SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Computer Security
Going to Cover
• Hardware
• Software
• Malware
• Spam
• Physical Security
• Questions?
Hardware
• Firewall
• Unified Threat Management Device
Software
• Firewall
• Anti-Virus
• Anti-Spyware
• Anti-Spam
• Virus
• Trojan
• Worm
• Other Malware
Malware
• Where are the threats from
– Russian Mafia
– Triads
• When
– Websites (upto 80% of legitimate websites are infected
1in 150)
– P2P Software (Limewire)
• How?
– You may see a pop up
– You may see nothing
Where, When, How will I Know
Research by Kaspersky Lab in 2010 suggests that 1 in
every how many legitimate websites is infected by
malware?
50%
25%
20%
5%
0%
10%
20%
30%
40%
50%
60%
12 150 275 No response
PercentageofRespondents
• Payload
– Trojan
– Key Logger
– Browser Hijack
What happens
• Sorry I personally don’t believe you are.
– Apple’s penetration of the market
– The lack of security Products
• My advice is protect your mac now, by
installing a 3rd Party Anti-Virus product
I’m Safe I use a Mac
• unsolicited or undesired bulk electronic
messages. There are many types of electronic
spam.
• 50 – 80 % of all emails are Spam.
• Possibly used as a delivery method for Viruses,
worms etc.
• Using Bandwidth.
• Waste of Storage.
SPAM
Percentage of emails sent in April 2011 were classified
as SPAM?
5%
35%
50%
10%
0%
10%
20%
30%
40%
50%
60%
16.8% 58.7% 72.9% No response
PercentageofRespondents
• Use an effective anti – spam tool
– Piece of software installed locally
– Carried out at your ISP
– Or through a hosted service
• When using an address publically, use a
different address
• Hide email addresses in websites.
Spam – what you can do!
True or false – to stop receiving spam you should
always click the ‘unsubscribe’ link in the email?
15%
75%
10%
0%
10%
20%
30%
40%
50%
60%
70%
80%
TRUE FALSE No response
PercentageofRespondents
• Network Devices (Routers, Switches etc.)
• Hard Drive Failure
• End Result of Virus
• Accidental deletion
Physical Security
According to IDC statistics, what percentage of
businesses that suffer a major data loss cease trading
within 12 months?
45%
15%
25%
15%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Up to 30% Up to 50% Up to 70% No response
PercentageofRespondents
Any Questions?
• These measure can be thought of those similar to the ones we carry out on our cars (checking
lights, fluid levels etc.)
• Get information about what's new
• Sign up to receive notification when patches are available for the software you have
installed. You can usually do this by going to the manufacturer's Web site.
• Register new software. Software publishers can keep you informed about patches and updates.
You can opt in or opt out of other services they offer.
• Subscribe to free Microsoft product security bulletins. Microsoft offers an e-mail alert service for
home users, as well as one for IT Professionals and others with a strong understanding of technical
issues. (http://www.microsoft.com/technet/security/bulletin/notify.mspx)
• Install software updates immediately.
Regular Maintenance
• Back up your files. Backing up files helps you protect your information from accidental erasure or
from a hardware failure, as well as from damage by hackers. The more virulent types of attacks
damage or infect your hard drive and you can lose valuable personal information. When you back
up your files, make sure you:
– Have a recent backup before installing new software programs or updates.
– Use at least a couple of storage disks, to cut down on the risk of one disk becoming damaged or infected.
Write the backup date on the label.
– Verify that you can read the backup disk.
– Do store your backup disks away from your computer. If content is irreplaceable, consider a fireproof box or
a safe deposit box.
• Let your antivirus software scan your files. Schedule your antivirus software to conduct weekly
scans. It can scan data files, executable files, and system files in any combination. If an infection is
found, the antivirus software will repair or quarantine specific files. Contact your antivirus vendor's
Web site for further clean-up instructions.
• Check for software and antivirus signature updates. Software programs for which you are not
receiving automatic updates or notifications, check the software publishers' Web sites.
• Defragment your Hard Disk. Use the built in Disk defragmenter or a third party utility to keep your
hard drives contents organised, and help improve the drives performance.
Regular Maintenance (Weekly)
• Change your passwords. Keeping the same passwords increases the likelihood that
someone else will discover your password. (See
http://www.microsoft.com/protect/yourself/password/create.mspx)
• Verify that your antivirus subscription is current. Treat it like car insurance. Don't let it
lapse.
• Reassess your situation. Your security and privacy needs might have changed due to
who is using your computer, how it's being used, or new threats on the Internet.
• Tip:
• Use the Windows Task Scheduler to schedule routine file maintenance such as
automatic disk cleanup, disk defragmenter, and virus scans. Check the Windows Help
files for instructions.
• Automate your maintenance tasks
• Computers are good at this! For example, if you are using Windows XP, Windows Me, or
Windows 2000 SP3, you can receive automatic alerts about updates needed to help
maintain security and improve operation. Contact your software vendors to see what
automated services they provide
Regular Maintenance (6 Monthly)

