SlideShare a Scribd company logo
All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.
The Truth About Viruses
on Power Systems
HelpSystems Corporate Overview. All rights reserved.
Your Presenter
Robin Tatam, CBCA CISM
Director of Security Technologies
+1 952-563-2768
robin.tatam@powertech.com
HelpSystems Corporate Overview. All rights reserved.
• What Are the Threats?
• Why Should We Act?
• Power System and Windows Viruses – Is My System at Risk?
• Virus Prevention and Protection
• PC-Based Scanning vs. Native Scanning
• Some Additional Myths Debunked
• Next Steps
Objectives
UP NEXT...
What are The Threats?
HelpSystems Corporate Overview. All rights reserved.
• Computer viruses
• Worms
• Trojan Horses
• Spyware & Adware
• Rootkit
• Ransomware
• Malware
• More…
Types of Threats
HelpSystems Corporate Overview. All rights reserved.
• Unauthorized applications (infected web links etc.)
• Code hidden and buried inside a different object
• A program that is masquerading as something else (usually
something innocent)
Source of Threats
HelpSystems Corporate Overview. All rights reserved.
• FBI warns that ransomware and malware attacks are growing
exponentially.
• 30% increase in ransomware victims in Q1 2016 compared to Q4
2015 (reported by security vendor Kaspersky Lab)
• 61% increase in the number of unique malware families over the
first half of 2016 (Check Point Software Technologies’ June Threat Index)
• Nearly 1 million malware threats are released every day (CNN, 2015)
• Viruses like Locky and CryptoLocker are mutating (CNBC, June 2016)
The Threat is Growing
HelpSystems Corporate Overview. All rights reserved.
The Threat is Ever Evolving
UP NEXT...
Why Should We Act?
HelpSystems Corporate Overview. All rights reserved.
Often, Because We Have No Choice
Why Do We Act?
HelpSystems Corporate Overview. All rights reserved.
Virus Protection and Regulatory Compliance
PCI DSS
Payment Card Industry Data Security Standard (PCI DSS)
Requirement 5
If you deal with payment card information, PCI DSS requires that all servers
in your network that are ‘in scope’ must have virus protection.
HelpSystems Corporate Overview. All rights reserved.
Virus Protection and Regulatory Compliance
HIPAA
Health Insurance Portability and Accountability Act (HIPAA)
§ 164.306 Security Standards: General Rules
 Ensure the confidentiality, integrity, and availability of all electronic
protected health information the covered entity creates, receives,
maintains, or transmits.
 Protect against any reasonably anticipated threats or hazards to the
security or integrity of such information.
 Implement security measures sufficient to reduce risks and
vulnerabilities to a reasonable and appropriate level.
HelpSystems Corporate Overview. All rights reserved.
Virus Protection and Regulatory Compliance
GLB Act
Gramm-Leach-Bliley Act
§ 501: Protection Of Nonpublic Personal Information
 To ensure the security and confidentiality of customer records and
information
 To protect against any anticipated threats or hazards to the security
or integrity of such records
 To protect against unauthorized access to or use of such records or
information which could result in substantial harm or inconvenience to
any customer
HelpSystems Corporate Overview. All rights reserved.
But We Should All Take Note
Why Do We Act?
HelpSystems Corporate Overview. All rights reserved.
• Not everyone has to deal with a formal compliance mandate
– Not publicly traded
– Don’t process credit card information
– No personally identifying information
• But virtually everyone uses computers to run line-of-business
applications and being infected with viruses can lead to:
– Disrupt service
– Corrupt data
– Infect other devices and servers
– Disclose credentials
Lest We Not Forget: “Best Practices”
HelpSystems Corporate Overview. All rights reserved.
• Infections can spread across the network
• Confidential files can be sent to third parties
• Costly downtime
• Loss of professional reputation
• Legal liability as a result of data breaches
• Loss of data
What if I Don’t Scan my Power System?
