Secure Design Principles CSC 482/582: Computer SecuritySlide #1.
03 secure the computer
-
Upload
ministry-of-education-malaysia -
Category
Internet
-
view
110 -
download
0
Transcript of 03 secure the computer
![Page 1: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/1.jpg)
Copyright © 2014 CyberSecurity Malaysia
Secure the Computer
![Page 2: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/2.jpg)
2
Nowadays, everyone has computers, digitaldata, online identity and account credentials.Not everyone is serious about security.
But malicious hackers are constantly looking forweaknesses of their prey in order tosuccessfully execute their malicious activities onthe internet.
In this session, we’ll examine our commonmistakes and how hackers exploit that mistakes.
Let us think likes HACKERS!
Introduction
![Page 3: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/3.jpg)
3
Goals
Hackers’ PerspectiveHackers are constantly finding for theweakness of each components toensure the success of malicious attack
Users’ PerspectiveMost users are more focused on howto use computer to do their daily tasksbut not so much about their security
Copyright © 2014 CyberSecurity Malaysia
![Page 4: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/4.jpg)
4
Objectives
Windows Logon
Password
Antivirus Software
Operating System
Application
Patches Update
Internet Access
Networking Devices
External Devices
Online Surfing
Copyright © 2014 CyberSecurity Malaysia
![Page 5: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/5.jpg)
5
1) Windows Logon
Windows Logon Logon Screen Screen Saver User Management
Copyright © 2014 CyberSecurity Malaysia
![Page 6: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/6.jpg)
6
Logon Screen
Copyright © 2014 CyberSecurity Malaysia
![Page 7: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/7.jpg)
7
Password Protected Screen Saver
Copyright © 2014 CyberSecurity Malaysia
![Page 8: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/8.jpg)
8
Access Control
Work-Related Information
company information
(structure, process, systems)
corporate email
business applications access
business servers access
business documents
customer information
vendor information
Personal-Related Information
personal information
personal emails
online banking
social networking
personal documents
personal photos
your dirty little secrets
![Page 9: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/9.jpg)
Copyright © 2011 CyberSecurity Malaysia 9
Software Keylogger
The Keylogger allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail
![Page 10: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/10.jpg)
10
User Management
![Page 11: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/11.jpg)
11
2) Password
Password Password Strength Managing Accounts Managing Password
Copyright © 2014 CyberSecurity Malaysia
![Page 12: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/12.jpg)
Copyright © 2011 CyberSecurity Malaysia 12
Password Strength
https://www.microsoft.com/security/pc-security/password-checker.aspx
![Page 13: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/13.jpg)
13
Managing AccountsDON’T USE SAME
UsernamePassword
Copyright © 2014 CyberSecurity Malaysia
![Page 14: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/14.jpg)
Avoid creating passwords that use:
Dictionary words in any language.
Words spelled backwards, common misspellings, and abbreviations.
Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).
Personal information. Your name, birthday, driver's license, passport number, or similar information.
14
Managing Password
Copyright © 2014 CyberSecurity Malaysia
![Page 15: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/15.jpg)
15
Dangerous Password
![Page 16: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/16.jpg)
16
3) Antivirus Software
Antivirus Software Antivirus Categories Online Scanner Signature Updates
Copyright © 2014 CyberSecurity Malaysia
![Page 17: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/17.jpg)
17
Antivirus Categories
Free Edition Antivirus
Commercial Antivirus
Online Scanner
Copyright © 2014 CyberSecurity Malaysia
![Page 18: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/18.jpg)
Copyright © 2011 CyberSecurity Malaysia 18
Antivirus Comparatives
http://www.av-comparatives.org/
![Page 19: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/19.jpg)
Copyright © 2011 CyberSecurity Malaysia 19
Online Scanner
![Page 20: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/20.jpg)
Copyright © 2011 CyberSecurity Malaysia 20
Windows Security Center
Windows Start > Control Panel > Security > Check this computer’s security status
![Page 21: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/21.jpg)
21
Signature Updates
Virus Definition
Computer
Copyright © 2014 CyberSecurity Malaysia
![Page 22: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/22.jpg)
22
4) Operating System
Operating System Service Pack Validate Win & Office Microsoft Support
Copyright © 2014 CyberSecurity Malaysia
![Page 23: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/23.jpg)
23
Service Pack
http://windows.microsoft.com/en-US/windows/downloads/service-packs
Copyright © 2014 CyberSecurity Malaysia
