intro-thompson.ppt
 
01-intro-thompson.ppt
01-intro-thompson.ppt01-intro-thompson.ppt
01-intro-thompson.ppt
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxChapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 

More from Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master

More from Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master (11)

Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
 
E commerce Security for end Users
E commerce Security for end UsersE commerce Security for end Users
E commerce Security for end Users
 
Role of Certification Authority in E-Commerce
Role of Certification Authority in E-CommerceRole of Certification Authority in E-Commerce
Role of Certification Authority in E-Commerce
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Application Security
Application SecurityApplication Security
Application Security
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
Recent PCI Hacks
Recent PCI HacksRecent PCI Hacks
Recent PCI Hacks
 
Integrating Multiple IT Security Standards
Integrating Multiple IT Security StandardsIntegrating Multiple IT Security Standards
Integrating Multiple IT Security Standards
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Response To Criticism On E Crime Law
Response To Criticism On E Crime LawResponse To Criticism On E Crime Law
Response To Criticism On E Crime Law
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Online Security

  • 1. © 2007 NetSol Technologies, Inc. All rights reserved 1 Session Two Online Security, Threats & Countermeasures
  • 2. © 2007 NetSol Technologies, Inc. All rights reserved 2 Online Security, Threats & Countermeasures  E-Mails  Messengers  Communities  Maps / GPS
  • 4. © 2007 NetSol Technologies, Inc. All rights reserved 4 Preventing Password from Hacking Your password should be like your Toothbrush, how?  Choose a good password  Use the password everyday  Don’t share your password with anyone  Change your password regularly
  • 5. © 2007 NetSol Technologies, Inc. All rights reserved 5 Preventing Password from Hacking (Cont…)  Attacks Brute Force Attacks Dictionary Attacks Password Guessing Scripts Man-in-the-middle attacks Social Engineering Shoulder Surfing / Video Recording Spy-ware/Key Loggers Keyboard Interceptor
  • 6. © 2007 NetSol Technologies, Inc. All rights reserved 6 Preventing Password from Hacking (Cont…) Controls which should be managed properly:  Length  Legibility  Life  Last passwords’ history  Limited attempts  Lockout duration  Log of failed attempts  Limited Login time  Logon banner  Last username  Last successful logon
  • 7. © 2007 NetSol Technologies, Inc. All rights reserved 7 Preventing Password from Hacking (Cont…) Password/Pin should include:  Upper-and lowercase letters  Numbers (e.g. replace s with 5)  And special characters (e.g. replace a with @)  More words or first letter of each word of sentence Password/Pin should NOT be:  User Name/mother’s name  Country / City Name etc.  Date/year of birth  Digits of Phone No.  Dictionary Words  Saved/Written anywhere Should be different for different accounts
  • 8. © 2007 NetSol Technologies, Inc. All rights reserved 8 Preventing Password from Hacking (Cont…)  Protocols sending password as plain text:  File Transfer Protocol (FTP)  Password Authentication Protocol (PAP)  Sites accepting password as plain text?  Which don’t offer SSL protocol  How can we know about SSL protocol?  Yellow Lock icon on browser  Hacker Profiling Project (HPP) isecom.org
  • 10. © 2007 NetSol Technologies, Inc. All rights reserved 10 Avoiding Viruses & Worms  Prevention is better than cure  Vaccination. Vaccine? E.g. Antivirus program
  • 11. © 2007 NetSol Technologies, Inc. All rights reserved 11 Avoiding Viruses & Worms (Cont...)  Types of Malicious Code:  Viruses  Worms  Trojan Horses  Hoaxes  Logic Bombs  Malicious Applets  Trap Doors  Hidden Code  DOS Attacks  Zombies / BotNets
  • 12. © 2007 NetSol Technologies, Inc. All rights reserved 12 Trojan Horse
  • 13. © 2007 NetSol Technologies, Inc. All rights reserved 13 Avoiding Viruses & Worms (Cont...) Sources of Viruses & Worms  Removable Medium  Local Area Networks  World Wide Web  Wireless Network  E-mail  File Sharing
  • 14. © 2007 NetSol Technologies, Inc. All rights reserved 14 Avoiding Viruses & Worms (Cont...) Preventive Measures  Keep removable medium Read-only  Permissions of shared media  Lock Hard Disk Boot Sector (from BIOS)  Admin mode vs. normal user mode  Software Firewall  Backup Periodically