UP NEXT...
Power Systems and Windows Viruses
Is my system at risk?
HelpSystems Corporate Overview. All rights reserved.
Power Systems and Windows Viruses
How is my system at risk?
Myth: The majority of viruses exploit flaws in Microsoft Windows
where only a Windows-based PC can be harmed.
Fact: A virus doesn’t need to target a specific OS in order to wreak
havoc on your operations!
– An infected PC with connections to your Power Server can perform any
action for which that PC has authority.
 Files can be deleted
 Settings and objects can be modified
 Your server could be shut down!
HelpSystems Corporate Overview. All rights reserved.
Good
• Fact: Viruses cannot hide inside RPG and CL programs.
• Fact: Viruses cannot hide inside physical and logical files.
• Fact: IBM i cannot run .exe files [that may contain viruses].
Bad
• Fact: Viruses can hide inside Java and Unix stream files.
• Fact: IBM i can run Java and UNIX executables.
• Fact: A Virus can rename / delete / encrypt ‘native’ objects.
I was told IBM i was Immune?!
UP NEXT...
Virus Prevention and Protection
HelpSystems Corporate Overview. All rights reserved.
The following are all helpful security layers but cannot guarantee that
Power Servers will not become infected or operate as the “perfect
host”
• Mail scanning
• Virus scanning on PC clients and other servers
• Firewalls
• Ignoring the risk
Security Measures That Won’t Protect Your Power System
HelpSystems Corporate Overview. All rights reserved.
• Implement and enforce security policies.
• Shut down unused services.
• Avoid oversharing.
• Limit access to servers.
• Enable auditing.
• Monitor so you will know right away [timeliness is the key].
• Get good backups.
• Scan for viruses regularly.
Virus Protection For Your Power System
HelpSystems Corporate Overview. All rights reserved.
How to Implement Anti-Virus on IBM i
• Purchase and install an AV engine.
• Decide whether to perform real-time scanning, and scheduled scans.
• Integrate with IBM-supplied exit points [real-time].
• Configure QSCANFS and QSCANFSCTL system values.
• Configure job schedule entries for AV engine and signature updates.
• Review logs.
Done!
HelpSystems Corporate Overview. All rights reserved.
How to Implement Anti-Virus on AIX
• Purchase and install an AV engine.
• Schedule avupdate to retrieve daily signature updates.
• Schedule avscan to perform scan on desired directories.
• Scheduling on AIX can be done with cron tab, or a third party scheduler
such as HelpSystems’ popular SkyBot Scheduler software.
• Review logs.
Done!
HelpSystems Corporate Overview. All rights reserved.
• Update virus signature files often! (Daily updates from McAfee)
• Schedule weekly “full” scans of files and directories.
• Schedule daily scans if a directory contains sensitive files.
• Review logs for scan results.
Anti-virus Best Practices
UP NEXT...
PC-Based Scanning vs. Native Scanning
Why security experts recommend a native scanning solution
HelpSystems Corporate Overview. All rights reserved.
PC-Based Scanning vs. Native Scanning
PC-based scanning
• Requires leaving a PC signed on
with full authority, compromising its
security and integrity
• The scanning PC can infect the
server with viruses
• The entire Power System is visible
to a virus or malicious code
Native virus scanning
• Doesn’t require an outside
connection with admin authority
• No data is transferred over the
network unencrypted
• Native solutions are not vulnerable
to virus infections or disablement
PC-based virus scanning creates security concerns
HelpSystems Corporate Overview. All rights reserved.
PC-Based Scanning vs. Native Scanning
PC-based scanning
• Power systems use file structures
not found on Windows that can
cause non-native scans to fail
• Pop-up failure alerts require human
monitoring and intervention
throughout the scanning process
• Very manual effort
Native virus scanning
• All files can be scanned easily
• No additional hardware is required
• All detected threats will be removed
• Can run fully automated
PC-based scanning isn’t reliable
HelpSystems Corporate Overview. All rights reserved.
PC-Based Scanning vs. Native Scanning
PC-based scanning
• There are a number of problems
with PC-based scanning solutions
that cause the scanning process to
stop.
– lost connections
– pop-up warning messages
– lost power
Native virus scanning
• Stability concerns simply aren’t an
issue when you use software that’s
running natively on your system.
Native virus scanning eliminates stability problems
HelpSystems Corporate Overview. All rights reserved.
PC-Based Scanning vs. Native Scanning
PC-based scanning
• Can be incredibly slow and
increases network load dramatically
 Transfer data from Power System to PC
 Scan the data
 Transfer the data back to the Power System
• PC scanning resets the files’ “last
access time” after scanning so all
scanned files will be unnecessarily
saved and backups will take longer
as a result.
Native virus scanning
• Do not increase your network load,
allowing for more frequent and fast
scanning
• Native scanning programs know
how to treat files and mark them
properly
• Can be triggered to run only when a
scan is necessary.
 Upon alteration of an object
 On-demand
 Via job schedulers
Virus scanning from a PC creates performance problems
UP NEXT...
The Truth About Viruses on Power Systems
Myths vs. Facts
HelpSystems Corporate Overview. All rights reserved.
Myth: We don’t use IBM i’s Integrated File System (IFS).
Fact: Most modern applications and protocols use the IFS extensively.
Myth: The Power System cannot get a virus.
Fact: Viruses can hide inside PC and Unix files, and Java Executables.
Myth: Viruses can’t attack the system architecture.
Fact: Anything an administrator can do, a virus can do.
Myths vs. Facts
HelpSystems Corporate Overview. All rights reserved.
Myth: Our Power System isn’t connected to the internet.
Fact: The cable doesn’t have to be physically connected. The Power
System isn’t an island if it’s on the network.
Myth: Our firewall protects us from viruses.
Fact: There is no single solution on any platform that gives you 100%
protection, including firewalls.
Myth: I can scan the Power System with my PC virus scanner.
Fact: PC-based solutions can be used but they may miss files, require
a manual process, and open many security holes.
Myths vs. Facts
UP NEXT...
Next Steps…
HelpSystems Corporate Overview. All rights reserved.
StandGuard Anti-Virus
HelpSystems Corporate Overview. All rights reserved.
StandGuard Anti-Virus
HelpSystems Corporate Overview. All rights reserved.
• Decompress and scan compressed files
• Detects Macros and script viruses
• Detects encrypted and polymorphic viruses
• Detects new viruses in executable files
• Detects “Trojan horses,” worms, and other kinds of malicious software
• Upgrades easily for new anti-virus technology
Why McAfee Commercial Scan Engine
HelpSystems Corporate Overview. All rights reserved.
Native Virus Scanning for Power Systems
HelpSystems StandGuard Anti-Virus
 System values and exit points unlock native anti-virus scanning
capabilities within IBM i.
 StandGuard Anti-Virus is the only commercial-grade anti-virus
engine for IBM i and is powered by McAfee (a division of Intel)
ensuring ongoing virus signatures and scan engine updates.
 Discover the performance and integrity advantages of native
scanning versus remote scanning.
 Benefit from real-time protection, as well as scheduled and on
demand scans.
 Access virus removal and quarantine functions.
 Scan IBM i, AIX, Linux (x86) and Lotus Domino databases
HelpSystems Corporate Overview. All rights reserved.
Be Comprehensive
HelpSystems Corporate Overview. All rights reserved.
HelpSystems At-A-Glance
HelpSystems Corporate Overview. All rights reserved.
• Expansive Software Portfolio, including Anti-Virus for Power Servers.
• Comprehensive Professional Services.
• World-Class Security Experts:
– Robin Tatam, CISM
– Carol Woodbury, CRISC
• Member of PCI Security Standards Council.
• Authorized by NASBA to Issue CPE Credits for Security Education.
• Publisher of the Annual “State of IBM i Security” Report.
About HelpSystems’ Security Investment
UP NEXT...
Questions

More Related Content

What's hot

Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Information Security Awareness Group
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
Digital Bond
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
EnclaveSecurity
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your Enterprise
BeyondTrust
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Qualys
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
AlienVault
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
Erdem Erdogan
 
Otx introduction sw
Otx introduction swOtx introduction sw
Otx introduction sw
AlienVault
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
Symantec
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
EnclaveSecurity
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
Tim Wright
 
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseThe CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for Defense
EnclaveSecurity
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Symantec
 
Security Framework from SANS
Security Framework from SANSSecurity Framework from SANS
Security Framework from SANS
Jeffrey Reed
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
AlienVault
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
AlienVault
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVault
AlienVault
 
Daddy Thwane. CV
Daddy Thwane. CVDaddy Thwane. CV
Daddy Thwane. CV
Daddy Jonathan Thwane
 
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacks
Paresh Thakkar
 
Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
Venkat Alagarsamy
 

What's hot (20)

Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your Enterprise
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
Otx introduction sw
Otx introduction swOtx introduction sw
Otx introduction sw
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
 
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseThe CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for Defense
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
Security Framework from SANS
Security Framework from SANSSecurity Framework from SANS
Security Framework from SANS
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVault
 
Daddy Thwane. CV
Daddy Thwane. CVDaddy Thwane. CV
Daddy Thwane. CV
 
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacks
 
Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
 

Similar to The Truth About Viruses on Power Systems - Powertech

Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
AlienVault
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
David Perkins
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
qacaybagirovv
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
ChristoanSmit
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
Adeo Security
 
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and complianceAzure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and compliance
Asaf Nakash
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
9 - Security
9 - Security9 - Security
9 - Security
Raymond Gao
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
Precisely
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
limsh
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Geevarghese Titus
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
FRSecure
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
Uditha Bandara Wijerathna
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Cyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptxCyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptx
TikdiPatel
 

Similar to The Truth About Viruses on Power Systems - Powertech (20)

Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and complianceAzure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and compliance
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
9 - Security
9 - Security9 - Security
9 - Security
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Cyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptxCyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptx
 

More from HelpSystems

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
HelpSystems
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
HelpSystems
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
HelpSystems
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
HelpSystems
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
HelpSystems
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
HelpSystems
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
HelpSystems
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
HelpSystems
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
HelpSystems
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
HelpSystems
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
HelpSystems
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
HelpSystems
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
HelpSystems
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
HelpSystems
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
HelpSystems
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
HelpSystems
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
HelpSystems
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
HelpSystems
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
HelpSystems
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
HelpSystems
 

More from HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Recently uploaded

Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Mobile app Development Services | Drona Infotech
Mobile app Development Services  | Drona InfotechMobile app Development Services  | Drona Infotech
Mobile app Development Services | Drona Infotech
Drona Infotech
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
devvsandy
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 

Recently uploaded (20)

Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Mobile app Development Services | Drona Infotech
Mobile app Development Services  | Drona InfotechMobile app Development Services  | Drona Infotech
Mobile app Development Services | Drona Infotech
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 

The Truth About Viruses on Power Systems - Powertech

  • 1. All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved. The Truth About Viruses on Power Systems
  • 2. HelpSystems Corporate Overview. All rights reserved. Your Presenter Robin Tatam, CBCA CISM Director of Security Technologies +1 952-563-2768 robin.tatam@powertech.com
  • 3. HelpSystems Corporate Overview. All rights reserved. • What Are the Threats? • Why Should We Act? • Power System and Windows Viruses – Is My System at Risk? • Virus Prevention and Protection • PC-Based Scanning vs. Native Scanning • Some Additional Myths Debunked • Next Steps Objectives
  • 4. UP NEXT... What are The Threats?
  • 5. HelpSystems Corporate Overview. All rights reserved. • Computer viruses • Worms • Trojan Horses • Spyware & Adware • Rootkit • Ransomware • Malware • More… Types of Threats
  • 6. HelpSystems Corporate Overview. All rights reserved. • Unauthorized applications (infected web links etc.) • Code hidden and buried inside a different object • A program that is masquerading as something else (usually something innocent) Source of Threats
  • 7. HelpSystems Corporate Overview. All rights reserved. • FBI warns that ransomware and malware attacks are growing exponentially. • 30% increase in ransomware victims in Q1 2016 compared to Q4 2015 (reported by security vendor Kaspersky Lab) • 61% increase in the number of unique malware families over the first half of 2016 (Check Point Software Technologies’ June Threat Index) • Nearly 1 million malware threats are released every day (CNN, 2015) • Viruses like Locky and CryptoLocker are mutating (CNBC, June 2016) The Threat is Growing
  • 8. HelpSystems Corporate Overview. All rights reserved. The Threat is Ever Evolving
  • 10. HelpSystems Corporate Overview. All rights reserved. Often, Because We Have No Choice Why Do We Act?
  • 11. HelpSystems Corporate Overview. All rights reserved. Virus Protection and Regulatory Compliance PCI DSS Payment Card Industry Data Security Standard (PCI DSS) Requirement 5 If you deal with payment card information, PCI DSS requires that all servers in your network that are ‘in scope’ must have virus protection.
  • 12. HelpSystems Corporate Overview. All rights reserved. Virus Protection and Regulatory Compliance HIPAA Health Insurance Portability and Accountability Act (HIPAA) § 164.306 Security Standards: General Rules  Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity creates, receives, maintains, or transmits.  Protect against any reasonably anticipated threats or hazards to the security or integrity of such information.  Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.
  • 13. HelpSystems Corporate Overview. All rights reserved. Virus Protection and Regulatory Compliance GLB Act Gramm-Leach-Bliley Act § 501: Protection Of Nonpublic Personal Information  To ensure the security and confidentiality of customer records and information  To protect against any anticipated threats or hazards to the security or integrity of such records  To protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer
  • 14. HelpSystems Corporate Overview. All rights reserved. But We Should All Take Note Why Do We Act?
  • 15. HelpSystems Corporate Overview. All rights reserved. • Not everyone has to deal with a formal compliance mandate – Not publicly traded – Don’t process credit card information – No personally identifying information • But virtually everyone uses computers to run line-of-business applications and being infected with viruses can lead to: – Disrupt service – Corrupt data – Infect other devices and servers – Disclose credentials Lest We Not Forget: “Best Practices”
  • 16. HelpSystems Corporate Overview. All rights reserved. • Infections can spread across the network • Confidential files can be sent to third parties • Costly downtime • Loss of professional reputation • Legal liability as a result of data breaches • Loss of data What if I Don’t Scan my Power System?
  • 17. UP NEXT... Power Systems and Windows Viruses Is my system at risk?
  • 18. HelpSystems Corporate Overview. All rights reserved. Power Systems and Windows Viruses How is my system at risk? Myth: The majority of viruses exploit flaws in Microsoft Windows where only a Windows-based PC can be harmed. Fact: A virus doesn’t need to target a specific OS in order to wreak havoc on your operations! – An infected PC with connections to your Power Server can perform any action for which that PC has authority.  Files can be deleted  Settings and objects can be modified  Your server could be shut down!
  • 19. HelpSystems Corporate Overview. All rights reserved. Good • Fact: Viruses cannot hide inside RPG and CL programs. • Fact: Viruses cannot hide inside physical and logical files. • Fact: IBM i cannot run .exe files [that may contain viruses]. Bad • Fact: Viruses can hide inside Java and Unix stream files. • Fact: IBM i can run Java and UNIX executables. • Fact: A Virus can rename / delete / encrypt ‘native’ objects. I was told IBM i was Immune?!
  • 20. UP NEXT... Virus Prevention and Protection
  • 21. HelpSystems Corporate Overview. All rights reserved. The following are all helpful security layers but cannot guarantee that Power Servers will not become infected or operate as the “perfect host” • Mail scanning • Virus scanning on PC clients and other servers • Firewalls • Ignoring the risk Security Measures That Won’t Protect Your Power System
  • 22. HelpSystems Corporate Overview. All rights reserved. • Implement and enforce security policies. • Shut down unused services. • Avoid oversharing. • Limit access to servers. • Enable auditing. • Monitor so you will know right away [timeliness is the key]. • Get good backups. • Scan for viruses regularly. Virus Protection For Your Power System
  • 23. HelpSystems Corporate Overview. All rights reserved. How to Implement Anti-Virus on IBM i • Purchase and install an AV engine. • Decide whether to perform real-time scanning, and scheduled scans. • Integrate with IBM-supplied exit points [real-time]. • Configure QSCANFS and QSCANFSCTL system values. • Configure job schedule entries for AV engine and signature updates. • Review logs. Done!
