1. The document discusses information security from an engineering and company perspective. It describes information as all the data a company owns, manages, and exchanges both internally and externally.
2. It explains that Claude Shannon's studies in the 1940s helped quantify information and define concepts like entropy and perfect secrecy. These concepts are important for analyzing classic cryptosystems but are not the focus of the document.
3. The document states that a company's information is its most valuable asset, as loss of data would make it difficult for the company to recover and remain competitive. Proper information security policies are vital for protection.
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information Systems Security makes social engineering attacks to Turkish public agencies within the frame of “Information Security Tests” [19]. This paper will make an analysis of the social engineering tests that have been carried out in several Turkish public agencies. The tests include phone calling to sample employees by the social engineer and trying to seize employees’ sensitive information by exploiting their good faith. The aim of this research is to figure that the employees in Turkish public agencies have a lack of information security awareness and they compromise the information security principles which should be necessarily applied for any public agencies. Social engineering, both with its low cost and ability to take advantage of low technology, has taken its place in the information security literature as a very effective form of attack [8].
This document summarizes a study conducted by the United States Secret Service and the CERT Coordination Center on incidents of insider sabotage in critical infrastructure sectors. The study analyzed insider threat incidents across different sectors and identified key findings related to the insider's motive, pre-attack behavior, advancing the attack, detecting the attack, and consequences for targeted organizations. The document provides implications for preventing insider sabotage based on these findings. It aims to help organizations address this threat by understanding insider behaviors and implementing appropriate security measures.
Presentation for the International Association of Emergency Managers Region 4 Conference. Note that the live links will only work if you download the presentation and have the WebLive app installed with your version of PowerPoint.
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
Small business e-commerce websites make an excellent target for malicious attacks. Small businesses do not have the resources needed to effectively deal with attacks. Large and some mid-size organization have teams that are dedicated to dealing with security incidents and preventing future attacks. Most small businesses do not have the capabilities of dealing with incidents the way large organizations do. Security of e-commerce websites is essential for compliance with laws and regulations as well as gaining and maintaining the trust of consumers, partners and stakeholders. Many security standards have been established by various organizations to help guide security of small business servers, however, many of those standards or guidelines are too costly or time consuming. This paper1 will discuss how attacks are carried out and how a small business can effectively secure their networks with minimum cost.
Social Engineering Audit & Security AwarenessCBIZ, Inc.
The document provides information about a social engineering audit and security awareness presentation. It includes details about the presenters from CBIZ MHM, an accounting firm, learning objectives around social engineering and security awareness, and descriptions of different types of social engineering like phishing and pretexting. It also discusses what makes security awareness programs successful or fail, and how social engineering could be used internally by an audit department to test security controls.
The complete guide on how to prevent an IT security breach.
Some of the tips include:
♦ Why keeping a clean desk matters
♦ How to avoid email threats, including five ways to block phishing attack
♦ How your employees can secure their mobile devices
♦ Website browsing best practices.
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
My GRRCON 2013 talk on imparting security awareness. This is based on a highly successful and well received awareness program I created and rolled out for both blue collar and white collar users.
Managing insider threats is a priority for organizations. Key aspects include establishing a strong security culture from the top-down through policies and regular reviews, identifying and monitoring high-risk employee behaviors, and implementing technical controls like access monitoring and honeypot approaches. Data-centric policies and identifying where sensitive data is located and who can access it are also important strategies for mitigating insider risks.
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information Systems Security makes social engineering attacks to Turkish public agencies within the frame of “Information Security Tests” [19]. This paper will make an analysis of the social engineering tests that have been carried out in several Turkish public agencies. The tests include phone calling to sample employees by the social engineer and trying to seize employees’ sensitive information by exploiting their good faith. The aim of this research is to figure that the employees in Turkish public agencies have a lack of information security awareness and they compromise the information security principles which should be necessarily applied for any public agencies. Social engineering, both with its low cost and ability to take advantage of low technology, has taken its place in the information security literature as a very effective form of attack [8].
This document summarizes a study conducted by the United States Secret Service and the CERT Coordination Center on incidents of insider sabotage in critical infrastructure sectors. The study analyzed insider threat incidents across different sectors and identified key findings related to the insider's motive, pre-attack behavior, advancing the attack, detecting the attack, and consequences for targeted organizations. The document provides implications for preventing insider sabotage based on these findings. It aims to help organizations address this threat by understanding insider behaviors and implementing appropriate security measures.
Presentation for the International Association of Emergency Managers Region 4 Conference. Note that the live links will only work if you download the presentation and have the WebLive app installed with your version of PowerPoint.
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
Small business e-commerce websites make an excellent target for malicious attacks. Small businesses do not have the resources needed to effectively deal with attacks. Large and some mid-size organization have teams that are dedicated to dealing with security incidents and preventing future attacks. Most small businesses do not have the capabilities of dealing with incidents the way large organizations do. Security of e-commerce websites is essential for compliance with laws and regulations as well as gaining and maintaining the trust of consumers, partners and stakeholders. Many security standards have been established by various organizations to help guide security of small business servers, however, many of those standards or guidelines are too costly or time consuming. This paper1 will discuss how attacks are carried out and how a small business can effectively secure their networks with minimum cost.
Social Engineering Audit & Security AwarenessCBIZ, Inc.
The document provides information about a social engineering audit and security awareness presentation. It includes details about the presenters from CBIZ MHM, an accounting firm, learning objectives around social engineering and security awareness, and descriptions of different types of social engineering like phishing and pretexting. It also discusses what makes security awareness programs successful or fail, and how social engineering could be used internally by an audit department to test security controls.
The complete guide on how to prevent an IT security breach.
Some of the tips include:
♦ Why keeping a clean desk matters
♦ How to avoid email threats, including five ways to block phishing attack
♦ How your employees can secure their mobile devices
♦ Website browsing best practices.
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
My GRRCON 2013 talk on imparting security awareness. This is based on a highly successful and well received awareness program I created and rolled out for both blue collar and white collar users.
Managing insider threats is a priority for organizations. Key aspects include establishing a strong security culture from the top-down through policies and regular reviews, identifying and monitoring high-risk employee behaviors, and implementing technical controls like access monitoring and honeypot approaches. Data-centric policies and identifying where sensitive data is located and who can access it are also important strategies for mitigating insider risks.
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
This book is your guide to helping you detect and prevent social engineering attacks, and to better understand how to defend your company from what has grown to become the dominant global cyber threat.
This document provides an overview of baseline information security awareness training. It discusses what secure computing means, including the core principles of security like confidentiality, integrity, availability, and authenticity. It emphasizes that security is everyone's responsibility and covers how to assess and manage risks through policies, procedures, and controls implemented by management, the information security team, and employees. Finally, it lists some common security threats like spam, phishing, viruses, and spyware and provides best practices employees can follow for desktop, home, mobile, and travel security.
Cyber Threat to Public Safety CommunicationsKory Edwards
This document discusses cyber threats to public safety communications systems. It begins by describing how communications broke down for first responders during the 9/11 attacks due to overloaded cell networks and damaged radio systems. Since then, improvements have focused on redundancy and interoperability through increased connectivity, but this also introduces more vulnerabilities. The document outlines several cyberattacks against 911 call centers and public safety networks in recent years. It identifies the most attractive targets as the public's access to 911 and single points of failure in interconnected systems. The main security challenges are complacency about risks and limited budgets to address vulnerabilities.
The need for effective information security awareness practices.CAS
Introduction
Internet usage in Oman
IT Security incidents in Oman
Proposed work
Key findings
Effective usage
Organization network awareness
Threat awareness
Password management
Content awareness
Security practices awareness
ITSACAS Approach
Conclusion
This slide gives a brief description of social engineering, its classcification, attack environment and various impersonation scenario which will give the audinece a sound knowledge on social engineering technique.
This chapter discusses computer security risks like viruses, worms and Trojan horses. It describes safeguards like antivirus software, firewalls and passwords. The chapter also covers ethics issues around information privacy, software piracy and computer use. Potential health issues from overuse like repetitive strain injuries are explained, along with ergonomic precautions and green computing practices.
The document discusses social engineering techniques used by cybercriminals. It describes a report from FireEye that analyzed the most common words used in spear phishing emails to compromise networks. Express shipping terms were included in about 25% of attacks to create urgency. Cybercriminals also use finance, tax, and travel terms. Spear phishing is effective as criminals personalize emails using social media information. This allows them to access corporate networks and steal intellectual property and customer data. The report provides insights into email attacks that evade traditional security solutions.
An introductory session about Social Engineering presented at ICT Nuggets Forum - Khartoum, organized by Duko team. We talked about what is social engineering? terms related to it? and how attacks can bee carried. We also told a lot of stories about successful social engineering attacks and how much damage they did. Finally we talked about how to protect yourself and your company social engineering attacks.
Social Engineering-The Underpinning of Unauthorized AccessKory Edwards
This document discusses social engineering and how it enables unauthorized access. Social engineering relies on exploiting human tendencies rather than technical vulnerabilities. The document explores how Edward Snowden used social engineering to gain access to NSA systems by persuading coworkers to provide their credentials. It examines why information security programs fail to prevent social engineering, despite training, due to human factors like lack of motivation. Common social engineering attack types are discussed, including insider threats, external threats, and the tactics used like appealing to human tendencies like authority, scarcity, and liking. The document argues a new approach is needed that incorporates social intelligence concepts to make employees less susceptible to social engineering.
Five things I learned about information securityMajor Hayden
I delivered this presentation at the University of the Incarnate Word in San Antonio, Texas, to a group of students studying information security. They're learning plenty about the technical aspects of information security, but I wanted to talk to them about the non-technical aspects as well. This presentation is meant to be a low-tech, more social introduction on how to handle security within a large organization.
Dr. Shawn P. Murray was invited to the National Security Institute in April 2012 to present current topics related to social engineering and the threats they pose to organizations and their sensitive information. This presentation analyzes the principles of social engineering tactics as they relate to technology and security practices. Dr. Murray is a well known Cyber Security professional and has presented at various conferences regarding Cyber Security and Information Assurance topics.
This document summarizes a presentation on cyber security for financial planners. It discusses the different types of hackers, including script kiddies, hacking groups, hacktivists, black hat professionals, organized criminal gangs, nation states, and automated tools. It also identifies common vulnerabilities exploited by hackers like weak passwords, unpatched software, and human error. The presentation outlines steps for assessing cyber security risks such as creating an data inventory, developing privacy policies, and implementing technical controls and security policies to protect networks and sensitive client information.
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
This document summarizes the key points from a university lecture on information security. It discusses topics covered during the semester including a guest speaker from the FBI, security controls, CIA triad, categories of controls, ingredients of security, technical weaknesses, defense in depth, risk analysis, hiring and termination practices, security policies, cloud security, BYOD, and more. The document recaps the various assignments and presentations given throughout the course.
This document discusses securing information systems and provides an overview of security concepts and tools. It covers system vulnerabilities, threats like malware and hackers, establishing security frameworks, and technologies to safeguard systems like firewalls, encryption, and digital certificates. The key topics are securing systems from internal and external threats, implementing controls and policies, and using technical tools to protect information assets and ensure system availability.
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
This presentation is a summary, for the students of the IS 365/765 course I teach, at the University of Wisconsin-Madison, providing a 104 slide reminder of the most important topics in Information Security, which we covered throughout the semester. Today is the last day of course material. We have 4 days of student team presentations, to follow.
The document discusses security awareness and the growing threat of cyber attacks and data breaches. It notes that malware has become more sophisticated, targeting data and businesses rather than just PCs. The impacts of data breaches can include high costs for businesses. It recommends practicing defense in depth across networks, endpoints, and security tools to balance risk and costs. Cyber/privacy breach insurance can help cover liabilities and costs imposed by laws and regulations in the event of a security incident.
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
This document provides an overview of intrusion detection and prevention systems (IDPS). It discusses the types of threats, vulnerabilities, and intrusions that IDPS aim to address. It describes the differences between network-based and host-based IDPS, as well as signature-based and anomaly-based detection methods. The document also outlines some key capabilities of IDPS, such as identifying hosts, operating systems, applications, and network characteristics. It notes limitations of IDPS, including inability to analyze encrypted traffic. Finally, it emphasizes the importance of properly deploying and managing IDPS according to organizational needs and policies as part of a layered defense-in-depth security strategy.
