Digital Threats From PC to Cell Phone By Dr.Tapan Sengupta
Digital Threats <ul><li>All computers connected to network are at risk of digital threats </li></ul><ul><li>Extent of thre...
Vulnerabilities <ul><li>Flaws in computer software that create weaknesses in the overall security of the computer or netwo...
Activities Leading to a Threat <ul><li>Web Surfing </li></ul><ul><li>Communication- email, messaging </li></ul><ul><li>Tra...
What Are The Common Threats   The basic types <ul><li>Virus </li></ul><ul><li>Does not propagate of its own </li></ul><ul>...
What A The Common Types Of Threats <ul><li>Spyware </li></ul><ul><li>Adware </li></ul><ul><li>Trojan Horses </li></ul><ul>...
What A The Common Types Of Threats <ul><li>Spam </li></ul><ul><li>Phishing </li></ul><ul><li>Pharming </li></ul><ul><li>Cr...
Misleading Application <ul><li>Misleading applications,  trick consumers into believing a problem exists on their system. ...
Known Misleading Application <ul><li>Win Fixer </li></ul><ul><li>Ultimate Defender </li></ul><ul><li>SpySheriff </li></ul>...
Known Misleading Application <ul><li>AVSystemCare </li></ul><ul><li>1stAntiVirus </li></ul><ul><li>VirusBurst </li></ul><u...
Anatomy Of A Typical Malware Malware Server Keyboard Logger Etc. Infected PC Network Keyboard Logger Etc. Un-infected PC M...
What Can These Malware Do? <ul><li>Destroy or modify your file system </li></ul><ul><li>Hijack your browser </li></ul><ul>...
Danger vs. Annoyance <ul><li>E-mail: Watch attachments, not spams </li></ul><ul><li>The Internet: Watch downloads not pop-...
What To Do? <ul><li>Keep software and security patches up to date </li></ul><ul><li>Pre-condition for this is to have a le...
What To Do? <ul><li>Apply latest patches(PTFs) </li></ul><ul><li>Configure security settings for operating system, interne...
What To Do? <ul><li>Develop personal security policies for online behavior  </li></ul><ul><li>Install a proactive security...
Personal Security Policy  <ul><li>Have email attachments scanned prior to opening </li></ul><ul><li>Delete all unwanted me...
Personal Security Policy  <ul><li>Reject all Instant Messages from persons who are not on your list </li></ul><ul><li>Do n...
Personal Security Policy <ul><li>Scan all files with an Internet Security solution before transferring them to your system...
Personal Security Policy <ul><li>Be especially cautious when clicking on pop-up advertisements </li></ul><ul><li>Do not re...
LAST BUT NOT THE LEAST <ul><li>Backup your files regularly </li></ul>
Security Software <ul><li>The software that I use </li></ul><ul><li>Anti-virus AVG free edition </li></ul><ul><li>Malware ...
Wireless SOHO Network Router Configuration <ul><li>Change Router’s default password </li></ul><ul><li>Implement system sec...
Virus on cell phone <ul><li>First virus ‘Cabir’ was a research project </li></ul><ul><li>‘Cabir’ got twisted around and ne...
Virus on cell phone What to do <ul><li>Turn off Bluetooth discoverable mode. Set your phone to &quot;hidden&quot; so other...
<ul><li>Question any one? </li></ul>
Upcoming SlideShare
Loading in …5
×

Presented to Compass

706 views

Published on

The presentation talks about how to keep internet connected workstations clean and secured

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
706
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
31
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Presented to Compass