  • 15. © 2007 NetSol Technologies, Inc. All rights reserved 15 Avoiding Viruses & Worms (Cont...) Preventive Measures for Mobile Phones:  Sure about the consequences of ‘Yes’ btn.  Destroy unknown MMS messages  Unknown Bluetooth Connections
  • 16. © 2007 NetSol Technologies, Inc. All rights reserved 16 Source: http://www.antiphishing.org
  • 17. © 2007 NetSol Technologies, Inc. All rights reserved 17 Source: http://www.antiphishing.org
  • 18. © 2007 NetSol Technologies, Inc. All rights reserved 18 Avoiding Viruses & Worms (Cont...) Preventive Measures for E-mail & WWW  Spoofed e-mail address  Unexpected attachments  .exe, .com, .cmd, .vbs, .js, .scr, .bat, .reg etc. attachments  Macros of documents  “amazon.com/skdjfhskjdfskgf/ws” and “amazon.com.skdjfhskjdfskgf.ws”  DNS Poisoning  Multilingual domain name. MSN.com, ΜSΝ.com
  • 19. © 2007 NetSol Technologies, Inc. All rights reserved 19 Avoiding Viruses & Worms (Cont...) Multilingual
  • 20. © 2007 NetSol Technologies, Inc. All rights reserved 20
  • 21. © 2007 NetSol Technologies, Inc. All rights reserved 21 Antivirus Types  Signature based  Behavior based  Software based  Hardware based
  • 23. © 2007 NetSol Technologies, Inc. All rights reserved 23 Protecting Identity
  • 24. © 2007 NetSol Technologies, Inc. All rights reserved 24 Protecting Identity (Cont…)
  • 25. © 2007 NetSol Technologies, Inc. All rights reserved 25 Protecting Identity (Cont…)
  • 26. © 2007 NetSol Technologies, Inc. All rights reserved 26 Protecting Identity (Cont…)
  • 27. © 2007 NetSol Technologies, Inc. All rights reserved 27 Protecting Identity (Cont…)  Disclosing your Account/Credit Card (CC) Info. on e-mail / Phone  Debit card v. Credit card for E-payment  Photocopies of Cards  Use CC Only with “yellow lock” website  Keep your CC/ATM receipts  Mother’s maiden name  Selling your computer/mobile  Having used computer/mobile
  • 28. © 2007 NetSol Technologies, Inc. All rights reserved 28 Protecting Identity (Cont…)  CC with photo  CC Statement Security  Your Letterbox  Shred, to avoid dumpster diving  Warnings/information by the Browser  Websites of illegal software / cracks etc.  Cracked / Illegally patched software  Phishing
  • 29. © 2007 NetSol Technologies, Inc. All rights reserved 29 Guidelines by SBP (7 pages) Source: http://www.sbp.org.pk/psd/2006/CardHolders_Guide_URDU.pdf
  • 30. © 2007 NetSol Technologies, Inc. All rights reserved 30
  • 31. © 2007 NetSol Technologies, Inc. All rights reserved 31
  • 32. © 2007 NetSol Technologies, Inc. All rights reserved 32
  • 33. © 2007 NetSol Technologies, Inc. All rights reserved 33 Source: http://www.antiphishing.org
  • 34. © 2007 NetSol Technologies, Inc. All rights reserved 34 Source: http://www.antiphishing.org
  • 35. © 2007 NetSol Technologies, Inc. All rights reserved 35 Most Targeted Industry Sectors Source: http://www.antiphishing.org
  • 36. © 2007 NetSol Technologies, Inc. All rights reserved 36 Protecting Identity (Cont…)  Aprox.10 million Identity thefts/year in USA  19 people/minute  Becoming no.1 crime after drug trafficking  Left in cabs of London during 6 months: 4973 Laptops 5939 Pocket PCs. 63135 Mobile phonesSource: East California University, www.ecu.edu
  • 37. © 2007 NetSol Technologies, Inc. All rights reserved 37 Protecting Identity (Cont…) Technical Countermeasures:  Encryption  Digital certificate, Pvt. Pub. Key pair  Authenticity of Identity  Digital Signature  Secure Private Key  Two factor authentication  Secure Socket Layer (SSL)
  • 38. © 2007 NetSol Technologies, Inc. All rights reserved 38
  • 39. © 2007 NetSol Technologies, Inc. All rights reserved 39
  • 40. © 2007 NetSol Technologies, Inc. All rights reserved 40
  • 41. © 2007 NetSol Technologies, Inc. All rights reserved 41 Protecting Identity (Cont…) Frauds:  Certificate issued by an un trusted party  Expired Certificate  Certificate of someone else’s Site
  • 42. © 2007 NetSol Technologies, Inc. All rights reserved 42
  • 43. © 2007 NetSol Technologies, Inc. All rights reserved 43
  • 44. © 2007 NetSol Technologies, Inc. All rights reserved 44
  • 45. © 2007 NetSol Technologies, Inc. All rights reserved 45 Protecting Identity (Cont…)
  • 46. © 2007 NetSol Technologies, Inc. All rights reserved 46 ?
  • 47. © 2007 NetSol Technologies, Inc. All rights reserved 47 Thank You