Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Corporate Account Takeover & Information Security Awareness PRESENTATION FOR BANK CUSTOMERS.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.
Security Advice Georgie Pepper Campsmount Acadamy.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
About Us Inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Offices.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. The.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
BUSINESS B1 Information Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Computer & Network Security
 a crime committed on a computer network, esp. the Internet.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu – Google First Workshop on Hot Topics in Understanding Botnets (HotBots.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Corporate Account Takeover & Information Security Awareness.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
BUILD SECURE PRODUCTS AND SERVICES
Managing Windows Security
Trend Micro Consumer 2010 Easy. Fast. Smart.
Protect Your Computer Against Harmful Attacks!
Fire-wall.
Presentation transcript:

Trend Micro Deployment Kelvin Hwang IT Services University of Windsor

Agenda  Definition of Malware  Malware Characteristics  Malware Evolution  Google’s Study  Challenges in Educational Environment  Solution - Web Reputation Service  Test & Results  Overall Experience  Enough Protection?  Questions ?

Definition of Malware A malicious software that is designed to specifically damage or disrupt a system, such as:  Virus  Worm  Trojan Horse  Bot

Malware Characteristics

Malware Evolution  Diskettes  Network shares  (e.g. LoveLetter worm)  Peer to Peer networks (P2P)  The World Wide Web Reasons: Malicious file size is getting bigger End users have more knowledge Use of Mobile code

Google’s Study The Ghost In The Browser – Analysis of Web- based Malware (Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc.) Google closely analyzed 4.5 million web pages over the course of a year (March 2006 – March 2007) and found that approximately 10 %, or 450,000, had the capability of installing malware without users' knowledge.

Challenges in Educational Environment  Academic Freedom. Campus community is sensitive to: Blocking Filtering Logging  Local Administrator Rights

Solution - Web Reputation Service Prevention is always better than treatment  Web Reputation works in real time to prevent both users and applications from accessing malicious or infiltrated websites  Credit check for Web sites (Check before visit)  Based on threats not categories

Solution - Web Reputation Service (Continue) Web site “reputation” score is assigned based on:  Threat Types 1. "a Web threat" 2. "very likely to be a Web threat" 3. "likely to be a Web threat"

Solution - Web Reputation Service (Continue)  Security Levels 1.High: Blocks URLs that are unrated, a Web threat, very likely to be a Web threat, or likely to be a Web threat 2.Medium: Blocks URLs that are unrated, a Web threat, or very likely to be a Web threat

Solution - Web Reputation Service (Continue) 3. Medium-low: Blocks URLs that are a Web threat or very likely to be a Web threat 4. Low: Blocks only URLs that are a Web threat

Test & Results Monday – Friday, 9AM – 3PM October 2007  15,000 URLs Blocked  41% reduction in the number of infected machines  81% reduction in the number of detected malware.  One unblock request

Overall Experience  Trend Micro deployment in 2002 (quarantined malware daily)  Add new protection without extra equipment: Intrusion Defense Firewall Plugin Trend Micro Security for Mac Plugin Mobil Security Plugin Virtual Desktop Support Plugin

Overall Experience (Continue)  Web Threat Protection (30,000 URLs blocked monthly)  Device Control to handle autorun virus  Helpdesk virus related calls: 2001 – 12 % (Before Trend Micro) 2009 – 0.4 % (Productivity increased)  Campus departments begin to use IT Services anti-virus solution

Enough Protection?  User Education OS & application updates Use anti-virus application & firewall Use different web browser Surfing carefully (Be careful with popup, plug-ins, warnings, links.…) Disable autorun  Security compliance monitoring

Questions ?