SlideShare a Scribd company logo
7 Effective Habits when
using the Internet
Philip O’Kane
1
Introduction

Who are the players?
− The Attackers
− IT Support/Department
− End-user

Attack Surface
− What is an attack surface
− How well are you protected?

Myths about Malware (Virus, Worm, Trojan, etc.)

Seven Effective Habits
2
The Players
IT Department
• Multifunction
• Resolve Issues
• Protect User, Assets and Networks
User
• Carry out Business function
• Protect Asset
Attacker
(Malware)
Assets
• Personal Information
• Account Details
• IPR
Firewall
3
Attack Surface
4
Firefox
Internet
Explorer
Chrome
Java Apps
Email
Web
Browser
Flash
Player
Vulnerability
(Bug or Poor configuration)
Assets
• Personal Information
• Account Details
• IPR
Attacker
(Malware)
Attacks

The End-user PC is inside the firewall
− It inherits the trusted status of the PC and can access
sensitive information
− Use privileged protocols to access data
− Spread to others using privileged protocols
− Email everyone in your contacts with malware attachments
− Backdoor access – can send data to the attackers

Used as part of a Botnet to attack others (DDOS)
5
Attacks on Corporates

Bank Dbase hacked $45 Million in ATM (Dec 2013)

RSA Security,40 million employee records
stolen (March 2011)

Sony's PlayStation Network (April 2011)
− 77 million accounts hacked
− Sony site was down for a month
6
Attacks on the Individual

Mobile Ransomware (2014)

Spam Emails
− PayPal (URLs).

Emails with attachments
− Zip, SCR, EXEC
− CryptoLockers/Ransomware
− Backdoors

USB
− Found or given a USB at a show
7
IT Departments/Defence Solutions

Firewall configuration
− Internet protocols
− Open ports

Patch Deployment
− Centralised vulnerability remediation as exploitations are on the
internet within 8 hours of patch deployment (Patch Tuesday)

Permitting open policies for privileged user authority

70% of stolen data via USBs
8
Myths

I will know when I’m infected

Malware is just for Windows

Email attachments from known persons are safe

Visiting only reputable sites is completely safe

Malware is not a problem, I have nothing important on my PC
9
I will know when I’m infected

Malware Detection Rate over 30 Days
10
0->25% 26->50% 51->75% 76->90% 91->100%
Key
Day 1 8 15 22 30
McAfee 22% 53% 85% 86% 86%
Kaspersky 22% 87% 91% 92% 92%
AVG 13% 85% 92% 92% 93%
Virus Buster 10% 30% 46% 74% 74%
Symantec 21% 36% 43% 46% 47%
Trend Mirco 17% 29% 32% 32% 38%
Poor Good
"Cyveillance testing finds AV vendors detect on average less than 19% of malware attacks", Aug, 2010,
https://www.cyveillance.com/web/blog/press-release/cyveillance-testing-finds-av-vendors-detect-on-average-less-than-19-
of-malware-attacks.
Zero Day
Malware is just for Windows

Window is the biggest target
− Windows 8 release - a firm announced a zero-day vulnerability
that circumvents all new security enhancements in Windows 8
and Internet Explorer 10

Mobile phone
− Study claims 614% increase last year.
− Android accounts for 92% of total infections (June 2013)

Apple Mac
− Small volume of malware to date
11
Email attachments from known persons are safe

Do not execute untrusted programs
− Internet protocols
− Open ports

Email attachments
− Who can you trust?
− Has your friend been hacked?

Embedded URLs
− (Spear) Phishing Emails
− PayPal scam etc.
12
Visiting only reputable sites is completely safe

Advice such as ‘Do not visit risky websites’
− It is good advice

The converse is not necessary true
− Reputable websites can be hacked
− NBC Media website hacked, which installed fake antivirus
software (Feb 2013).
− msn.co.nz website hacked to re-directed to a site that hosts
pictures of Bill Gates (MS) with pie on his face.
− EA games web server hacked to host phishing website, users
where asked to enter their Apple IDs and personal information.
13
Malware in not a problem, I have nothing..

Malware is not a problem, I have nothing important on my PC

Even if your computer has nothing important stored on it
− Address books can be used to send out spam and malicious
emails
− Malware can record all of your keystrokes and steal your
usernames and passwords. When the malware authors have that
information, they can use it to cause severe damage ranging
from financial loss to identity theft.

