rohit ppt - Copy

download rohit ppt - Copy

of 25

Transcript of rohit ppt - Copy

  • 8/7/2019 rohit ppt - Copy

    1/25

    BY:ROHIT SHARMA

    B.TECH(IT)C2801A24

    REG.NO.10805075

  • 8/7/2019 rohit ppt - Copy

    2/25

    Copyright 2005 The Sterlyn Group

    The process of ensuring business systems andinformation assets are protected, secure and available.

  • 8/7/2019 rohit ppt - Copy

    3/25

  • 8/7/2019 rohit ppt - Copy

    4/25

    VIRUS

    A virus is a program or piece of code that is loadedonto your computer without your knowledge andruns against your wishes.

  • 8/7/2019 rohit ppt - Copy

    5/25

    Boot viruses

    Program viruses

    Multipartite viruses

    Stealth viruses

    Polymorphic viruses

    Macro viruses

  • 8/7/2019 rohit ppt - Copy

    6/25

    On downloadingfiles from theInternet.

    On opening an e-mail attachment.

    On copying

    programs or filesfrom any otherinfected computer.

  • 8/7/2019 rohit ppt - Copy

    7/25

    The computer runs slowerthan usual.

    The computer crashes, andthen it restarts every fewminutes.

    Applications on the computerdo not work correctly. Disks or disk drives are

    inaccessible. You see unusual error

    messages.

    An antivirus program cannotbe installed on the computer,or the antivirus program willnot run.

    New icons appear on thedesktop that you did not put.

  • 8/7/2019 rohit ppt - Copy

    8/25

    These viruses spreadvia computernetworks. It is self

    replicating computerprogram.

  • 8/7/2019 rohit ppt - Copy

    9/25

    A Trojan virus is onethat opens yourcomputer up to

    malicious usersallowing them toread your files.

  • 8/7/2019 rohit ppt - Copy

    10/25

    Virus cannot replicate themselves but worm and trojancan do that.

    A virus cannot be spread without a human action suchas running an infected file or program but worm and

    trojan have the capabilities to spread themselvesautomatically from computer to computer throughnetwork connetion.

    A virus do not consume system memory but wormconsumes too much system memory and networkbandwidth because of their copying nature.

    Trojans are used by malicious users to access yourcomputer information but viruses and worms cant doso, they simply infect your computer.

  • 8/7/2019 rohit ppt - Copy

    11/25

    Spam

    Unsolicited e-mail or the action ofbroadcasting unsolicited advertisingmessages via e-mail

    Takes up time and storage space on theircomputer

    Report it to ISP. Check your ISP help areas to

    find out how to report spam

  • 8/7/2019 rohit ppt - Copy

    12/25

    Phishing is defined as activity where someone tries totrick a computer user into revealing confidentialinformation

    The site looks to be authentic, but the URL is incorrectand no digital certificate is used Phishers are primarily focused upon obtaining bank,

    credit card, and personal information to sell on theopen market

    Phishers have become more savvy in their approach,now moving into membership programs anddonations

    How bad is the problem? The New York Office ofCyber Security sent an internal email asking employeesto enter their passwords into a password checker.

    17% of their 10,000 complied with the request

  • 8/7/2019 rohit ppt - Copy

    13/25

    Digital signatures are used to identify

    phishing signatures in emails URL database is checked to verify if

    the URL is categorized as a phishingsite

    Content is analyzed to determine if itmatches the phishing definitions

  • 8/7/2019 rohit ppt - Copy

    14/25

    Adware are created by

    advertising companies

    Comes in the form of popups,

    unexplained advertisingprograms on your computer

    desktop like Casino Night.

    Advertising companies hope to

    generate money from

    customers who receive the

    popups or unexplainedprograms on their computers.

    Also a LEGAL program!