  • 24. HelpSystems Corporate Overview. All rights reserved. How to Implement Anti-Virus on AIX • Purchase and install an AV engine. • Schedule avupdate to retrieve daily signature updates. • Schedule avscan to perform scan on desired directories. • Scheduling on AIX can be done with cron tab, or a third party scheduler such as HelpSystems’ popular SkyBot Scheduler software. • Review logs. Done!
  • 25. HelpSystems Corporate Overview. All rights reserved. • Update virus signature files often! (Daily updates from McAfee) • Schedule weekly “full” scans of files and directories. • Schedule daily scans if a directory contains sensitive files. • Review logs for scan results. Anti-virus Best Practices
  • 26. UP NEXT... PC-Based Scanning vs. Native Scanning Why security experts recommend a native scanning solution
  • 27. HelpSystems Corporate Overview. All rights reserved. PC-Based Scanning vs. Native Scanning PC-based scanning • Requires leaving a PC signed on with full authority, compromising its security and integrity • The scanning PC can infect the server with viruses • The entire Power System is visible to a virus or malicious code Native virus scanning • Doesn’t require an outside connection with admin authority • No data is transferred over the network unencrypted • Native solutions are not vulnerable to virus infections or disablement PC-based virus scanning creates security concerns
  • 28. HelpSystems Corporate Overview. All rights reserved. PC-Based Scanning vs. Native Scanning PC-based scanning • Power systems use file structures not found on Windows that can cause non-native scans to fail • Pop-up failure alerts require human monitoring and intervention throughout the scanning process • Very manual effort Native virus scanning • All files can be scanned easily • No additional hardware is required • All detected threats will be removed • Can run fully automated PC-based scanning isn’t reliable
  • 29. HelpSystems Corporate Overview. All rights reserved. PC-Based Scanning vs. Native Scanning PC-based scanning • There are a number of problems with PC-based scanning solutions that cause the scanning process to stop. – lost connections – pop-up warning messages – lost power Native virus scanning • Stability concerns simply aren’t an issue when you use software that’s running natively on your system. Native virus scanning eliminates stability problems
  • 30. HelpSystems Corporate Overview. All rights reserved. PC-Based Scanning vs. Native Scanning PC-based scanning • Can be incredibly slow and increases network load dramatically  Transfer data from Power System to PC  Scan the data  Transfer the data back to the Power System • PC scanning resets the files’ “last access time” after scanning so all scanned files will be unnecessarily saved and backups will take longer as a result. Native virus scanning • Do not increase your network load, allowing for more frequent and fast scanning • Native scanning programs know how to treat files and mark them properly • Can be triggered to run only when a scan is necessary.  Upon alteration of an object  On-demand  Via job schedulers Virus scanning from a PC creates performance problems
  • 31. UP NEXT... The Truth About Viruses on Power Systems Myths vs. Facts
  • 32. HelpSystems Corporate Overview. All rights reserved. Myth: We don’t use IBM i’s Integrated File System (IFS). Fact: Most modern applications and protocols use the IFS extensively. Myth: The Power System cannot get a virus. Fact: Viruses can hide inside PC and Unix files, and Java Executables. Myth: Viruses can’t attack the system architecture. Fact: Anything an administrator can do, a virus can do. Myths vs. Facts
  • 33. HelpSystems Corporate Overview. All rights reserved. Myth: Our Power System isn’t connected to the internet. Fact: The cable doesn’t have to be physically connected. The Power System isn’t an island if it’s on the network. Myth: Our firewall protects us from viruses. Fact: There is no single solution on any platform that gives you 100% protection, including firewalls. Myth: I can scan the Power System with my PC virus scanner. Fact: PC-based solutions can be used but they may miss files, require a manual process, and open many security holes. Myths vs. Facts
  • 35. HelpSystems Corporate Overview. All rights reserved. StandGuard Anti-Virus
  • 36. HelpSystems Corporate Overview. All rights reserved. StandGuard Anti-Virus
  • 37. HelpSystems Corporate Overview. All rights reserved. • Decompress and scan compressed files • Detects Macros and script viruses • Detects encrypted and polymorphic viruses • Detects new viruses in executable files • Detects “Trojan horses,” worms, and other kinds of malicious software • Upgrades easily for new anti-virus technology Why McAfee Commercial Scan Engine
  • 38. HelpSystems Corporate Overview. All rights reserved. Native Virus Scanning for Power Systems HelpSystems StandGuard Anti-Virus  System values and exit points unlock native anti-virus scanning capabilities within IBM i.  StandGuard Anti-Virus is the only commercial-grade anti-virus engine for IBM i and is powered by McAfee (a division of Intel) ensuring ongoing virus signatures and scan engine updates.  Discover the performance and integrity advantages of native scanning versus remote scanning.  Benefit from real-time protection, as well as scheduled and on demand scans.  Access virus removal and quarantine functions.  Scan IBM i, AIX, Linux (x86) and Lotus Domino databases
  • 39. HelpSystems Corporate Overview. All rights reserved. Be Comprehensive
  • 40. HelpSystems Corporate Overview. All rights reserved. HelpSystems At-A-Glance
  • 41. HelpSystems Corporate Overview. All rights reserved. • Expansive Software Portfolio, including Anti-Virus for Power Servers. • Comprehensive Professional Services. • World-Class Security Experts: – Robin Tatam, CISM – Carol Woodbury, CRISC • Member of PCI Security Standards Council. • Authorized by NASBA to Issue CPE Credits for Security Education. • Publisher of the Annual “State of IBM i Security” Report. About HelpSystems’ Security Investment