Weitere ähnliche Inhalte

Was ist angesagt?

Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) Overview
Susan Rantall
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 

Was ist angesagt? (20)

Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) Overview
 
Vulnerability management today and tomorrow
Vulnerability management today and tomorrowVulnerability management today and tomorrow
Vulnerability management today and tomorrow
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
Penetration Testing Services, Penetration Testing
Penetration Testing Services, Penetration TestingPenetration Testing Services, Penetration Testing
Penetration Testing Services, Penetration Testing
 
SecPod Saner
SecPod SanerSecPod Saner
SecPod Saner
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 

Ähnlich wie Limbtec Computer Security Presentation

Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
Darshan Khant
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
Joel May
 

Ähnlich wie Limbtec Computer Security Presentation (20)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
anti_virus
anti_virusanti_virus
anti_virus
 
Internet security
Internet securityInternet security
Internet security
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
spyware
spyware spyware
spyware
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
Delivering Security Within the MAX Remote Management Platform - Todd HaughlandDelivering Security Within the MAX Remote Management Platform - Todd Haughland
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 

Limbtec Computer Security Presentation

  • 1.
  • 3. Going to Cover • Hardware • Software • Malware • Spam • Physical Security • Questions?
  • 4. Hardware • Firewall • Unified Threat Management Device
  • 5. Software • Firewall • Anti-Virus • Anti-Spyware • Anti-Spam
  • 6. • Virus • Trojan • Worm • Other Malware Malware
  • 7. • Where are the threats from – Russian Mafia – Triads • When – Websites (upto 80% of legitimate websites are infected 1in 150) – P2P Software (Limewire) • How? – You may see a pop up – You may see nothing Where, When, How will I Know
  • 8. Research by Kaspersky Lab in 2010 suggests that 1 in every how many legitimate websites is infected by malware? 50% 25% 20% 5% 0% 10% 20% 30% 40% 50% 60% 12 150 275 No response PercentageofRespondents
  • 9. • Payload – Trojan – Key Logger – Browser Hijack What happens
  • 10. • Sorry I personally don’t believe you are. – Apple’s penetration of the market – The lack of security Products • My advice is protect your mac now, by installing a 3rd Party Anti-Virus product I’m Safe I use a Mac
  • 11. • unsolicited or undesired bulk electronic messages. There are many types of electronic spam. • 50 – 80 % of all emails are Spam. • Possibly used as a delivery method for Viruses, worms etc. • Using Bandwidth. • Waste of Storage. SPAM
  • 12. Percentage of emails sent in April 2011 were classified as SPAM? 5% 35% 50% 10% 0% 10% 20% 30% 40% 50% 60% 16.8% 58.7% 72.9% No response PercentageofRespondents
  • 13. • Use an effective anti – spam tool – Piece of software installed locally – Carried out at your ISP – Or through a hosted service • When using an address publically, use a different address • Hide email addresses in websites. Spam – what you can do!
  • 14. True or false – to stop receiving spam you should always click the ‘unsubscribe’ link in the email? 15% 75% 10% 0% 10% 20% 30% 40% 50% 60% 70% 80% TRUE FALSE No response PercentageofRespondents
  • 15. • Network Devices (Routers, Switches etc.) • Hard Drive Failure • End Result of Virus • Accidental deletion Physical Security
  • 16. According to IDC statistics, what percentage of businesses that suffer a major data loss cease trading within 12 months? 45% 15% 25% 15% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Up to 30% Up to 50% Up to 70% No response PercentageofRespondents
  • 18. • These measure can be thought of those similar to the ones we carry out on our cars (checking lights, fluid levels etc.) • Get information about what's new • Sign up to receive notification when patches are available for the software you have installed. You can usually do this by going to the manufacturer's Web site. • Register new software. Software publishers can keep you informed about patches and updates. You can opt in or opt out of other services they offer. • Subscribe to free Microsoft product security bulletins. Microsoft offers an e-mail alert service for home users, as well as one for IT Professionals and others with a strong understanding of technical issues. (http://www.microsoft.com/technet/security/bulletin/notify.mspx) • Install software updates immediately. Regular Maintenance
