Virus Protection Update

Slides:



Advertisements
Similar presentations
The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
Advertisements

Mr C Johnston ICT Teacher
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Bullet-Proofing Your Wireless Router By Steve Janss.
Fermilab VPN Service What is a VPN ?.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
LO2 Understand the key components used in networking
CERN’s Computer Security Challenge
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
ICT Standards and Guidelines The Structure of the Project Akram Najjar CNSI – Senior Consultant Director of InfoConsult.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
Open Source Software This permits users to use, change, and improve the software, and to redistribute it in modified or unmodified forms. It is very often.
Small Business Security Keith Slagle April 24, 2007.
Firewall Configurations Responses from the ETF (the names have been changed to protect the innocent..)
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
NetTech Solutions Protecting the Computer Lesson 10.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
WINS Monthly Meeting 5/7/2004 WINS Monthly Meeting 5/7/2004.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Doc.: IEEE /044r6 Submission January 2004 Al Petrick, IceFyre, Tim Godfrey, Intersil, Doug Hock Slide 1 Electronic Attendance and Server Update.
Doc.: IEEE /044r0 Submission January 2003 Al Petrick, IceFyre, Tim Godfrey, IntersilSlide 1 Electronic Attendance and Server Update Tim Godfrey.
Security Issues Introduction.. Security All the connectivity schemes you will hear about have security implications. –4 computer security incidents in.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Getting Connected to NGS while on the Road…
Three steps to prevent Malware infection
Top 5 Open Source Firewall Software for Linux User
Chapter 6 Application Hardening
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Business Risks of Insecure Networks
Electronic Attendance and Server Update
AVG Antivirus is specially designed and developed for Windows and Mac computers to provide a durable protection from various threats. If you are covered.
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
NTC 320 Education for Service-- snaptutorial.com
NTC 320 Teaching Effectively-- snaptutorial.com
Information Security Session October 24, 2005
Getting Connected to NGS while on the Road…
Networking for Home and Small Businesses – Chapter 8
E-Attendance E-Voting E – Members Database
Report of Voting Membership
Home Security in the Age of Broadband
IEEE P Working Group for Wireless Personal Area NetworksTM
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
IEEE WG Policies and Procedures Update
Designing IIS Security (IIS – Internet Information Service)
Tonight – Finishing off workshop
IEEE P Working Group for Wireless Personal Area NetworksTM
IEEE WG Policies and Procedures Update
Presentation transcript:

Virus Protection Update November 2003 Virus Protection Update Al Petrick – IceFyre Semiconductor Terry Cole –AMD Brian Mathews – AbsoluteValue Systems Tony Awtrey – Ideal Corporation Al Petrick, IceFyre Semiconductor

Summary of the Week 5% of the attendees – 48 client users November 2003 Summary of the Week 5% of the attendees – 48 client users Infected with Worms and Viruses Ideal Corporation trapped the clients by IP address and registered MAC addresses 11 of the 48 infected client users did NOT come forth with for correction 5 did not have any virus software installed Remaining did NOT have updates to Virus protection, Windows MS security updates, nor personal firewall updates All three are necessary!! Virus protect, Windows MS security pack updates, Firewall protection Al Petrick, IceFyre Semiconductor

Recommendation Continue to monitor the network for infected systems November 2003 Recommendation Continue to monitor the network for infected systems Make a change to 802wirelessworld.com home page informing members as a reminder to have the necessary updates to: 1) Virus protection 2) Microsoft security pack updates 3) Personal Firewall Continue to monitor the situation and inform the membership over the next 2 sessions If necessary ; propose a polices and procedure change to impose a more restrictive action Al Petrick, IceFyre Semiconductor