JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Hands-On Ethical Hacking and Network Defense Chapter 3 Network and Computer Attacks.
Chapter Nine Maintaining a Computer Part III: Malware.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
What is it, how does it work, and why is it important?
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Asco. Prof. Dr. Sureswaran Ramadass Enterprise Network Monitoring and Security “iNet Enterprise”
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
 a crime committed on a computer network, esp. the Internet.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Types of Electronic Infection
Security at NCAR David Mitchell February 20th, 2007.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
W elcome to our Presentation. Presentation Topic Virus.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Network System Security - Task 2. Russell Johnston.
Chapter 40 Internet Security.
Instructor Materials Chapter 7 Network Security
Information Security Session October 24, 2005
Viruses and Virus Protection
King Saud University- College OF Applied Studies
Networking for Home and Small Businesses – Chapter 8
King Saud University- College OF Applied Studies
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Introduction to Internet Worm
Presentation transcript:

jEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha

Agenda  Problem Statement.  What is Worm  Worms Damage Effects  Cost of Worms  Solution  Technology

 Networks nowadays suffering from - Viruses, Worms. - Trojans, Spy-wares - Ad-wares, Hijackers, Pop generators - Spam, Intrusion and many more.  If you are connected to the internet (home, corporate) then, your machine is exposed to the Internet world. And hence you are vulnerable against Worms and Viruses.  Virus and Worm are the biggest contributors to today’s network problems. And thus, firewall and antivirus alone are not enough To protect your organization from the blended threats. The Problem

What is Worm? Worms are programs that replicate themselves from system to system without the use of a host file. Although worms generally exist inside of other files, often Word or Excel documents. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. is an example of a worm

Worms Damage Effects Once the host is infected, Worms can: Steal YOUR private info and distribute it to all the users in your database. Send dummy traffic to paralyze your network. Destroy key system files that would damage and crash your computer. Destroy database system within your server. Irrecoverably overwrites your personal files. Slows down your PC.

Cost of Worms Cost for cleanup of worms worldwide. Sobig: USD 37.1 billion MyDoom: USD 22.6 billion Klez: USD 19.8 billion Nachi: USD 13 billion Mimail: USD 11.5 billion Swen: USD 10.4 billion Love Bug: USD 8.8 billion Bugbear: USD 3.9 billion Source:

Cost for cleanup of worms in Malaysia. Code Red: RM 22 million Nimda: RM 22 million Blaster: RM 31 million Nachi: RM 31 million 90% of desktop computers in a Malaysian internet company experienced downtime caused by Blasted.D worm. (August 2003) Source: NISER study Cost of Worms…

What Do You Need? A holistic approach on the security strategies you currently have in place MUST be adopted To protect your organization from the new generation of blended Threats. A solution that covers loopholes left by other security products for an all round protection and able to detect internal worm attack as well as external. An updated Software with worm signatures armed with a warning, alerting mechanism to aware security team to take the proper action. Advising and Recommendation

What Do You Need? The Answer is m-Protect!! Easy to install and use. Low memory requirements. Detects worm activity on the wire. Live updates from m-Protect database server that consists of a comprehensive list of all known worms. Works passively to scan network traffic for worms. Alerts you of a potential worm attack via synthesized voice warning and visual messages as well as sms and s. Pinpoints the source of the computer that is broadcasting the worm packets. Works hand in hand with 3rd party anti – virus tools. Able to detect worms with multiple signatures. Detect inside/outside worm attacks.

Why m-Protect? m-Protect would alert everyone in the network regarding the worm attack  Locate source of the problem.  Provide possible solutions Besides propagation via the internet connection, Worms can still reach the internal network by:  laptops.  external media (cd, thumbdrive).  wireless access points.  encrypted/ zipped s. Border defenses is of no use if the worm is already inside the internal network.

m-Protect in action WARNING ALERT INFECTED Infected PC inside your LAN Border firewall Not Protected PC, now will originate the attack again

Computers without sufficient antivirus / patch will be infected. Such computers will create unwanted traffic in its attempts to infect others. All the network users will experience “network outage” m-Protect in action… Infected Network

Technology-Modules

Technology-Framework

Technology- Enterprise

Technology- Enterprise…

The Product…

Thank You Q&A