  • 19. • Back up your files. Backing up files helps you protect your information from accidental erasure or from a hardware failure, as well as from damage by hackers. The more virulent types of attacks damage or infect your hard drive and you can lose valuable personal information. When you back up your files, make sure you: – Have a recent backup before installing new software programs or updates. – Use at least a couple of storage disks, to cut down on the risk of one disk becoming damaged or infected. Write the backup date on the label. – Verify that you can read the backup disk. – Do store your backup disks away from your computer. If content is irreplaceable, consider a fireproof box or a safe deposit box. • Let your antivirus software scan your files. Schedule your antivirus software to conduct weekly scans. It can scan data files, executable files, and system files in any combination. If an infection is found, the antivirus software will repair or quarantine specific files. Contact your antivirus vendor's Web site for further clean-up instructions. • Check for software and antivirus signature updates. Software programs for which you are not receiving automatic updates or notifications, check the software publishers' Web sites. • Defragment your Hard Disk. Use the built in Disk defragmenter or a third party utility to keep your hard drives contents organised, and help improve the drives performance. Regular Maintenance (Weekly)
  • 20. • Change your passwords. Keeping the same passwords increases the likelihood that someone else will discover your password. (See http://www.microsoft.com/protect/yourself/password/create.mspx) • Verify that your antivirus subscription is current. Treat it like car insurance. Don't let it lapse. • Reassess your situation. Your security and privacy needs might have changed due to who is using your computer, how it's being used, or new threats on the Internet. • Tip: • Use the Windows Task Scheduler to schedule routine file maintenance such as automatic disk cleanup, disk defragmenter, and virus scans. Check the Windows Help files for instructions. • Automate your maintenance tasks • Computers are good at this! For example, if you are using Windows XP, Windows Me, or Windows 2000 SP3, you can receive automatic alerts about updates needed to help maintain security and improve operation. Contact your software vendors to see what automated services they provide Regular Maintenance (6 Monthly)

Hinweis der Redaktion

  1. Virus – A Program that can infect other programs by modifying them to include a possibly evolved, copy of itself. Structure – Infection way or ways the virus spreads, Payload: what will it do, trigger: what causes the payload to deploy Trojan - A Program that does something undocumented that the programmer intended, but that some users would not approve of if they knew about it. Worm – is a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems (Usually via network connections) Other Malware –
  2. Threats from Russian Mafia, Chinese Triads. A lot of the threats are now from websites.
  3. Threats from Russian Mafia, Chinese Triads. A lot of the threats are now from websites.
  4. Threats from Russian Mafia, Chinese Triads. A lot of the threats are now from websites.
  5. Network Devices – West Mercia Police have arrested several people recently for stealing bandwidth. Did you know you are responsible for anything that goes on through your wireless connection? Make sure your wireless is secure, but also change the password that protects your equipment. Hard-drive failure – Back up your data, depending on whose figures you believe up to 80% of businesses that suffer a data loss cease trading within 12 months. Data loss could be the end result of a virus, but more likely accidental deletion will be the cause of data there are simple steps that can be taken on the latest versions of windows to prevent this being a problem.