Bank account details

Social media website to scam friends
14
Reduce your Attack Surface

Browser
− Use the latest browser
− Update your security regularly
− Browser controls

Games and Apps
− Do you need those apps?
− Where to get apps?
15
Reduce your Attack Surface

Portable media
− Two-thirds of lost USB drives carry malware – from a survey of
USB drives in a lost and found department
− Beware of USBs you find lying around
− Malware infected USB drives handed out at a trade show
16
Seven Effective Habits

You can’t disengage your brain

Be safe both at work and home

Update your software to include latest patches

Use the latest software

Don’t install software you don’t use

Be careful about the apps you download - Games etc.

Run with minimum privileges
17

More Related Content

What's hot

The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackAvanzo net
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.MarianaGilMartnez1
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Vasile
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusABHAY PATHAK
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 

What's hot (20)

spyware
spywarespyware
spyware
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attack
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Spyware
SpywareSpyware
Spyware
 
Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Spyware
SpywareSpyware
Spyware
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Computer security
Computer securityComputer security
Computer security
 
Spyware
SpywareSpyware
Spyware
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 

Viewers also liked

Communicating across the Digital Divide
Communicating across the Digital DivideCommunicating across the Digital Divide
Communicating across the Digital DivideLloyd Brown
 
Communicating Changes in Digital Services - #OLASC14
Communicating Changes in Digital Services - #OLASC14Communicating Changes in Digital Services - #OLASC14
Communicating Changes in Digital Services - #OLASC14Jacqueline Whyte Appleby
 
Communicating In The Digital Age By Wesley Fryer
Communicating In The Digital Age By Wesley FryerCommunicating In The Digital Age By Wesley Fryer
Communicating In The Digital Age By Wesley FryerWesley Fryer
 
The Role of Bloggers as New Media
The Role of Bloggers as New MediaThe Role of Bloggers as New Media
The Role of Bloggers as New MediaMaria "Ria" Jose
 
Communicating in the digital age - a guide for educators
Communicating in the digital age - a guide for educatorsCommunicating in the digital age - a guide for educators
Communicating in the digital age - a guide for educatorsHelen Dixon
 
Communicating in a Digital World
Communicating in a Digital World Communicating in a Digital World
Communicating in a Digital World Justine Abigail
 
La Motivación en el aprendizaje virtual
La Motivación en el aprendizaje virtualLa Motivación en el aprendizaje virtual
La Motivación en el aprendizaje virtualubiergopa
 
310307 Praesentation Coaching
310307 Praesentation Coaching310307 Praesentation Coaching
310307 Praesentation CoachingAndrea Zweifel
 

Viewers also liked (8)

Communicating across the Digital Divide
Communicating across the Digital DivideCommunicating across the Digital Divide
Communicating across the Digital Divide
 
Communicating Changes in Digital Services - #OLASC14
Communicating Changes in Digital Services - #OLASC14Communicating Changes in Digital Services - #OLASC14
Communicating Changes in Digital Services - #OLASC14
 
Communicating In The Digital Age By Wesley Fryer
Communicating In The Digital Age By Wesley FryerCommunicating In The Digital Age By Wesley Fryer
Communicating In The Digital Age By Wesley Fryer
 
The Role of Bloggers as New Media
The Role of Bloggers as New MediaThe Role of Bloggers as New Media
The Role of Bloggers as New Media
 
Communicating in the digital age - a guide for educators
Communicating in the digital age - a guide for educatorsCommunicating in the digital age - a guide for educators
Communicating in the digital age - a guide for educators
 
Communicating in a Digital World
Communicating in a Digital World Communicating in a Digital World
Communicating in a Digital World
 
La Motivación en el aprendizaje virtual
La Motivación en el aprendizaje virtualLa Motivación en el aprendizaje virtual
La Motivación en el aprendizaje virtual
 
310307 Praesentation Coaching
310307 Praesentation Coaching310307 Praesentation Coaching
310307 Praesentation Coaching
 

Similar to Seven Effective Habits When Using The Internet

Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfLucaMartins7
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 

Similar to Seven Effective Habits When Using The Internet (20)

Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Information security
Information securityInformation security
Information security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
C3
C3C3
C3
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 

More from Helen Dixon

Digital accessibility
Digital accessibilityDigital accessibility
Digital accessibilityHelen Dixon
 
Making the most of microlearning: Ideas and insights
Making the most of microlearning: Ideas and insightsMaking the most of microlearning: Ideas and insights
Making the most of microlearning: Ideas and insightsHelen Dixon
 
Virtual classroom
Virtual classroomVirtual classroom
Virtual classroomHelen Dixon
 
10 tips for engaging online students
10 tips for engaging online students10 tips for engaging online students
10 tips for engaging online studentsHelen Dixon
 
Get your social media site noticed
Get your social media site noticedGet your social media site noticed
Get your social media site noticedHelen Dixon
 
Get Cybersmart with Blogs
Get Cybersmart with BlogsGet Cybersmart with Blogs
Get Cybersmart with BlogsHelen Dixon
 
Communicating your research
Communicating your researchCommunicating your research
Communicating your researchHelen Dixon
 
Get Cybersmart for Career Success
Get Cybersmart for Career SuccessGet Cybersmart for Career Success
Get Cybersmart for Career SuccessHelen Dixon
 
Twitter for researchers
Twitter for researchersTwitter for researchers
Twitter for researchersHelen Dixon
 
Using social media to enhance your research profile
Using social media to enhance your research profileUsing social media to enhance your research profile
Using social media to enhance your research profileHelen Dixon
 
Using social media for research impact
Using social media for research impactUsing social media for research impact
Using social media for research impactHelen Dixon
 
Blogging for researchers
Blogging for researchersBlogging for researchers
Blogging for researchersHelen Dixon
 
Present your research project in 10 simple slides
Present your research project in 10 simple slidesPresent your research project in 10 simple slides
Present your research project in 10 simple slidesHelen Dixon
 
Managing Your Online Identity - Advice for School Leavers
Managing Your Online Identity - Advice for School LeaversManaging Your Online Identity - Advice for School Leavers
Managing Your Online Identity - Advice for School LeaversHelen Dixon
 
Twitter for academics
Twitter for academicsTwitter for academics
Twitter for academicsHelen Dixon
 
Introduction to Social Media for Researchers
Introduction to Social Media for ResearchersIntroduction to Social Media for Researchers
Introduction to Social Media for ResearchersHelen Dixon
 
Social media health check
Social media health checkSocial media health check
Social media health checkHelen Dixon
 
Amplifying your event using social media
Amplifying your event using social mediaAmplifying your event using social media
Amplifying your event using social mediaHelen Dixon
 

More from Helen Dixon (20)

Digital accessibility
Digital accessibilityDigital accessibility
Digital accessibility
 
Making the most of microlearning: Ideas and insights
Making the most of microlearning: Ideas and insightsMaking the most of microlearning: Ideas and insights
Making the most of microlearning: Ideas and insights
 
Virtual classroom
Virtual classroomVirtual classroom
Virtual classroom
 
10 tips for engaging online students
10 tips for engaging online students10 tips for engaging online students
10 tips for engaging online students
 
Get your social media site noticed
Get your social media site noticedGet your social media site noticed
Get your social media site noticed
 
Get Cybersmart with Blogs
Get Cybersmart with BlogsGet Cybersmart with Blogs
Get Cybersmart with Blogs
 
Communicating your research
Communicating your researchCommunicating your research
Communicating your research
 
Get Cybersmart for Career Success
Get Cybersmart for Career SuccessGet Cybersmart for Career Success
Get Cybersmart for Career Success
 
Twitter for researchers
Twitter for researchersTwitter for researchers
Twitter for researchers
 
Using social media to enhance your research profile
Using social media to enhance your research profileUsing social media to enhance your research profile
Using social media to enhance your research profile
 
Using social media for research impact
Using social media for research impactUsing social media for research impact
Using social media for research impact
 
Blogging for researchers
Blogging for researchersBlogging for researchers
Blogging for researchers
 
Present your research project in 10 simple slides
Present your research project in 10 simple slidesPresent your research project in 10 simple slides
Present your research project in 10 simple slides
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Managing Your Online Identity - Advice for School Leavers
Managing Your Online Identity - Advice for School LeaversManaging Your Online Identity - Advice for School Leavers
Managing Your Online Identity - Advice for School Leavers
 
Like and Learn
Like and LearnLike and Learn
Like and Learn
 
Twitter for academics
Twitter for academicsTwitter for academics
Twitter for academics
 
Introduction to Social Media for Researchers
Introduction to Social Media for ResearchersIntroduction to Social Media for Researchers
Introduction to Social Media for Researchers
 
Social media health check
Social media health checkSocial media health check
Social media health check
 
Amplifying your event using social media
Amplifying your event using social mediaAmplifying your event using social media
Amplifying your event using social media
 

Recently uploaded

History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shoplaozhuseo02
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxlaozhuseo02
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfSiskaFitrianingrum
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxGal Baras
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 

Recently uploaded (12)

History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Stay Ahead with 2024's Top Web Design Trends
Stay Ahead with 2024's Top Web Design TrendsStay Ahead with 2024's Top Web Design Trends
Stay Ahead with 2024's Top Web Design Trends
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 

Seven Effective Habits When Using The Internet

  • 1. 7 Effective Habits when using the Internet Philip O’Kane 1
  • 2. Introduction  Who are the players? − The Attackers − IT Support/Department − End-user  Attack Surface − What is an attack surface − How well are you protected?  Myths about Malware (Virus, Worm, Trojan, etc.)  Seven Effective Habits 2
  • 3. The Players IT Department • Multifunction • Resolve Issues • Protect User, Assets and Networks User • Carry out Business function • Protect Asset Attacker (Malware) Assets • Personal Information • Account Details • IPR Firewall 3
  • 4. Attack Surface 4 Firefox Internet Explorer Chrome Java Apps Email Web Browser Flash Player Vulnerability (Bug or Poor configuration) Assets • Personal Information • Account Details • IPR Attacker (Malware)
  • 5. Attacks  The End-user PC is inside the firewall − It inherits the trusted status of the PC and can access sensitive information − Use privileged protocols to access data − Spread to others using privileged protocols − Email everyone in your contacts with malware attachments − Backdoor access – can send data to the attackers  Used as part of a Botnet to attack others (DDOS) 5
  • 6. Attacks on Corporates  Bank Dbase hacked $45 Million in ATM (Dec 2013)  RSA Security,40 million employee records stolen (March 2011)  Sony's PlayStation Network (April 2011) − 77 million accounts hacked − Sony site was down for a month 6
  • 7. Attacks on the Individual  Mobile Ransomware (2014)  Spam Emails − PayPal (URLs).  Emails with attachments − Zip, SCR, EXEC − CryptoLockers/Ransomware − Backdoors  USB − Found or given a USB at a show 7
  • 8. IT Departments/Defence Solutions  Firewall configuration − Internet protocols − Open ports  Patch Deployment − Centralised vulnerability remediation as exploitations are on the internet within 8 hours of patch deployment (Patch Tuesday)  Permitting open policies for privileged user authority  70% of stolen data via USBs 8
  • 9. Myths  I will know when I’m infected  Malware is just for Windows  Email attachments from known persons are safe  Visiting only reputable sites is completely safe  Malware is not a problem, I have nothing important on my PC 9
  • 10. I will know when I’m infected  Malware Detection Rate over 30 Days 10 0->25% 26->50% 51->75% 76->90% 91->100% Key Day 1 8 15 22 30 McAfee 22% 53% 85% 86% 86% Kaspersky 22% 87% 91% 92% 92% AVG 13% 85% 92% 92% 93% Virus Buster 10% 30% 46% 74% 74% Symantec 21% 36% 43% 46% 47% Trend Mirco 17% 29% 32% 32% 38% Poor Good "Cyveillance testing finds AV vendors detect on average less than 19% of malware attacks", Aug, 2010, https://www.cyveillance.com/web/blog/press-release/cyveillance-testing-finds-av-vendors-detect-on-average-less-than-19- of-malware-attacks. Zero Day
  • 11. Malware is just for Windows  Window is the biggest target − Windows 8 release - a firm announced a zero-day vulnerability that circumvents all new security enhancements in Windows 8 and Internet Explorer 10  Mobile phone − Study claims 614% increase last year. − Android accounts for 92% of total infections (June 2013)  Apple Mac − Small volume of malware to date 11
  • 12. Email attachments from known persons are safe  Do not execute untrusted programs − Internet protocols − Open ports  Email attachments − Who can you trust? − Has your friend been hacked?  Embedded URLs − (Spear) Phishing Emails − PayPal scam etc. 12
  • 13. Visiting only reputable sites is completely safe  Advice such as ‘Do not visit risky websites’ − It is good advice  The converse is not necessary true − Reputable websites can be hacked − NBC Media website hacked, which installed fake antivirus software (Feb 2013). − msn.co.nz website hacked to re-directed to a site that hosts pictures of Bill Gates (MS) with pie on his face. − EA games web server hacked to host phishing website, users where asked to enter their Apple IDs and personal information. 13
  • 14. Malware in not a problem, I have nothing..  Malware is not a problem, I have nothing important on my PC  Even if your computer has nothing important stored on it − Address books can be used to send out spam and malicious emails − Malware can record all of your keystrokes and steal your usernames and passwords. When the malware authors have that information, they can use it to cause severe damage ranging from financial loss to identity theft.  Bank account details  Social media website to scam friends 14
  • 15. Reduce your Attack Surface  Browser − Use the latest browser − Update your security regularly − Browser controls  Games and Apps − Do you need those apps? − Where to get apps? 15
  • 16. Reduce your Attack Surface  Portable media − Two-thirds of lost USB drives carry malware – from a survey of USB drives in a lost and found department − Beware of USBs you find lying around − Malware infected USB drives handed out at a trade show 16
  • 17. Seven Effective Habits  You can’t disengage your brain  Be safe both at work and home  Update your software to include latest patches  Use the latest software  Don’t install software you don’t use  Be careful about the apps you download - Games etc.  Run with minimum privileges 17