The article examines how the creators of the Stuxnet malware signed its driver files with stolen digital certificates from Realtek and JMicron. It finds that the attackers likely obtained the private keys needed to sign the files from the legitimate certificate owners by exploiting their systems. This allowed Stuxnet to appear as a legitimate software update and helped it infect many targets undetected over a long period of time.
We Are Instructor Led Online Training Hub.Get access to the world’s best learning experience at our online learning community where millions of learners learn cutting-edge skills to advance their careers, improve their lives, and pursue the work they love. We provide a diverse range of courses, tutorials, resume formats, projects based on real business challenges, and job support to help individuals get started with their professional career.
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
This book is your guide to helping you detect and prevent social engineering attacks, and to better understand how to defend your company from what has grown to become the dominant global cyber threat.
This document provides an overview of baseline information security awareness training. It discusses what secure computing means, including the core principles of security like confidentiality, integrity, availability, and authenticity. It emphasizes that security is everyone's responsibility and covers how to assess and manage risks through policies, procedures, and controls implemented by management, the information security team, and employees. Finally, it lists some common security threats like spam, phishing, viruses, and spyware and provides best practices employees can follow for desktop, home, mobile, and travel security.
Cyber Threat to Public Safety CommunicationsKory Edwards
This document discusses cyber threats to public safety communications systems. It begins by describing how communications broke down for first responders during the 9/11 attacks due to overloaded cell networks and damaged radio systems. Since then, improvements have focused on redundancy and interoperability through increased connectivity, but this also introduces more vulnerabilities. The document outlines several cyberattacks against 911 call centers and public safety networks in recent years. It identifies the most attractive targets as the public's access to 911 and single points of failure in interconnected systems. The main security challenges are complacency about risks and limited budgets to address vulnerabilities.
The need for effective information security awareness practices.CAS
Introduction
Internet usage in Oman
IT Security incidents in Oman
Proposed work
Key findings
Effective usage
Organization network awareness
Threat awareness
Password management
Content awareness
Security practices awareness
ITSACAS Approach
Conclusion
This slide gives a brief description of social engineering, its classcification, attack environment and various impersonation scenario which will give the audinece a sound knowledge on social engineering technique.
This chapter discusses computer security risks like viruses, worms and Trojan horses. It describes safeguards like antivirus software, firewalls and passwords. The chapter also covers ethics issues around information privacy, software piracy and computer use. Potential health issues from overuse like repetitive strain injuries are explained, along with ergonomic precautions and green computing practices.
The document discusses social engineering techniques used by cybercriminals. It describes a report from FireEye that analyzed the most common words used in spear phishing emails to compromise networks. Express shipping terms were included in about 25% of attacks to create urgency. Cybercriminals also use finance, tax, and travel terms. Spear phishing is effective as criminals personalize emails using social media information. This allows them to access corporate networks and steal intellectual property and customer data. The report provides insights into email attacks that evade traditional security solutions.
An introductory session about Social Engineering presented at ICT Nuggets Forum - Khartoum, organized by Duko team. We talked about what is social engineering? terms related to it? and how attacks can bee carried. We also told a lot of stories about successful social engineering attacks and how much damage they did. Finally we talked about how to protect yourself and your company social engineering attacks.
Social Engineering-The Underpinning of Unauthorized AccessKory Edwards
This document discusses social engineering and how it enables unauthorized access. Social engineering relies on exploiting human tendencies rather than technical vulnerabilities. The document explores how Edward Snowden used social engineering to gain access to NSA systems by persuading coworkers to provide their credentials. It examines why information security programs fail to prevent social engineering, despite training, due to human factors like lack of motivation. Common social engineering attack types are discussed, including insider threats, external threats, and the tactics used like appealing to human tendencies like authority, scarcity, and liking. The document argues a new approach is needed that incorporates social intelligence concepts to make employees less susceptible to social engineering.
Five things I learned about information securityMajor Hayden
I delivered this presentation at the University of the Incarnate Word in San Antonio, Texas, to a group of students studying information security. They're learning plenty about the technical aspects of information security, but I wanted to talk to them about the non-technical aspects as well. This presentation is meant to be a low-tech, more social introduction on how to handle security within a large organization.
Dr. Shawn P. Murray was invited to the National Security Institute in April 2012 to present current topics related to social engineering and the threats they pose to organizations and their sensitive information. This presentation analyzes the principles of social engineering tactics as they relate to technology and security practices. Dr. Murray is a well known Cyber Security professional and has presented at various conferences regarding Cyber Security and Information Assurance topics.
This document summarizes a presentation on cyber security for financial planners. It discusses the different types of hackers, including script kiddies, hacking groups, hacktivists, black hat professionals, organized criminal gangs, nation states, and automated tools. It also identifies common vulnerabilities exploited by hackers like weak passwords, unpatched software, and human error. The presentation outlines steps for assessing cyber security risks such as creating an data inventory, developing privacy policies, and implementing technical controls and security policies to protect networks and sensitive client information.
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
This document summarizes the key points from a university lecture on information security. It discusses topics covered during the semester including a guest speaker from the FBI, security controls, CIA triad, categories of controls, ingredients of security, technical weaknesses, defense in depth, risk analysis, hiring and termination practices, security policies, cloud security, BYOD, and more. The document recaps the various assignments and presentations given throughout the course.
This document discusses securing information systems and provides an overview of security concepts and tools. It covers system vulnerabilities, threats like malware and hackers, establishing security frameworks, and technologies to safeguard systems like firewalls, encryption, and digital certificates. The key topics are securing systems from internal and external threats, implementing controls and policies, and using technical tools to protect information assets and ensure system availability.
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
This presentation is a summary, for the students of the IS 365/765 course I teach, at the University of Wisconsin-Madison, providing a 104 slide reminder of the most important topics in Information Security, which we covered throughout the semester. Today is the last day of course material. We have 4 days of student team presentations, to follow.
The document discusses security awareness and the growing threat of cyber attacks and data breaches. It notes that malware has become more sophisticated, targeting data and businesses rather than just PCs. The impacts of data breaches can include high costs for businesses. It recommends practicing defense in depth across networks, endpoints, and security tools to balance risk and costs. Cyber/privacy breach insurance can help cover liabilities and costs imposed by laws and regulations in the event of a security incident.
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
This document provides an overview of intrusion detection and prevention systems (IDPS). It discusses the types of threats, vulnerabilities, and intrusions that IDPS aim to address. It describes the differences between network-based and host-based IDPS, as well as signature-based and anomaly-based detection methods. The document also outlines some key capabilities of IDPS, such as identifying hosts, operating systems, applications, and network characteristics. It notes limitations of IDPS, including inability to analyze encrypted traffic. Finally, it emphasizes the importance of properly deploying and managing IDPS according to organizational needs and policies as part of a layered defense-in-depth security strategy.
The article examines how the creators of the Stuxnet malware signed its driver files with stolen digital certificates from Realtek and JMicron. It finds that the attackers likely obtained the private keys needed to sign the files from the legitimate certificate owners by exploiting their systems. This allowed Stuxnet to appear as a legitimate software update and helped it infect many targets undetected over a long period of time.
We Are Instructor Led Online Training Hub.Get access to the world’s best learning experience at our online learning community where millions of learners learn cutting-edge skills to advance their careers, improve their lives, and pursue the work they love. We provide a diverse range of courses, tutorials, resume formats, projects based on real business challenges, and job support to help individuals get started with their professional career.
Computer forensics is expected to face significant changes over the next 5-50 years:
- Within 5 years, storage capacity and processing speeds will increase dramatically, resulting in exponentially more data to analyze per case. Automated tools will help speed up initial processing but full analyses may still take similar time.
- By 10 years, computers may be much smarter and interfaces more advanced, changing the examiner's role. Experts will need deeper knowledge of human-computer interactions. Malware threats will likely escalate as well.
- Predicting 50 years is difficult but storage capacities may reach zettabytes, fit in dental fillings. Computers may surpass human intelligence. The legal system may remain
Research Paper Sentence OutlineResearch Question How e-commer.docxaudeleypearl
Research Paper Sentence Outline::
Research Question: How e-commerce companies address privacy in its policies?
Purpose: The purpose of this assignment is to prepare you for the dissertation process by creating a sentence outline for a research paper.
Description: The topic of your sentence outline is your research paper topic. After completing this week's Learning Activities, develop a sentence outline.
Deliverable: Prepare a Microsoft Word document that includes the following headings and one full sentence in each section:
· Title Page
· Abstract
· Introduction
· Literature review
· Research Method
· Results
· Discussion
· Conclusion
John Fulcher
CYB/110
Playbook / Runbook Part 2 – Social Network Security
John W. Fulcher
University of Phoenix Online
CYB/110
Question 3
The scenario that happened involved the Win32/Virut malware that was notorious and wreaked havoc on one machine in the company (Microsoft). The malware was detected and stopped before it spread to any other computer on the network. It operates by modifying the software executables on the computers and spreads by targeting every software executable that opens and writes its code that introduces a backdoor that allows hackers to access the system from remote servers. The malware is introduced when an infected executable is run on the machine and once it has been installed along with the innocent-looking software, it copies itself to every other executable as soon as it is opened, meaning that it does not spread if no executable file is run. This, in turn, means that any software that is yet to be run is safe.
Upon realizing the corruption, which was done when an online scan using ESET antivirus was conducted, every executable was closed down (ESET). This allowed for antivirus to effectively isolate any executable affected and list it. Indeed, the executables were listed and it turned out that 7 executables had been affected already, these were immediately quarantined. Some of the software affected were office word and operating system executables. To effectively deal with the threat, I restored the quarantined files so that I could cleanly uninstall the software. After the uninstallation, the online scan was run again, since it was not vulnerable to infection through the executable corruption. This time around, every identified threat was removed and an operating system disc used to repair the corrupted operating system files. Finally, the ESET antivirus was installed so that such threats can be prevented before happening to reduce the extent of the damage. The affected software was then reinstalled and the system scanned with the offline antivirus and scheduled to automatically scan every day (Koret and Bachaalany).
Employees must be guided not to share the following information online:
· Usernames
· Office address
· Their medical history and records
· Their work experiences
· The place they have lived in
· Family member’s identity
· Date of births
· ...
Computer Forensics
Discussion 1
"Forensics Certifications" Please respond to the following:
· Determine whether or not you believe certifications in systems forensics are necessary and explain why you believe this to be the case. Compare and contrast certifications and on-the-job training and identify which you believe is more useful for a system forensics professional. Provide a rationale with your response.
· Suppose you are the hiring manager looking to hire a new system forensics specialist. Specify at least five (5) credentials you would expect an ample candidate to possess. Determine which of these credentials you believe to be the most important and provide a reason for your decision.
Discussion 2
"System Forensics Organizations" Please respond to the following:
· Use the Internet or the Library to research and select one (1) reputable system forensics organization. Provide a brief overview of the organization you chose, including what it provides for its members, and how one can join the organization. Indicate why, in your opinion, this particular organization would be the best choice for a system forensics professional to join and why you believe this way.
· Examine what you believe to be the most important reason for a systems forensic professional to be a member of a forensics organization and how this could further one’s career in the industry.
Cyber Security
Discussion 1
"Leading Through Effective Strategic Management" Please respond to the following:
· Propose three ways to ensure that cooperation occurs across security functions when developing a strategic plan. Select what you believe is the most effective way to promote collaboration and explain why.
· Explain what may happen if working cultures are overlooked when developing a strategy. Recommend one way to prevent working cultures from being overlooked.
Discussion 2
"Installing Security with System and Application Development" Please respond to the following:
· Provide three examples that demonstrate how security can be instilled within the Systems Development Life Cycle (SDLC). Provide two examples on what users may experience with software products if they are released with minimal security planning.
· Suggest three ways that application security can be monitored and evaluated for effectiveness. Choose what you believe to be the most effective way and discuss why.