  • 8/7/2019 rohit ppt - Copy

    15/25

    Spyware must be considered a severe securitythreat for campus users. Many spywareprograms monitor web traffic, store copies of

    your passwords, and harvest email addressesand personal information for marketingpurposes. The shadowy nature of spywarecompanies means that this information couldeasily end up in the hands of criminal hackersor identity theft scam artists.

  • 8/7/2019 rohit ppt - Copy

    16/25

    Block incoming spyware, adware, and maliciousapplications

    Block against virus infections from web downloadsand web based email

    Block internet access based upon categories

    Prevent infected systems from sending informationback to the spyware server

    Control different protocols such as streamingmedia, IM, and P2P

  • 8/7/2019 rohit ppt - Copy

    17/25

    Scan HTTP/HTTPS/FTP traffic forvirus, worm, trojans, and othermalware before it reaches thedesktop

    Checks page content andattachments

    Allow/disallow certain types of

    attachments by file format or textstring

    Scan downloaded files in assembledstate

    Updates on a regular basis

  • 8/7/2019 rohit ppt - Copy

    18/25

    Copyright 2005 The Sterlyn Group

    Use a Firewall software or appliance. Especially for

    always on connections like DSL and Cable Modem. If

    configured properly, it will eliminate many of the bad

    guys.

    File-sharing and instant messaging applications are not

    only security threats, some also contain firewall evading

    technology. If your home computer contains critical

    business information you may want to reconsider letting thekids roam the Internet freely

    At the office, restrict access to only business critical

    applications.

  • 8/7/2019 rohit ppt - Copy

    19/25

    ACTION PLAN:

    1)Write down the error or alert message

    inform your tech support teamquarantine the machine

    2) Look up the message in an

    authoritative anti-virus site (demo)diagnose the problemtake recommended remedial action

  • 8/7/2019 rohit ppt - Copy

    20/25

    ACTION PLAN:

    1)Write down the error or alert message

    inform your tech support teamquarantine the machine

    2) Look up the message in an

    authoritative anti-virus site (demo)diagnose the problemtake recommended remedial action

  • 8/7/2019 rohit ppt - Copy

    21/25

    SECURITY TIPS

    1. Use protection software "anti-virus software" and keep it up to date.2. Don't open unknown, unscanned or unexpected email attachements.

    3. Use hard-to-guess passwords.

    4. Protect your computer from Internet intruders -- use "firewalls".

    5. Don't share access to your computers with strangers. Learn about file

    sharing risks.

    Stay Safe Online www.staysafeonline.info/sectips.adpsponsored by the National Cyber Security

    Alliance

  • 8/7/2019 rohit ppt - Copy

    22/25

    SECURITY TIPS

    6. Disconnect from the Internet when not in use.7. Back up your computer data.

    8. Regularly download security protection update "patches".

    9. Check your security on a regular basis. Understand the risks anduse measures to minimize your exposure.

    10. Share security tips with family members , co-workers and friends.

    Stay Safe Online www.staysafeonline.info/sectips.adpsponsored by the National Cyber Security

    Alliance

  • 8/7/2019 rohit ppt - Copy

    23/25

    Simplest and most common way to ensure thatonly those that have permission can enter yourcomputer or certain parts of your computernetwork

    Virtually ineffective if people do not protect their

    passwords. The golden rules, or policies for passwords are:

    Make passwords as meaningless as possible

    Change passwords regularly

    Never divulge passwords to anyoneUA Password Standard

    http://security.arizona.edu/drafts.html

  • 8/7/2019 rohit ppt - Copy

    24/25

    Password Construction

    On systems that support them, passwords should contain at leasteight characters

    One of each of the following characters:

    - Uppercase letters ( A-Z )- Lowercase letters ( a-z )- Numbers ( 0-9 )- Punctuation marks ( !@#$%^&*()_+=- )

  • 8/7/2019 rohit ppt - Copy

    25/25

    Treat your password likeyou treat your toothbrush.Never give it to anyoneelse to use, and change itevery few months.

    A final word: