secure the computer

53
Aaron I. Mokhtar Sr. Executive Content R&D Outreach Department SECURING YOUR COMPUTER POWERED BY PRESENTED BY Kementerian Pendidikan Malaysia

Upload: dweomer2005

Post on 21-Jul-2016

220 views

Category:

Documents


2 download

DESCRIPTION

secure the computer

TRANSCRIPT

Page 1: Secure the Computer

Aaron I. MokhtarSr. Executive Content R&D

Outreach Department

SECURING YOUR COMPUTER

POWERED BY

PRESENTED BY

Kementerian Pendidikan

Malaysia

Page 2: Secure the Computer

2

Objectives

Copyright © 2012 CyberSecurity Malaysia

we will learn 10 lessons for

protecting our computers by

securing the following

Page 3: Secure the Computer

3

Lesson 1: Windows Logins

1.1 Login Screen 1.2 Screen Saver1.3 User Management

Page 4: Secure the Computer

4

Access Control

Work-Related Information

company information

(structure, process, systems)

corporate email

business applications access

business servers access

business documents

customer information

vendor information

Personal-Related Information

personal information

personal emails

online banking

social networking

personal documents

personal photos

your dirty little secrets

LIMITING ACCESS TO YOUR COMPUTER

Page 5: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 5

Software Keylogger

The Keylogger allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail

Page 6: Secure the Computer

6

Lesson 1.1: Login Screen

Copyright © 2012 CyberSecurity Malaysia

CONTROL ACCESS TO YOUR COMPUTER

Page 7: Secure the Computer

7

Lesson 1.2: Screen Saver

Copyright © 2012 CyberSecurity MalaysiaPASSWORD PROTECT YOUR SCREEN SAVER

Page 8: Secure the Computer

8

Lesson 1.3: User Management

Page 9: Secure the Computer

9

Lesson 2: Passwords

2.1 Password Strength 2.2 Managing Accounts2.3 Managing Password2.4 Dangerous Passwords

Copyright © 2012 CyberSecurity Malaysia

Page 10: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 10

Lesson 2.1: Password Strength

https://www.microsoft.com/security/pc-security/password-checker.aspx

INSURE THE QUALITY

OF YOUR PASSWORD

Page 11: Secure the Computer

11

Lesson 2.2: Managing Accounts

DON’T USE THE SAME PASSWORD

Copyright © 2012 CyberSecurity Malaysia

Page 12: Secure the Computer

Avoid creating passwords that use:

Dictionary words in any language.

Words spelled backwards, common misspellings, and abbreviations.

Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).

Personal information. Your name, birthday, driver's license, passport number, or similar information.

12

Lesson 2.3: Managing Password

Copyright © 2012 CyberSecurity Malaysia

HAVE GOOD PASSWORD HABITS

Page 13: Secure the Computer

13

Lesson 2.4: Dangerous Password

Avoid the obvious

Page 14: Secure the Computer

14

3) Antivirus Software

Antivirus Software3.1 Antivirus Categories3.2 Online Scanner3.3 Signature Updates3.4 Signature Updates

Copyright © 2012 CyberSecurity Malaysia

Page 15: Secure the Computer

15

Lesson 3.1: Antivirus Categories

Free Edition Antivirus

Commercial Antivirus

Online Scanner

Copyright © 2012 CyberSecurity Malaysia

Page 16: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 16

Lesson 3.2: Online Scanner

Page 17: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 17

Lesson 3.3: Antivirus Comparatives

http://www.av-comparatives.org/

Page 18: Secure the Computer

18

Lesson 3.4: Signature Updates

Virus Definition

Computer

Copyright © 2012 CyberSecurity Malaysia

Page 19: Secure the Computer

19

4) Operating System

Operating System4.1 Service Pack 4.2 Validate Win & Office4.3 Microsoft Support4.4 Windows Security Centre

Copyright © 2012 CyberSecurity Malaysia

Page 20: Secure the Computer

20

Lesson 4.1: Service Pack

http://windows.microsoft.com/en-US/windows/downloads/service-packs

Copyright © 2012 CyberSecurity Malaysia

Page 21: Secure the Computer

21

Lesson 4.2: Validate Windows and Office

http://www.microsoft.com/genuine/validate/

Copyright © 2012 CyberSecurity Malaysia

Page 22: Secure the Computer

22

Lesson 4.3.1: Microsoft Fix it

http://support.microsoft.com/fixit/

Copyright © 2012 CyberSecurity Malaysia

Page 23: Secure the Computer

23

Lesson 4.3.2: Microsoft Product Lifecycle

http://support.microsoft.com/gp/lifeselect

Copyright © 2012 CyberSecurity Malaysia

Page 24: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 24

Lesson 4.4: Windows Security Center

Windows Start > Control Panel > Security > Check this computer’s security status

Page 25: Secure the Computer

25

5) Application

Application5.1 Paid Application 5.2 Cracked Application5.3 Malicious Application

Copyright © 2012 CyberSecurity Malaysia

Page 26: Secure the Computer

26

Lesson 5.1: Paid Application

Copyright © 2012 CyberSecurity Malaysia

Page 27: Secure the Computer

27

Lesson 5.2: Cracked Application

Copyright © 2012 CyberSecurity Malaysia

Page 28: Secure the Computer

28

Lesson 5.3: Malicious Application

Copyright © 2012 CyberSecurity Malaysia

Rogue Antivirus

Page 29: Secure the Computer

29

Lesson 5.3.1: Potentially Unwanted Program

Copyright © 2012 CyberSecurity Malaysia

Page 30: Secure the Computer

30

6) Patches & Updates

Patches Updates6.1 Microsoft Download Centre6.2 Windows Updates6.3 Third Party Updates

Copyright © 2012 CyberSecurity Malaysia

Page 31: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 31

Lesson 6.1: Microsoft Download Center

http://www.microsoft.com/download/en/default.aspx

Page 32: Secure the Computer

32

Lesson 6.2: Windows Updates

Page 33: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 33

Lesson 6.3: Third Party Updates

http://secunia.com/vulnerability_scanning/personal/

Page 34: Secure the Computer

34

7) Internet Access

Internet Access7.1 Wired Network7.2 Wireless Network7.3 Other Computer

Copyright © 2012 CyberSecurity Malaysia

Page 35: Secure the Computer

35

Lesson 7.1: Wired Network

REMOTE CODE EXECUTION

VIRUS & MALWARE

WEB APP ATTACKS

Copyright © 2012 CyberSecurity Malaysia

Page 36: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 36

Lesson 7.2 Wireless Network

Page 37: Secure the Computer

37

Lesson 7.3: Other Computer

Security Questions

Copyright © 2012 CyberSecurity Malaysia

Page 38: Secure the Computer

38

8) Networking Devices

Networking Devices8.1 Microsoft Keyboard8.2 Webcam

Copyright © 2012 CyberSecurity Malaysia

Page 39: Secure the Computer

39

Lesson 8.1: Wireless Keyboard

https://www.dreamlab.net/files/articles/27_Mhz_keyboard_insecurities.pdf

The team of Dreamlab Technologies has hacked two wireless keyboards fromMicrosoft. Dreamlab warns that it is possible to “sniff” the keyboard strokes -possible to capture and decrypt keystrokes - user names, passwords, bankdetails or confidential correspondence can be very easily copied.

Copyright © 2012 CyberSecurity Malaysia

Page 40: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 40

Lesson 8.2: Webcam

Webcam

Copyright © 2012 CyberSecurity Malaysia

Page 41: Secure the Computer

41

9) External Devices

External Devices9.1 Thumb Drive, External HD, CD/DVD9.2 AutoPlay

Copyright © 2012 CyberSecurity Malaysia

Page 42: Secure the Computer

42

Lesson 9.2: AutoPlay

Copyright © 2012 CyberSecurity Malaysia

Page 43: Secure the Computer

43

10) Online Surfing

Online Surfing10.1 Internet Browser10.2 Malicious website10.3 Phishing website

Copyright © 2012 CyberSecurity Malaysia

Page 44: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 44

Lesson 10.1 Web Browser

Page 45: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 45

Lesson 10.1.1: Browser Preferences

Page 46: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 46

Lesson 10.1.2: Clear Browsing Data

Page 47: Secure the Computer

47

Lesson 10.2: Malicious Website

Page 48: Secure the Computer

Copyright © 2011 CyberSecurity Malaysia 48

Lesson 10.3: Phishing Attacks

Page 49: Secure the Computer

Copyright © 2012 CyberSecurity Malaysia 49

Lesson 10.3.1: Check the Suspicious Website

Page 50: Secure the Computer

50

Summary

Windows Logon

Password

Antivirus Software

Operating System

Application

Patches Update

Internet Access

Networking Devices

External Devices

Online Surfing

Act Now!

Copyright © 2012 CyberSecurity Malaysia

Page 51: Secure the Computer

51

Objectives

Copyright © 2012 CyberSecurity Malaysia

we will learn 10 lessons for

protecting our computers by

securing the following

Windows login

PasswordsAntivirus Software

Operating System

Applications PatchesInternet Access

Networking Devices

External Devices

Online Surfing

Page 52: Secure the Computer

Copyright © 2012 CyberSecurity Malaysia 52

Action Time!

“If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology”- Bruce Schneier

Netbook Laptop Desktop

Page 53: Secure the Computer

Corporate Office:

CyberSecurity Malaysia,Level 8, Block A,Mines Waterfront Business Park,No 3 Jalan Tasik, The Mines Resort City,43300 Seri Kembangan,Selangor Darul Ehsan, Malaysia.

T +603 8946 0999F +603 8946 0888

www.cybersecurity.my

Copyright © 2011 CyberSecurity Malaysia 53