03 secure the computer

53
Copyright © 2014 CyberSecurity Malaysia Secure the Computer

Transcript of 03 secure the computer

Page 1: 03 secure the computer

Copyright © 2014 CyberSecurity Malaysia

Secure the Computer

Page 2: 03 secure the computer

2

Nowadays, everyone has computers, digitaldata, online identity and account credentials.Not everyone is serious about security.

But malicious hackers are constantly looking forweaknesses of their prey in order tosuccessfully execute their malicious activities onthe internet.

In this session, we’ll examine our commonmistakes and how hackers exploit that mistakes.

Let us think likes HACKERS!

Introduction

Page 3: 03 secure the computer

3

Goals

Hackers’ PerspectiveHackers are constantly finding for theweakness of each components toensure the success of malicious attack

Users’ PerspectiveMost users are more focused on howto use computer to do their daily tasksbut not so much about their security

Copyright © 2014 CyberSecurity Malaysia

Page 4: 03 secure the computer

4

Objectives

Windows Logon

Password

Antivirus Software

Operating System

Application

Patches Update

Internet Access

Networking Devices

External Devices

Online Surfing

Copyright © 2014 CyberSecurity Malaysia

Page 5: 03 secure the computer

5

1) Windows Logon

Windows Logon Logon Screen Screen Saver User Management

Copyright © 2014 CyberSecurity Malaysia

Page 6: 03 secure the computer

6

Logon Screen

Copyright © 2014 CyberSecurity Malaysia

Page 7: 03 secure the computer

7

Password Protected Screen Saver

Copyright © 2014 CyberSecurity Malaysia

Page 8: 03 secure the computer

8

Access Control

Work-Related Information

company information

(structure, process, systems)

corporate email

business applications access

business servers access

business documents

customer information

vendor information

Personal-Related Information

personal information

personal emails

online banking

social networking

personal documents

personal photos

your dirty little secrets

Page 9: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 9

Software Keylogger

The Keylogger allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail

Page 10: 03 secure the computer

10

User Management

Page 11: 03 secure the computer

11

2) Password

Password Password Strength Managing Accounts Managing Password

Copyright © 2014 CyberSecurity Malaysia

Page 12: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 12

Password Strength

https://www.microsoft.com/security/pc-security/password-checker.aspx

Page 13: 03 secure the computer

13

Managing AccountsDON’T USE SAME

UsernamePassword

Copyright © 2014 CyberSecurity Malaysia

Page 14: 03 secure the computer

Avoid creating passwords that use:

Dictionary words in any language.

Words spelled backwards, common misspellings, and abbreviations.

Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).

Personal information. Your name, birthday, driver's license, passport number, or similar information.

