7 Effective Habits when using the Internet Philip O’Kane 1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
By Hiranmayi Pai Neeraj Jain
SECURITY CHECK Protecting Your System and Yourself Source:
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
Security for Today’s Threat Landscape Kat Pelak 1.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Safe Computing Practices. What is behind a cyber attack? 1.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
David Wigley HCC Security Architect Security Trends for 2016.
Computer Security Keeping you and your computer safe in the digital world.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Joseph J. Malone Security for Seniors Joseph J. Malone
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Cybersecurity Awareness
Computer Security.
Security in mobile technologies
Presentation transcript:

7 Effective Habits when using the Internet Philip O’Kane 1

Introduction Who are the players?  The Attackers  IT Support/Department  End-user Attack Surface  What is an attack surface  How well are you protected? Myths about Malware (Virus, Worm, Trojan, etc.) Seven Effective Habits 2

The Players 3

Attack Surface 4

Attacks The End-user PC is inside the firewall  It inherits the trusted status of the PC and can access sensitive information  Use privileged protocols to access data  Spread to others using privileged protocols  everyone in your contacts with malware attachments  Backdoor access – can send data to the attackers Used as part of a Botnet to attack others (DDOS) 5

Attacks on Corporates Bank Dbase hacked $45 Million in ATM (Dec 2013) RSA Security,40 million employee records stolen (March 2011) Sony's PlayStation Network (April 2011)  77 million accounts hacked  Sony site was down for a month 6

Attacks on the Individual Mobile Ransomware (2014) Spam s  PayPal (URLs). s with attachments  Zip, SCR, EXEC  CryptoLockers/Ransomware  Backdoors USB  Found or given a USB at a show 7

IT Departments/Defence Solutions Firewall configuration  Internet protocols  Open ports Patch Deployment  Centralised vulnerability remediation as exploitations are on the internet within 8 hours of patch deployment (Patch Tuesday) Permitting open policies for privileged user authority 70% of stolen data via USBs 8

Myths I will know when I’m infected Malware is just for Windows attachments from known persons are safe Visiting only reputable sites is completely safe Malware is not a problem, I have nothing important on my PC 9

I will know when I’m infected Malware Detection Rate over 30 Days 10 0->25%26->50%51->75%76->90%91->100% Key Day McAfee22%53%85%86% Kaspersky22%87%91%92% AVG13%85%92% 93% Virus Buster10%30%46%74% Symantec21%36%43%46%47% Trend Mirco17%29%32% 38% PoorGood "Cyveillance testing finds AV vendors detect on average less than 19% of malware attacks", Aug, 2010, of-malware-attacks. Zero Day

Malware is just for Windows Window is the biggest target  Windows 8 release - a firm announced a zero-day vulnerability that circumvents all new security enhancements in Windows 8 and Internet Explorer 10 Mobile phone  Study claims 614% increase last year.  Android accounts for 92% of total infections (June 2013) Apple Mac  Small volume of malware to date 11

attachments from known persons are safe Do not execute untrusted programs  Internet protocols  Open ports attachments  Who can you trust?  Has your friend been hacked? Embedded URLs  (Spear) Phishing s  PayPal scam etc. 12

Visiting only reputable sites is completely safe Advice such as ‘Do not visit risky websites’  It is good advice The converse is not necessary true  Reputable websites can be hacked  NBC Media website hacked, which installed fake antivirus software (Feb 2013).  msn.co.nz website hacked to re-directed to a site that hosts pictures of Bill Gates (MS) with pie on his face.  EA games web server hacked to host phishing website, users where asked to enter their Apple IDs and personal information. 13

Malware in not a problem, I have nothing.. Malware is not a problem, I have nothing important on my PC Even if your computer has nothing important stored on it  Address books can be used to send out spam and malicious s  Malware can record all of your keystrokes and steal your usernames and passwords. When the malware authors have that information, they can use it to cause severe damage ranging from financial loss to identity theft. Bank account details Social media website to scam friends 14

Reduce your Attack Surface Browser  Use the latest browser  Update your security regularly  Browser controls Games and Apps  Do you need those apps?  Where to get apps? 15

Reduce your Attack Surface Portable media  Two-thirds of lost USB drives carry malware – from a survey of USB drives in a lost and found department  Beware of USBs you find lying around  Malware infected USB drives handed out at a trade show 16

Seven Effective Habits You can’t disengage your brain Be safe both at work and home Update your software to include latest patches Use the latest software Don’t install software you don’t use Be careful about the apps you download - Games etc. Run with minimum privileges 17