Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security...

41
Malling U3A Computer Group Security on PC’s & Mobile Devices Chris Daly – 3 rd July 2017

Transcript of Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security...

Page 1: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Malling U3A Computer Group

Security on PC’s & Mobile Devices

Chris Daly – 3rd July 2017

Page 2: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security� What is PC security ?

� “PC” refers generally to a Windows Computer.

� PC Security refers to technologies used to secure PCs, laptops and other personal devices on a network .

� Any unauthorized access is restricted from infecting any virtual information, equipment and services.

� PC security is critically important to prevent change or damage that can be caused due to any malicious threats.

� PC security is also referred to as IT security or cyber security.

Page 3: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security

� In addition to cyber security there is physical security.

� Accidental loss of your device.

� Theft of your computer, laptop or device

� Failure of your computer, laptop or device to operate

� Electronic failure.

� Mechanical failure of HDD.

Page 4: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security

� The end result of all of these can be

� Losing irreplaceable data

� Photos

� Contacts

� Documents

� Giving someone access to your data

� Passwords

� Banking details

� Private messages

� Private documents

� Photos

Page 5: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security

� Lock your computer or device with a password, so if it’s lost or stolen it is very difficult to access.

� The most important action then is to decide what you must protect.

� Then back up the data so you can carry on.

� You should have a regular backup routine

� Backup onto storage remote from your computer, laptop or device.

� In the cloud – One Drive, Dropbox, etc

� Another separate remote storage device, kept away from your computer when not in use.

Page 6: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security• To back up files & data on Windows 10 use File History.

• To set up File History you’ll first need to open the Start Menu and click on Settings.

• In the menu that appears select Update & Security and then click on the Backup section to view the relevant options.

Page 7: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security

� Having backed up you can then try to minimise cyber risks.

� A system or any other device can be vulnerable when they are prone to any kind of malicious attack.

� The three main aspects of vulnerability are

� A system flaw

� Access of a hacker to the flaw

� The hacker exploiting the flaw

Page 8: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security• There are many ways that the system can be attacked.

• The various modes of attacks and the threats responsible for it are:-

– Backdoors

– Denial-of-service attack

– Direct-access attacks

– Eavesdropping

– Spoofing

– Tampering

– Data Breaches

Page 9: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security• Backdoors

– A backdoor is an algorithm that escapes authentication and validation & helps the cybercriminal to remotely access the computer. (Wannacry was this type of problem)

• Denial-of-service attack (DoS)

– They are developed and generated by cyber criminals on the targeted machine to render it unusable. They create an attempt to ensure that the network resources are unavailable for the users to access by overload on the system.

Page 10: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security

• Direct-access attacks

– Cyber criminals can perform an unauthorized remote access on its victim's computer remotely.

– It can compromise the system's security

– Keyloggers & computer worms are some kind of malware that can process an unauthorized remote access.

– The criminal downloads a huge amount of sensitive data from the target victim.

– Ransomware could be installed.

Page 11: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security

� Eavesdropping

� This is an unauthorized tracking of private communication over the network.

� It can be instant messages, phone calls, emails and other services over the network.

� Eavesdropping does not interfere with the normal operations of the targeting system.

� The sender and the recipient of the messages are not really aware that their conversation is being accessed.

� This is done by exploiting security loopholes over the network.

Page 12: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security• Spoofing

– Cyber criminals find security backlogs over the network & pretend to be an authorized program or an application, gaining remote unauthorized access to sensitive information.

• Tampering

– Hackers are skilled enough to mutate the existing program that can harm the targeting system

• Data Breaches

– This is done by compromising major companies' systems to gain access over the critical information of the company and is moved to an untrusted environment &/or sold.

Page 13: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security

• Basic Components of PC security

• PC security is considered to be more important for the following reasons

– To prevent data theft

– To prevent theft or destruction of hardware

– To prevent any software or service getting disrupted

Page 14: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure

� How can I make my computer completely secure from any type of virus and hacking?

� You can’t, because of the old computer industry phenomenon known as PEBCAK

� “Problem exists between chair and keyboard”.

� A lot of hacks depend on “social engineering,” which means manipulating people into handing over their passwords or other details.

� It can be as easy as phoning up and pretending to be from head office.

� Linux and Mac OS X are more secure than Windows, but PEBCAK is a problem with every operating system.

Page 15: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure

� You could equally well ask, “How can I make my house completely secure?”

� Some simple precautions will protect you from casual theft in a nice neighbourhood, but not even bars and barbed wire will stop a gang equipped with explosives to blow your doors off.