Computer Security
Discussion 1
"Current Events and Future Trends" Please respond to the following:
· How can we create a national security culture where all are more cognizant of security threats and involved to help prevent potential incidents? How do we balance the need for this security culture with the rights guaranteed to us by our Bill of Rights?
Research Topics (Choose 1 Topic)
Terrorism
· Terrorism remains one of the major concerns in the wake of the 9-11 events. Research into terrorism as it pertains to homeland security is conducted by corporations like the RAND Corporation, which is.
Ethical Hacking A high-level information security study on protecting a comp...Quinnipiac University
As organizations in recent years continue to increase their investment into the advancements of technology to upsurge productivity and efficiently, more and more companies begin to realize that protecting of this technology is just as significant (Information Security), if not; even more important in order to protect their reputation and integrity as a company.
This paper provides a comprehensive high-level view of ethical hacking, such as what it is, what it entails, and why companies hack into their own technology. Additionally, counter measures including penetration testing and real-world examples will be examined to give the reader a better understanding of ethical hacking and why it’s such an essential element of Information Security in the Information Systems/Technology field.
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources
The document discusses the importance of computer forensics and computer security. It notes that as technology advances, security needs to advance as well to protect vital information from unauthorized access. Computer forensics is used to investigate cyber crimes and digital evidence in order to strengthen legal systems and network security. Both computer forensics and computer security are crucial fields within IT that work together to develop more efficient security measures and prevent cyber crimes from increasing.
Information Security And The HealthcareTracy Berry
Information security and privacy are important in healthcare to securely share patient information. As healthcare organizations store vast amounts of sensitive data, they must implement robust information security practices. Hospitals in particular house critical healthcare data and tools that patients rely on, so protecting this information from computer viruses or infected devices is essential. Intrusion detection and prevention systems help monitor networks for threats, but healthcare organizations must also raise awareness of security risks and regularly evaluate firewall and router configurations to maintain strong defenses.
Inconvenient Truth(s) - On Application Security (from 2007)Dinis Cruz
This document discusses inconvenient truths about software security. It notes that there are no standardized security metrics, making it difficult for customers to assess security. It also draws parallels between global warming and the growing impact of insecure software. The document argues that secure software does not currently make business sense for vendors due to a lack of incentives. It warns that society's heavy dependence on software leaves it vulnerable if attacker business models evolve to more effectively monetize exploiting insecure systems at scale. Overall, the document presents several inconvenient realities about the current state of software security.
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
ISE 510 Final Project Scenario Background Limetree Inc. is a research and development firm that engages in multiple research projects with the federal government and private corporations in the areas of healthcare, biotechnology, and other cutting-edge industries. It has been experiencing major growth in recent years, but there is also a concern that information security lapses are becoming rampant as the company grows. Limetree Inc. is working to establish a strong reputation in the industry, and it views a robust information security program as part of the means to achieving its goal. The company looks to monitor and remain compliant to any regulation impacting its operations.
Limetree Inc. recently experienced a security breach; it believes confidential company data has been stolen, including personal health information (PHI) used in a research study. Limetree Inc. believes the breach may have occurred because of some security vulnerabilities within its system and processes.
Limetree Inc.’s virtual environment is presented in the Agent Surefire: InfoSec educational video game. The rest of the environment is presented via an interview with the security manager, Jack Sterling.
Highlight of Interview with Jack Sterling
Interview with Jack Sterling revealed the following about Limetree Inc.’s system and processes:
Hardware/Software:
Desktop Apps: Internet Explorer, Firefox, Google Chrome, MS Office, Adobe Flash, Adobe Acrobat
Applications/Databases:
Browser – Browser in use is Internet Explorer and browser security setting was set to low. Browsers allow remote installation of applets, and there is no standard browser for the environment.
Virus Software – MacAfee is deployed locally on each user's machine and users are mandated to update their virus policy every month.
SQL Database – Ordinary users can escalate privilege via SQL Agent. Disk space for SQL database log is small and is overwritten with new information when it is full. Limetree Inc. is not using any encryption for sensitive data at rest within the SQL server environment.
Network:
The network comprises the following: three web/applications servers, three email servers, five file and printer servers, two proxy servers, seven remotely manageable Cisco switches, 250 desktops, three firewall devices, one gateway (router) device to the internet, and three wireless access points.
Configuration Highlights:
Wireless – Wireless network is available with clearly advertised SSID, and it is part of the local area network (LAN). There is no segmentation or authentication between the wireless and wired LAN. Visitors are provided access code to the wireless network at the front desk to use the internet while they wait to be attended to.
Managed switches – There is no logging of network activities on any of the switches.
Web server – Public-facing web server is part of the LAN. This is where internet users get needed information on the company. The web servers are running the f.
The document summarizes an ICSA Technology Conference focused on cyber security that was held on Friday, November 4, 2017. The conference included chair remarks, discussions on building business confidence in cyber security, the evolving cyber threat landscape, ransomware and cyber extortion, and how to respond to a cyber security breach. Speakers addressed questions organizations have about current cyber risk levels and how to understand and address cyber threats through practical measures.
Lesson2.9 o u2l6 who cares about encryptionLexume1
This document outlines a lesson plan on encryption that involves students exploring who cares about encryption through readings and a debate activity. Students will represent different groups (government, civil liberties, business) in the debate about the availability of encryption software. The lesson aims to help students identify cybersecurity concerns and evaluate online sources, as well as understand that cybersecurity involves tradeoffs and that the trust model of the internet has limitations. Homework involves reading more about the evolution of encryption methods.
computer and society impact of Computer in society Sumama Shakir
This document discusses computer and society, the impact of computers, and computer ethics. It begins by noting how computers are now ubiquitous and impact daily life and communication. It then outlines several major applications of computers in fields like management, banking, industry, engineering, medicine, and transportation. Both positive impacts like efficiency and data storage, and negative impacts like costs and data loss are discussed. The document also covers computer ethics, including issues around intellectual property, privacy, and how technology shapes society. Specific ethical concerns are outlined, like plagiarism, hacking, and phishing scams. Finally, the document provides tips to avoid phishing scams and promote responsible computer use.