14

Managing Password

Copyright © 2014 CyberSecurity Malaysia

Page 15: 03 secure the computer

15

Dangerous Password

Page 16: 03 secure the computer

16

3) Antivirus Software

Antivirus Software Antivirus Categories Online Scanner Signature Updates

Copyright © 2014 CyberSecurity Malaysia

Page 17: 03 secure the computer

17

Antivirus Categories

Free Edition Antivirus

Commercial Antivirus

Online Scanner

Copyright © 2014 CyberSecurity Malaysia

Page 18: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 18

Antivirus Comparatives

http://www.av-comparatives.org/

Page 19: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 19

Online Scanner

Page 20: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 20

Windows Security Center

Windows Start > Control Panel > Security > Check this computer’s security status

Page 21: 03 secure the computer

21

Signature Updates

Virus Definition

Computer

Copyright © 2014 CyberSecurity Malaysia

Page 22: 03 secure the computer

22

4) Operating System

Operating System Service Pack Validate Win & Office Microsoft Support

Copyright © 2014 CyberSecurity Malaysia

Page 23: 03 secure the computer

23

Service Pack

http://windows.microsoft.com/en-US/windows/downloads/service-packs

Copyright © 2014 CyberSecurity Malaysia

Page 24: 03 secure the computer

24

Validate Windows and Office

http://www.microsoft.com/genuine/validate/

Copyright © 2014 CyberSecurity Malaysia

Page 25: 03 secure the computer

25

Microsoft Fix it

http://support.microsoft.com/fixit/

Copyright © 2014 CyberSecurity Malaysia

Page 26: 03 secure the computer

26

Microsoft Product Lifecycle

http://support.microsoft.com/gp/lifeselect

Copyright © 2014 CyberSecurity Malaysia

Page 27: 03 secure the computer

27

5) Application

Application Paid Application Cracked Application Malicious Application

Copyright © 2014 CyberSecurity Malaysia

Page 28: 03 secure the computer

28

Paid Application

Copyright © 2014 CyberSecurity Malaysia

Page 29: 03 secure the computer

29

Cracked Application

Copyright © 2014 CyberSecurity Malaysia

Page 30: 03 secure the computer

30

Rogue Antivirus

Copyright © 2014 CyberSecurity Malaysia

Page 31: 03 secure the computer

31

Potentially Unwanted Program

Copyright © 2014 CyberSecurity Malaysia

Page 32: 03 secure the computer

32

6) Patches Updates

Patches Updates Service Pack Windows Updates Third Party Updates

Copyright © 2014 CyberSecurity Malaysia

Page 33: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 33

Microsoft Download Center

http://www.microsoft.com/download/en/default.aspx

Page 34: 03 secure the computer

34

Windows Updates

Page 35: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 35

Third Party Updates

http://secunia.com/vulnerability_scanning/personal/

Page 36: 03 secure the computer

36

7) Internet Access

Internet Access Wired Network Wireless Network Other Computer

Copyright © 2014 CyberSecurity Malaysia

Page 37: 03 secure the computer

37

Wired Network

REMOTE CODE EXECUTION

VIRUS & MALWARE

WEB APP ATTACKS

Copyright © 2014 CyberSecurity Malaysia

Page 38: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 38

Wireless Network

Page 39: 03 secure the computer

39

8) Networking Devices

Networking Devices Microsoft Keyboard Webcam

Copyright © 2014 CyberSecurity Malaysia

Page 40: 03 secure the computer

40

Wireless Microsoft Keyboard

https://www.dreamlab.net/files/articles/27_Mhz_keyboard_insecurities.pdf

The team of Dreamlab Technologies has hacked two wireless keyboards fromMicrosoft. Dreamlab warns that it is possible to “sniff” the keyboard strokes -possible to capture and decrypt keystrokes - user names, passwords, bankdetails or confidential correspondence can be very easily copied.

Copyright © 2014 CyberSecurity Malaysia

Page 41: 03 secure the computer

41

Webcam

Webcam

Copyright © 2014 CyberSecurity Malaysia

Page 42: 03 secure the computer

42

9) External Devices

External Devices Thumb Drive External HD CD/DVD

Copyright © 2014 CyberSecurity Malaysia

Page 43: 03 secure the computer

43

AutoPlay

Copyright © 2014 CyberSecurity Malaysia

Page 44: 03 secure the computer

44

10) Online Surfing

Online Surfing Browser Malicious website Phishing website

Copyright © 2014 CyberSecurity Malaysia

Page 45: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 45

Web Browser

Page 46: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 46

Browser Preferences

Copyright © 2014 CyberSecurity Malaysia

Page 47: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 47

Clear Browsing Data

Page 48: 03 secure the computer

48

Malicious Website

Page 49: 03 secure the computer

Copyright © 2011 CyberSecurity Malaysia 49

Phishing Attacks

Page 50: 03 secure the computer

50

Check the Suspicious Website

Copyright © 2014 CyberSecurity Malaysia

Page 51: 03 secure the computer

51

Summary

Windows Logon

Password

Antivirus Software

Operating System

Application

Patches Update

Internet Access

Networking Devices

External Devices

Online Surfing

Act Now!

Copyright © 2014 CyberSecurity Malaysia

Page 52: 03 secure the computer

52

Action Time!

“If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology”- Bruce Schneier

Netbook Laptop Desktop

Copyright © 2014 CyberSecurity Malaysia

Page 53: 03 secure the computer

Copyright © 2013 CyberSecurity Malaysia 53