![Page 24: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/24.jpg)
24
Validate Windows and Office
http://www.microsoft.com/genuine/validate/
Copyright © 2014 CyberSecurity Malaysia
![Page 25: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/25.jpg)
25
Microsoft Fix it
http://support.microsoft.com/fixit/
Copyright © 2014 CyberSecurity Malaysia
![Page 26: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/26.jpg)
26
Microsoft Product Lifecycle
http://support.microsoft.com/gp/lifeselect
Copyright © 2014 CyberSecurity Malaysia
![Page 27: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/27.jpg)
27
5) Application
Application Paid Application Cracked Application Malicious Application
Copyright © 2014 CyberSecurity Malaysia
![Page 28: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/28.jpg)
28
Paid Application
Copyright © 2014 CyberSecurity Malaysia
![Page 29: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/29.jpg)
29
Cracked Application
Copyright © 2014 CyberSecurity Malaysia
![Page 30: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/30.jpg)
30
Rogue Antivirus
Copyright © 2014 CyberSecurity Malaysia
![Page 31: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/31.jpg)
31
Potentially Unwanted Program
Copyright © 2014 CyberSecurity Malaysia
![Page 32: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/32.jpg)
32
6) Patches Updates
Patches Updates Service Pack Windows Updates Third Party Updates
Copyright © 2014 CyberSecurity Malaysia
![Page 33: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/33.jpg)
Copyright © 2011 CyberSecurity Malaysia 33
Microsoft Download Center
http://www.microsoft.com/download/en/default.aspx
![Page 34: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/34.jpg)
34
Windows Updates
![Page 35: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/35.jpg)
Copyright © 2011 CyberSecurity Malaysia 35
Third Party Updates
http://secunia.com/vulnerability_scanning/personal/
![Page 36: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/36.jpg)
36
7) Internet Access
Internet Access Wired Network Wireless Network Other Computer
Copyright © 2014 CyberSecurity Malaysia
![Page 37: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/37.jpg)
37
Wired Network
REMOTE CODE EXECUTION
VIRUS & MALWARE
WEB APP ATTACKS
Copyright © 2014 CyberSecurity Malaysia
![Page 38: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/38.jpg)
Copyright © 2011 CyberSecurity Malaysia 38
Wireless Network
![Page 39: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/39.jpg)
39
8) Networking Devices
Networking Devices Microsoft Keyboard Webcam
Copyright © 2014 CyberSecurity Malaysia
![Page 40: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/40.jpg)
40
Wireless Microsoft Keyboard
https://www.dreamlab.net/files/articles/27_Mhz_keyboard_insecurities.pdf
The team of Dreamlab Technologies has hacked two wireless keyboards fromMicrosoft. Dreamlab warns that it is possible to “sniff” the keyboard strokes -possible to capture and decrypt keystrokes - user names, passwords, bankdetails or confidential correspondence can be very easily copied.
Copyright © 2014 CyberSecurity Malaysia
![Page 41: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/41.jpg)
41
Webcam
Webcam
Copyright © 2014 CyberSecurity Malaysia
![Page 42: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/42.jpg)
42
9) External Devices
External Devices Thumb Drive External HD CD/DVD
Copyright © 2014 CyberSecurity Malaysia
![Page 43: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/43.jpg)
43
AutoPlay
Copyright © 2014 CyberSecurity Malaysia
![Page 44: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/44.jpg)
44
10) Online Surfing
Online Surfing Browser Malicious website Phishing website
Copyright © 2014 CyberSecurity Malaysia
![Page 45: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/45.jpg)
Copyright © 2011 CyberSecurity Malaysia 45
Web Browser
![Page 46: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/46.jpg)
Copyright © 2011 CyberSecurity Malaysia 46
Browser Preferences
Copyright © 2014 CyberSecurity Malaysia
![Page 47: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/47.jpg)
Copyright © 2011 CyberSecurity Malaysia 47
Clear Browsing Data
![Page 48: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/48.jpg)
48
Malicious Website
![Page 49: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/49.jpg)
Copyright © 2011 CyberSecurity Malaysia 49
Phishing Attacks
![Page 50: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/50.jpg)
50
Check the Suspicious Website
Copyright © 2014 CyberSecurity Malaysia
![Page 51: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/51.jpg)
51
Summary
Windows Logon
Password
Antivirus Software
Operating System
Application
Patches Update
Internet Access
Networking Devices
External Devices
Online Surfing
Act Now!
Copyright © 2014 CyberSecurity Malaysia
![Page 52: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/52.jpg)
52
Action Time!
“If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology”- Bruce Schneier
Netbook Laptop Desktop
Copyright © 2014 CyberSecurity Malaysia
![Page 53: 03 secure the computer](https://reader035.fdocuments.in/reader035/viewer/2022062406/55abf0021a28ab0b7a8b4596/html5/thumbnails/53.jpg)
Copyright © 2013 CyberSecurity Malaysia 53