  1. 1. Digital Threats From PC to Cell Phone By Dr.Tapan Sengupta
  2. 2. Digital Threats <ul><li>All computers connected to network are at risk of digital threats </li></ul><ul><li>Extent of threat depends the usage of the PC </li></ul><ul><li>Even a stand-alone PC is not risk free </li></ul>
  3. 3. Vulnerabilities <ul><li>Flaws in computer software that create weaknesses in the overall security of the computer or network. </li></ul><ul><li>Improper computer or security configurations. </li></ul><ul><li>Threats exploit the weaknesses of vulnerabilities resulting in potential damage to the computer or personal data. </li></ul>
  4. 4. Activities Leading to a Threat <ul><li>Web Surfing </li></ul><ul><li>Communication- email, messaging </li></ul><ul><li>Transaction ( banking, shopping) </li></ul><ul><li>File Sharing( data, photo,video) </li></ul>
  5. 5. What Are The Common Threats The basic types <ul><li>Virus </li></ul><ul><li>Does not propagate of its own </li></ul><ul><li>Replicate itself within a single machine </li></ul><ul><li>Spread only thru human interaction </li></ul><ul><li>Worms </li></ul><ul><li>Use network to propagate itself </li></ul><ul><li>Replicate anywhere </li></ul><ul><li>Spread much faster than virus </li></ul>
  6. 6. What A The Common Types Of Threats <ul><li>Spyware </li></ul><ul><li>Adware </li></ul><ul><li>Trojan Horses </li></ul><ul><li>Bots & Botnets ( Blended threat) </li></ul>
  7. 7. What A The Common Types Of Threats <ul><li>Spam </li></ul><ul><li>Phishing </li></ul><ul><li>Pharming </li></ul><ul><li>Crimeware </li></ul>
  8. 8. Misleading Application <ul><li>Misleading applications, trick consumers into believing a problem exists on their system. Consumers who trust the messages are tricked into purchasing bogus applications for resolution of bogus problems </li></ul><ul><li>Sometimes these applications introduce Malware into your system </li></ul>
  9. 9. Known Misleading Application <ul><li>Win Fixer </li></ul><ul><li>Ultimate Defender </li></ul><ul><li>SpySheriff </li></ul><ul><li>MalwareWipe </li></ul><ul><li>DriveCleaner </li></ul><ul><li>AVSystemCare </li></ul>
  10. 10. Known Misleading Application <ul><li>AVSystemCare </li></ul><ul><li>1stAntiVirus </li></ul><ul><li>VirusBurst </li></ul><ul><li>SpywareQuake </li></ul><ul><li>AntispywareSoldier </li></ul>
  11. 11. Anatomy Of A Typical Malware Malware Server Keyboard Logger Etc. Infected PC Network Keyboard Logger Etc. Un-infected PC Malware Account number Credit Card Info User Id, password etc. Step-1 Step-2
  12. 12. What Can These Malware Do? <ul><li>Destroy or modify your file system </li></ul><ul><li>Hijack your browser </li></ul><ul><li>Steal your identity </li></ul><ul><li>Make your machine crawl </li></ul><ul><li>Use your credit card, bank account </li></ul><ul><li>Popup ads </li></ul><ul><li>Flood your mail box </li></ul>
  13. 13. Danger vs. Annoyance <ul><li>E-mail: Watch attachments, not spams </li></ul><ul><li>The Internet: Watch downloads not pop-ups </li></ul><ul><li>Data Protection: Worry about backups before hackers </li></ul>
  14. 14. What To Do? <ul><li>Keep software and security patches up to date </li></ul><ul><li>Pre-condition for this is to have a legal copy of the operating system </li></ul>
  15. 15. What To Do? <ul><li>Apply latest patches(PTFs) </li></ul><ul><li>Configure security settings for operating system, internet browser and security software </li></ul><ul><ul><li>Use a good Anti-virus program </li></ul></ul><ul><ul><li>Use a well configured firewall </li></ul></ul><ul><ul><li>Use Multiple anti-malware software </li></ul></ul>
  16. 16. What To Do? <ul><li>Develop personal security policies for online behavior </li></ul><ul><li>Install a proactive security solution to block threats targeting vulnerabilities </li></ul><ul><li>Pay special attention to in configuring firewall </li></ul>
  17. 17. Personal Security Policy <ul><li>Have email attachments scanned prior to opening </li></ul><ul><li>Delete all unwanted messages without opening </li></ul><ul><li>If you suspect an email is Spam, do not respond, delete it </li></ul>
  18. 18. Personal Security Policy <ul><li>Reject all Instant Messages from persons who are not on your list </li></ul><ul><li>Do not click on URL links within IM unless from a trusted source </li></ul><ul><li>Never answer to the requests for confidential information via email or Instant Message </li></ul>
  19. 19. Personal Security Policy <ul><li>Scan all files with an Internet Security solution before transferring them to your system </li></ul><ul><li>Only transfer files from a well known source </li></ul><ul><li>Use Security Software to block all unsolicited outbound communication </li></ul>
  20. 20. Personal Security Policy <ul><li>Be especially cautious when clicking on pop-up advertisements </li></ul><ul><li>Do not respond to pop-up ads promoting system security or performance tools </li></ul><ul><li>Do not accept or open suspicious error dialogs from within the browser </li></ul>
  21. 21. LAST BUT NOT THE LEAST <ul><li>Backup your files regularly </li></ul>
  22. 22. Security Software <ul><li>The software that I use </li></ul><ul><li>Anti-virus AVG free edition </li></ul><ul><li>Malware AdAware free edition </li></ul><ul><li>SpyBot, S&D </li></ul><ul><li>Windows Defender </li></ul><ul><li>CWshreder </li></ul><ul><li>Firewall Zone Alarm free </li></ul><ul><li>Note: 1, 3 and 4 run on a nightly schedule, </li></ul>
  23. 23. Wireless SOHO Network Router Configuration <ul><li>Change Router’s default password </li></ul><ul><li>Implement system security </li></ul><ul><li>Wep, 64bit recommended </li></ul><ul><li>Rotate the default transmit key </li></ul><ul><li>Disable SS ID Broadcast </li></ul><ul><li>Disable Remote Management </li></ul><ul><li>Enable router’s built-in firwall </li></ul>
  24. 24. Virus on cell phone <ul><li>First virus ‘Cabir’ was a research project </li></ul><ul><li>‘Cabir’ got twisted around and new viruses were created </li></ul><ul><li>Virus, worm – same concepts as PCs </li></ul><ul><li>Propagates thru Blue Tooth </li></ul><ul><li>Propagates thru MMS </li></ul>
  25. 25. Virus on cell phone What to do <ul><li>Turn off Bluetooth discoverable mode. Set your phone to &quot;hidden&quot; so other phones can't detect it and send it the virus. </li></ul><ul><li>Check security updates to learn about filenames you should keep an eye out for. </li></ul><ul><li>Download only from trusted environment </li></ul>
  26. 26. <ul><li>Question any one? </li></ul>

×