This document discusses various social and professional issues in information technology, including ethics, vulnerability disclosure, spam, email scams, hacking, viruses, and conflicts of interest. It addresses how organizations can evaluate their ethics and culture and examines approaches to vulnerability disclosure like non-disclosure, full disclosure, and responsible disclosure. It also outlines common email scams and discusses hacking activities and the development of viruses and worms.
Lesson2.9 o u2l6 who cares about encryptionLexume1
This document outlines a lesson plan for students to explore issues around encryption. It includes readings for students on the topic of encryption and its availability. The lesson then involves splitting students into groups to represent governments, civil liberties groups, and businesses in a debate around regulating encryption software. Students in each group must write reasons to support their position and counter the other groups' positions. The document provides learning objectives, enduring understandings, and essential knowledge related to cryptography, cybersecurity, privacy, and ethics that are addressed in the lesson.
I. Ethical hacking is used to secure important data from threats by finding vulnerabilities in systems through similar techniques used by hackers, but in a legal manner.
II. It works as a safeguard against black hat hackers by allowing companies to detect security issues and risks in their networks and systems.
III. The future of cyber security and ethical hacking looks promising, as the global market for penetration testing is expected to reach $4.1 billion by 2027, and the field provides opportunities to improve skills in areas like networking, project management, and customer service.
The document provides an overview of ethical hacking, including definitions, legal aspects, and certification programs. It describes the role of an ethical hacker as someone who performs penetration testing and security assessments with a company's permission to help identify vulnerabilities. Key points covered include common tools used in security testing, examples of legal and illegal activities, and various certification programs for security professionals like the Certified Ethical Hacker and CISSP certifications.
This document is a colloquium report on ethical hacking presented by Khushboo Aggarwal to the Department of Information Technology at ABES Engineering College in Ghaziabad, India in 2014-2015. The report provides an introduction to ethical hacking, describing what it is and its purpose. It discusses the different types of hackers, the methodology used in hacking, and some important ethical hacking tools. The report aims to increase understanding of ethical hacking and how systems can be better secured against vulnerabilities.
Similar to Quality of Information and Malware by Ashok Panwar (20)
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok PanwarAshok Panwar
This document discusses the Ad-hoc On-demand Distance Vector (AODV) routing protocol. It defines AODV as a reactive, table-driven routing protocol for mobile ad-hoc networks. The key principles of AODV are described, including using routing tables, route requests (RREQs), route replies (RREPs), and route error (RERR) messages for route discovery and maintenance. The document then outlines how to simulate AODV using the ns-2 network simulator, including experimental setup parameters, performance metrics, and Tcl configuration details. Simulation results analyzing the effects of varying node speed, pause time, maximum connections, and number of nodes on performance metrics are also summarized.
Secure Routing with AODV Protocol for MANET by Ashok PanwarAshok Panwar
This presentation discusses securing the AODV routing protocol for mobile ad hoc networks. It reviews three approaches: 1) Using public key cryptography and group session keys to authenticate nodes and encrypt routing packets. 2) Using intrusion detection and response models to identify compromised nodes based on abnormal routing behavior. 3) The Secure AODV (SAODV) protocol which aims to provide source authentication, neighbor authentication, message integrity, and access control to address vulnerabilities like message tampering, dropping, and replays. Experimental results are compared for SAODV and traditional AODV.
Secure Mail Application's by Ashok PanwarAshok Panwar
- Two early secure email systems were PEM (Private Enhanced Mail) and PGP (Pretty Good Privacy). PGP became the de facto standard.
- PGP uses algorithms like IDEA for encryption, RSA for key exchange and signatures, and MD5 for hashing. Version 2.6.3i from the 1990s is often used to explain basic PGP operations.
- PGP can encrypt files locally using a passphrase to derive an IDEA encryption key via MD5 hashing. It can also encrypt emails using a randomly generated IDEA session key which is encrypted with the recipient's RSA public key.
Routing Protocols in MANET's by Ashok PanwarAshok Panwar
The document discusses routing protocols for mobile ad hoc networks (MANETs). It provides an overview of the key challenges in MANET routing due to the dynamic and distributed nature of the networks. It also summarizes two popular on-demand (reactive) routing protocols for MANETs - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector (AODV) routing. DSR uses source routing and route maintenance, while AODV uses hop-by-hop routing, destination sequencing numbers, and periodic route updates to avoid routing loops and adapt to topological changes. Both protocols reduce overhead by only discovering routes on-demand when needed.
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok PanwarAshok Panwar
The document discusses the performance analysis of the AODV routing protocol under black hole attacks. It begins with an introduction to AODV and why it is used. It then discusses security issues with AODV and different types of attacks it is susceptible to, focusing on distributed denial of service (DDoS) and black hole attacks. Black hole attacks are explained in more detail, outlining how they work by falsely replying to route requests and dropping packets. The document concludes by stating the author's intention to analyze AODV performance under black hole attacks using a network simulator.
The document discusses network management and summarizes the key aspects. It describes how network management involves five functional areas: fault management, configuration management, security management, performance management, and accounting management. It also summarizes some of the common network management protocols like SNMP and how they are used to monitor devices and exchange information.
Introduction to Security Management by Ashok PanwarAshok Panwar
This document provides an introduction to computer security and cryptography presented by Ashok Panwar. It discusses logical and physical data protection, including authentication protocols, security policies, and physical security procedures. It also covers risk analysis and strategies for determining how much to invest in security protection based on calculating the probability and impact of risks versus the cost of prevention measures. Specific security models and policies are defined, such as the Bell-LaPadula and Clark-Wilson models and access control and flow control policies.
Firewalls & Trusted Systems by Ashok PanwarAshok Panwar
This document discusses firewalls and trusted systems. It begins by outlining firewall design principles, characteristics, and types including packet filtering routers, application-level gateways, and circuit-level gateways. It also discusses common firewall configurations and the concept of trusted systems using a reference monitor to enforce security rules.
The document discusses ad hoc networks and routing protocols. It begins with an introduction to mobile ad hoc networks (MANETs), including their characteristics and applications. Several categories of routing protocols are described, including table-driven protocols like Destination Sequenced Distance Vector Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as source-initiated on-demand protocols like Dynamic Source Routing (DSR). The document provides examples and explanations of how these different protocols perform routing in MANETs.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAshok Panwar
The document discusses the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. AODV is a reactive routing protocol designed for use in mobile ad hoc networks. It establishes routes using a route discovery process initiated when a node requires a route to a destination. This process uses route request and route reply messages to discover routes. AODV also maintains these routes by periodically broadcasting hello messages and responding to link failures via route error messages. The document provides details on AODV's routing table structure, message types, route discovery and maintenance processes.
This document summarizes Ashok Panwar's presentation on ad hoc networks and the AODV routing protocol. It discusses key characteristics of ad hoc networks such as being peer-to-peer, multi-hop, dynamic, and self-configuring. It also outlines commercial opportunities for ad hoc networks in applications like conferencing, emergency services, and embedded computing. The presentation then covers technical challenges, an overview of on-demand routing protocols including AODV, and methods for integrating ad hoc networks with the Internet such as using gateway nodes and address autoconfiguration. It concludes by discussing the state of ad hoc network research.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
2. Under engineering point of view:
• Study of the characteristics and statistics of the
language that will allow an analysis from a
mathematical, scientific and technical focus.
Under company point of view:
• All data that the company owns and manages and
messages that persons and/or machines
exchange inside an organization.
Presented by:- Ashok Panwar
Technical Officer in ECIL
2
3. The study made by Claude Shannon in the years
after the 2nd World War has allowed, besides other
things:
• To quantify the quantity of information.
• To measure the entropy of information.
• To define a system with a perfect secret.
• To calculate the redundancy and rate of language.
• To find the distance of unicity.
The whole study made by Shannon is oriented to classic
cryptosystems that encrypt letters, which are not of interest
in this book. Nevertheless, in one of the following chapters
we can see these systems on detail since they allow to
analyze easily the perfect secret systems.
3
Presented by:- Ashok Panwar
Technical Officer in ECIL
4. • It will be understood as:
– The entire data and files that the company owns.
– All the exchanged messages.
– All the records about clients and providers.
– All the records about products.
– Definitely, the know-how of the organization.
• If this information gets lost or it´s degraded,
it will be very difficult for the company to
recover itself to continue being competitive.
For this reason, it is vital to implant security
policies.
4
Presented by:- Ashok Panwar
Technical Officer in ECIL
5. • The introduction of policies and actions to assure information
security in the company is being taken into account only since
last years of the past decade. In this new century, it is an
estrategic factor for the develop and the success of such
company. After the facts occurred in the Twin Towers in year
2001, several companies have disappear after loosing all its
own information. It is a warning for all of us.
• Success in one company will highly depend
on the quality of information that it´s
generated and managed. Thus, one
company will have quality of information if
this allows, besides other things,
confidentiality, integrity and disponibility.
5
Presented by:- Ashok Panwar
Technical Officer in ECIL
6. • Information (data) will be altered by many
factors, affecting this basically to the
aspects of confidentiality, integrity and
disponibility of the company.
• From the point of view of the company,
one of the most important problems can
be the one related with computing crimes,
either by external or internal factors. We
must be very careful with the internal
factor.
A dissatisfied
employee...
6
Presented by:- Ashok Panwar
Technical Officer in ECIL
7. Solution seems to be
very simple: to apply
new technics and
security policies ...
The treatment and vulnerability of the information will be influenced
by other themes, like the current legal aspects. Besides, companies
depend more on their communications and on their networkings
everyday, what increases their insecurity.
... This idea is
just starting to be
seriously
considered.
Policy 1
Policy
2
Polícy 3
Polícy 4
Solution
7
Presented by:- Ashok Panwar
Technical Officer in ECIL
8. A non authorized person could:
• Classify and declassify data.
• Filter information.
• Alter information.
• Erase information.
• Usurp data.
• Have a look at classified information.
• Deduce confidential data.
Therefore,
protection of
data results
obvious
8
Presented by:- Ashok Panwar
Technical Officer in ECIL
9. The most elemental action to protect data is to
determine a good policy of security copies or
backups:
• Complete Backup
All the data (the first time).
• Incremental Backups
Only the files that have been created or modified since the
last backup are copied.
• Ellaboration of backup plans according to the total
volume of generated information
Type of copies, cycle of this operation, correct labeling.
Diary, weekly, monthly: table creation.
• Stablishing who, how and where data are kept.
9
Presented by:- Ashok Panwar
Technical Officer in ECIL
10. • Hacker:
– Initial definition inicial proposed by MIT engineers who
were proud about their knowledge in computers.
– Besides many other classifications we find White Hat´s one
(not criminal in general), Black Hat (criminal in general) and
Grey Hat (reconverted by companies).
• Cracker:
– Person who tries, ilegally, to break the security of a system
only for entertainment or personal purposes.
• Script kiddie:
– An inexpert person, perhaps a boy, which uses programs
downloaded from the Internet to attack systems.
10
Presented by:- Ashok Panwar
Technical Officer in ECIL
11. Companies related to New Information Technologies
NITs make use of several technics and tools for
networks in order to provide data exchange:
• File transference (ftp)
• Information and data transference through Internet
(http)
• Remote connections to machines and servers
(telnet)
All these technics will suffer risks attacks on the part
of computing delinquents, but ...
11
Presented by:- Ashok Panwar
Technical Officer in ECIL
12. Even though being well organized these
groups of delinquents, first of all we have
to take it easy so we won't become
paranoic. Futhermore, we must catch on
that the real enemy can be inside our
"home"...
The solution continues being still the
same: the implantation of an adecuate
security policy inside the company.
12
Presented by:- Ashok Panwar
Technical Officer in ECIL
13. These are actions that vulnerate confidentiality, integrity
and disponibility of information.
– Attacks to computers and network systems:
Fraud Misappropiation Robbery
Sabotage Spionage Blackmail
Revelation Mascarade Virus
Worms Trojans Spam
Let´s see some
13
Presented by:- Ashok Panwar
Technical Officer in ECIL
14. Fraud
Deliberated act of data manipulation by harming to a physical or juridical
person that suffers this way an economic loss. The author of the crime
obtains this way a benefice which uses to be economic.