� The real problem is to decide how much security you need.

� This will depend on who you are and where you live.

Page 16: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure

� Who?

� In computing, you need a higher level of security if you are an obvious target or you have access to very valuable information.

� Obvious targets include celebrities, activists, and investigative journalists.

� You may also have valuable information if you work in finance, or at an important research establishment, or for some government agencies, etc.

Page 17: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure� Where?

� In computing, you create your own neighbourhood.

� If you visit sites that specialise in hacking, cracking or pirate software, then you’re at much more risk than if you only visit mainstream sites for shopping and social networking.

� Sites that offer free music, software or pornography are more likely to be dangerous than ones that offer the paid-for equivalents.

� If it’s free, somebody is probably making money somehow, even if it’s just by installing adware.

Page 18: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure• Malware (including viruses) can come from.

– Visiting unsafe, suspicious, or fake websites.

– Opening emails and email attachments from people you don’t know, or that you weren’t expecting.

– Clicking on malicious or bad links in:

�Emails

�Facebook

�Twitter, and other social media posts

�instant messenger chats, like Skype.

Page 19: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure� Keep the operating system and all your software up to date.

� The vast majority of Windows hacks are based on exploiting holes that Microsoft closed months or even years ago.

� Yes, sometimes there are “zero day” exploits for which there is no patch, but these are worth a lot of money and mainly used on high-value targets.

� A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack

Page 20: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your PC Secure� To keep Windows up to date, turn on auto-updates.

� Microsoft will install patches on or shortly after the second Tuesday of each month.

� However, recent versions of Windows, if patched, are no longer the main target.

� As a priority, you must also make sure your browser (including IE), all Adobe and Apple programs for Windows, and Oracle’s Java are up to date.

Page 21: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure• Malware writers are less likely to target Mac users because of the perception that it has a far smaller market share than Windows, but this is changing.

• Also the fact that the Mac operating system is Unix-based, and Unix offers a number of security features built in.

• In addition, Apple has included a number of security measures that make attacking a Mac particularly challenging.

• These include Gatekeeper, which blocks any software than hasn't been digitally signed and approved by Apple from running on your Mac without your agreement.

Page 22: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Security� “Security developers & Companies are working to provide PC security to both individuals and organizations using advanced and next level generation technologies to overcome malware related issues.”

� The basic components that deal with PC security are:-

� Antivirus

� Firewall

� Internet Security software

� Cloud storage

Page 23: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Antivirus� Antivirus software helps to scan and detect any kind of malware that includes

� Viruses

� Worms

� Rootkits

� Keyloggers

� Ransomware and more

� Frequent updates and fixes on security issues of antivirus are very important

� They should be made available to the users to update, even before the vulnerability affects the users system.

Page 24: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure� You should also run anti-virus software.

� Many people use the built-in Microsoft Security Essentials or Windows Defender.

� PC Mag – “In the past, Windows Defender has performed poorly both in our tests and independent lab tests It did score several wins in 2016, and it earned decent scores in several more recent tests.”

� Those who need something heavier can install a free program such as Avast Free which includes a password manager and a network security scanner in its toolkit.

� The best paid antivirus products do tend to offer more and better protection, such as McAfee Antivirus, or Bitdefender Antivirus.

� All are available for Apple Computers

Page 25: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

PC Mag review - 2017

Page 26: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Firewall

� A firewall prevents unauthorized access on the users' system while connected to the network.

� All that enters out of the internet, has to pass through the firewall.

� The data stream hence gets examined and if the messages are found to be unauthorized and do not satisfy the security rules, they are blocked instantly.

Page 27: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure

� Firewall

� Any computer that’s online will find its ports being scanned from other computers, some of which will be worms (viruses), and some of which may be human attackers.

� It’s therefore important to have a firewall, and the one built into Windows is good enough for most users & enabled by default.

� If you want more protection, there are plenty of alternatives, and you may already have bought one as part of a security suite.

Page 28: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure

� MacOS also has a firewall built in but not enabled by default

� A firewall was necessary on Windows many years ago — because Windows XP had so many services listening for network connections, and those services were being exploited by worms.

� A standard Mac OS X system doesn’t have such potentially vulnerable services listening by default, so it doesn’t need a tacked-on firewall to help protect such vulnerable services from being attacked.

Page 29: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Internet Security Software

� An internet security suite provides a multi-layered security approach comprising:-

� Antivirus

� Firewall

� Anti-spyware

� Behaviour analysis

� Virus scanning

� Scheduled scanning and more.

