3. What is Cyber Terrorism?
âą Online Scams âą Identity Theft
» Auctions : Selling and buying » Social Engineering
goods online has become
popular âą Forgery
» Security flaws
âą Fraud
» Credit-Cards ⹠Scams and Biometrics
» ATMâs and » Crime Fighting and Privacy
Telecommunications
âą Embezzlement and
Sabotage
» Insider Attacks
4. This is an International Problem..
âą International Trends in Cyber Crime
» Backdrop
âą Insecure Web Infrastructure, Constantly evolving
Technology
âą Cloud Computing, System Virtualization
âą Cyber Threats
» Malware, Intrusions, SPAM, Financial fraud
» Child exploitation
âą Social Websites, Trojans Attacks, Access Computer
resources
8. Integrated Threat Protection in Action
Problem:
Error message:
âDropsâ copy of itself on
âInnocentâ Video Link: system and attempts to
Redirects to malicious Website propagate
âOut of dateâ Flash player error:
âDownloadâ malware file
Solution:
Integrated Web Filtering
Blocks access to malicious Website
Network Antivirus
Blocks download of virus
Intrusion Protection
Blocks the spread of the worm
9. Integrated Threat Protection in Action
âą Application Control: Unwanted Services and P2P Limiting
Botnet command channel, compromised Facebook applications, independent of port or protocol
âą Intrusion Prevention: Vulnerabilities and Exploits
Browser and website attack code crafted by hackers and criminal gangs.
âą Web Filtering: Multiple categories and Malicious sites
Botnet command, phishing, search poisoning, inappropriate content
âą Vulnerability Management: Real time exploit updates
Multiple scanning points Firewall Gate, Analyzer, Web, DB, and Scan
âą Antispam: Unsolicited messages
Phishing, Malware, Social Engineering and Junk
âą Antivirus: All malicious code
Documents, macros, scripts, executable
Delivered via Web, Email, USB, Instant messaging, social networks, etc.
10. LHS Connections and Updates
#harsh_ jangra
#HackingTechnoS
Get Latest Facebook
Hacking &
Security Updates
Security Updates Connect with us
Subscribed on
Facebook.com/HackingTechn
Hands-On Labs LHS/ePaper ologies
Here is an example of our approach in action. This is the Koobface attack, which is still active in the wild.Starts as a link to a non-existent video on a malicious site sent via IM, email, or webmail. The first layer of protection is web filtering to block access to the site. If the user clicks on the link, he would receive a phony alert telling him his player is not working, and to download a non-existent new version on a malicious site. By clicking on the âOKâ button on the phony Error message, the user is actually instructing his system to install the virus. Antivirus protection would detect the file that the user is trying to install, and block itOnce installed, the worm would try to propagate. The IPS technology would detect the propagation effort, and block it before it could succeed.