Sabotage
Action by which it is desired to harm one company deliberately obstructing
its functioning, damaging their equipment, tools, software, etc. The author
does not usually obtain economic benefices but creates great chaos into
the organization.
14
Presented by:- Ashok Panwar
Technical Officer in ECIL
15. Blackmail
Action that consists of demanding a certain quantity of money in order of
not making public privileged or confidential information and that can affect
thoroughly to that company, usually to its corporative image.
Mascarade
Utilization of one key by a non authorized person that gets into the system
supplanting an identity. This way, the intruder will own then the
documentation,information and data of other users that can be used, for
instance, to blackmail the organization.
15
Presented by:- Ashok Panwar
Technical Officer in ECIL
16. Virus
Code designed to be introduced into a program, to modify or to destroy
data. It is copied automatically to other programs to perpetuate its life
cycle. It is very common that it spreads through templates, application
macros and executable files.
Worms
Virus activated and transmited through the network. Its purpose it´s to
multiplicate itself until running out the space of disks or RAM. It uses to be
one of the most dangerous attacks because it normally produces
collapses into the networks as we already know.
16
Presented by:- Ashok Panwar
Technical Officer in ECIL
17. Trojans
Virus that gets into the computer and shows a similar behaviour to that fact
referred on the greek mithology. Thus, it seems to be an inoffensive thing
or program when it is actually doing another thing and spreading itself. It
can be very dangerous when the programmer or the company itself installs
it into one program.
Spam
The spam or not desired email, although it cannot be properly considered
as a real attack, the fact is that nowadays, it can produce important
information losses in companies and organisms.
17
Presented by:- Ashok Panwar
Technical Officer in ECIL
18. Communications nowadays work this way and they will grow more
every time to become open systems like, for instance, current
wireless networks, so new menaces will rise...
This constant confrontation between the dark side or
the evil (the Ying) and the light side or the good (the
Yang), like this symbol belonging to ancestral religions
and philosophies shows, will be inevitable in an
intercomunicated and open system like current ones.
There are lots of crimes and menaces.
Perhaps in an inmediate future new crimes and attacks to computing
and network systems will appear that, right now, we still do not know
how they will be or which vulnerability will they exploit.
18
Presented by:- Ashok Panwar
Technical Officer in ECIL
19. Next slides are only a brief and elemental introduction to the
world of computing viruses, oriented besides to the world of
PCs and to the Windows environment. It does not seek to be a
document that goes deeply into the virus and malware world as
we could expect due to the importance of them nowadays.
This paragraph is included exactly on this chapter as one more
factor to be taken into account as soon as the quality of
information that we manage.
Many people consider this as minor theme; however, inside the
companies this is one of the most important problems that
responsibles in IT security may face.
19
Presented by:- Ashok Panwar
Technical Officer in ECIL
20. • First example: John von Neuman in 1949.
• First virus: M. Gouglas of Bell Laboratories creates the Core
War in 1960.
• Firsts attacks to PCs between 1985 and 1987:
– Virus Jerusalem and Brain.
• Inoffensives (balls, letters that move, etc.)
– They just annoy and obstruct the work but do not destroy
any information. They could reside inside the PC.
• Malicious (Friday 13, Blaster, Nimbda, etc.)
– They destroy all the data and affect to the integrity and
disponibility of the system. They must be removed.
http://www.virusbtn.com/
More information available in:
20
Presented by:- Ashok Panwar
Technical Officer in ECIL
21. • They are transmited just through the execution of one program. This is very
important to remember.
• The email, by definition, cannot contain virus since is being formed only by
text. Nevertheless, many times they contain attached files or either the
visors execute any code into the email client of the user and these can
have a virus included. This is the most critical point in security regarding
virus; the trusting user, tempted by something, cheated with the
denominated social engineeering, etc., opens the file. There resides the
danger.
• Web environment is still more dangerous. One link can launch a Java (or
any other language) program that will be executed by the client and will
infect or destroy the machine.
21
Presented by:- Ashok Panwar
Technical Officer in ECIL
22. • There are some virus that infect programs with
extensions exe, com and sys, for example.
– They reside into the memory when the host is
executed and they spread themselves to other
files.
• And some that infect the system and the boot sector
and entrance tables (determined areas of the disk).
– They are directly installed there and therefore
they reside into the memory.
22
Presented by:- Ashok Panwar
Technical Officer in ECIL
23. • Protect the removable disks -today mainly with USB flash
technology- with the security jumper. It is a basic writing
protection and also very elemental.
• Install an antivirus SW and periodically keep it up-to-date. It is
recommendable to do it once a week at least.
• Execute the antivirus scan on the hard disk once a month.
• Execute always the antivirus scan to every disk or CD
introduced into the system and to the files downloaded from the
Internet or attached in e-mails.
• If you are not sure, resort to freeware tools in Internet (*).
• Control the access of unknown people to the computer.
• Use legal software, with license.
http://www.virustotal.com/en/indexf.html
23
Presented by:- Ashok Panwar
Technical Officer in ECIL
24. • Stop remote connections.
• Do not activate the mouse or the keyboard.
• Shutdown the system and disconnect it.
• Boot with a bootable or emergency diskette protected
and execute then an antivirus program.
• If possible, make a backup of the files. Note: make
backups often.
• Format low level the hard disk if there´s no solution .
• Install again the operative system and restore with
data from backups.
24
Presented by:- Ashok Panwar
Technical Officer in ECIL
25. 1. What is the difference between the concept of information and
its quality according to what a company or engineering
studies understand?
2. Why is it said that the information of a company is its most
valuable asset? Compare this asset with its own stuff and
pose situations on which both are lost, which situation could
be more damaging for the continuity of such company?
3. As security responsibles we´ve detected that somebody is
making illegal actions, for example non authorized copies of
information. What attitude shall we take?
4. What measures could be the most adecuated in order to
minimize the virus attacks in our company?
5. If we desire to have our company protected both physically
and logically, what should we do?
25
Presented by:- Ashok Panwar
Technical Officer in ECIL