� Enhanced versions of internet security suites often implement heuristics based protection and prevention.

Page 30: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Heuristics� Heuristic scanning looks for code and/or patterns indicative of a class or family of viruses, with different sets of rules for different viruses.

� If a file or process is observed to contain matching code patterns and/or to be performing that set of activities, then the scanner infers that the file is infected.

� Heuristic scanning has the potential to detect many future viruses without requiring the virus itself

� to be detected somewhere

� submitted to the virus scanner developer

� Analyzed

� a detection update for the scanner provided to the scanner's users.

Page 31: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Internet Security Software• Basic and Advanced Security Suites

• Most security vendors offer at least three levels of security products

� a standalone antivirus utility

� an entry-level security suite

• Most entry-level suites include antivirus, firewall, antispam, parental control, and some sort of additional privacy protection such as protection against phishing sites, those frauds that try to steal your passwords.

� an advanced suite with additional features.

• The advanced "mega-suite" typically adds a backup component and some form of system tune-up utility, and some also add password managers and other security extras.

Page 32: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Internet Security Software• A few companies offer free antivirus software, but most

packages you’ll have to pay for.

• The headline price you see on the publisher’s website isn’t the whole story, though.

• Often you can save money by investing in a two-year licence, or by buying a subscription for multiple computers.

• Before you sign up, be sure to check third-party retailers too – many suites are significantly cheaper on Amazon than on the publisher’s own website.

• The same applies when the time comes to renew your subscription: the program will present a friendly link to easily renew at full-price, but you’re often better off ignoring this and buying a whole new copy online.

Page 33: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Internet Security Software

Page 34: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Cloud Storage

� Cloud Storage helps to secure the users' data and contributes to computer security.

� The data, when stored in your computer, occupies a lot of memory.

� To avoid this and to secure it from the malicious hackers, the data can be stored over the cloud.

� Managing a cloud storage account can hence help secure data.

Page 35: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure� Browser Protection

� The web browser is your interface to the net, and therefore most likely to be attacked.

� Internet Explorer (MS Edge)

� Mozilla Firefox

� Google Chrome

� Opera

� Safari (MacOS)

� Most leading browsers are reasonably safe, if kept updated

Page 36: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure� Browser Protection

� Google Chrome may well be the safest.

� Although Chrome has the highest number of vulnerabilities, they get patched quickly

� It has a “sandbox” to help insulate it from the rest of your PC. Attackers therefore need two exploits: one for the Chrome browser and one for the sandbox.

� It could be worth signing up to the free security software offered by most banks such as TrusteerRapport, for use within your browser.

Page 37: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your Computer Secure

� After installing the above systems, the biggest risk is social engineering, even if it’s just getting you to click something you know you shouldn’t.

Page 38: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your device secure� The same steps apply as outlined for Computers

� Password or PIN protect the phone/tablet using “settings” – “security” – “screen lock”

� For the highest level of security encrypt the phone, although this may slow it down slightly.

� The SIM card can also be locked with a PIN

� Decide what is essential and back it up.

� Set the device for “auto updates” for the system (Android)

� Set the Apps to auto update via Google Play Store

� Use a good browser on the device – i.e. Google Chrome

Page 39: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your device secure• There is no Firewall installed or needed on Android as long as you use Apps from the Google Play Store.

– In Windows, the executable files are in .exe format which can be run without warning. So there is a high probability of exe files getting inside computer without your knowledge and run in the background transferring information. Firewall is a must have in Windows OS.

– In Android, the executable file comes in .apkformat. The file needs to be installed first and cannot be run without your knowledge. This basic feature itself provides the first layer of safety.

Page 40: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Making your device secure

• Install Anti Virus software which can be a free version that will give all the basics.

• Many of the Anti Virus software companies now offer systems that can be installed across multiple devices (phones & tablets), computers and platforms (Windows/MacOS/Android)

Page 41: Security on PC's & Mobile Devices · Aninternet security suiteprovides a multi-layered security approach comprising:-Antivirus Firewall Anti-spyware Behaviour analysis Virus scanning

Summary

� Backup data

� Password protect your computer or device

� Consider encryption of your phone/tablet

� Setup auto updates for the operating system

� Ensure you use a good browser kept up to date.

� Install Antivirus software or a suite of tools

� Ensure the windows firewall is on or install a separate firewall.

� Beware “Social Engineering” targeting.

� Do not open attachments from unknown sources.