rohit ppt - Copy
-
Upload
manish-bansal -
Category
Documents
-
view
239 -
download
2
Transcript of rohit ppt - Copy
-
8/7/2019 rohit ppt - Copy
1/25
BY:ROHIT SHARMA
B.TECH(IT)C2801A24
REG.NO.10805075
-
8/7/2019 rohit ppt - Copy
2/25
Copyright 2005 The Sterlyn Group
The process of ensuring business systems andinformation assets are protected, secure and available.
-
8/7/2019 rohit ppt - Copy
3/25
-
8/7/2019 rohit ppt - Copy
4/25
VIRUS
A virus is a program or piece of code that is loadedonto your computer without your knowledge andruns against your wishes.
-
8/7/2019 rohit ppt - Copy
5/25
Boot viruses
Program viruses
Multipartite viruses
Stealth viruses
Polymorphic viruses
Macro viruses
-
8/7/2019 rohit ppt - Copy
6/25
On downloadingfiles from theInternet.
On opening an e-mail attachment.
On copying
programs or filesfrom any otherinfected computer.
-
8/7/2019 rohit ppt - Copy
7/25
The computer runs slowerthan usual.
The computer crashes, andthen it restarts every fewminutes.
Applications on the computerdo not work correctly. Disks or disk drives are
inaccessible. You see unusual error
messages.
An antivirus program cannotbe installed on the computer,or the antivirus program willnot run.
New icons appear on thedesktop that you did not put.
-
8/7/2019 rohit ppt - Copy
8/25
These viruses spreadvia computernetworks. It is self
replicating computerprogram.
-
8/7/2019 rohit ppt - Copy
9/25
A Trojan virus is onethat opens yourcomputer up to
malicious usersallowing them toread your files.
-
8/7/2019 rohit ppt - Copy
10/25
Virus cannot replicate themselves but worm and trojancan do that.
A virus cannot be spread without a human action suchas running an infected file or program but worm and
trojan have the capabilities to spread themselvesautomatically from computer to computer throughnetwork connetion.
A virus do not consume system memory but wormconsumes too much system memory and networkbandwidth because of their copying nature.
Trojans are used by malicious users to access yourcomputer information but viruses and worms cant doso, they simply infect your computer.
-
8/7/2019 rohit ppt - Copy
11/25
Spam
Unsolicited e-mail or the action ofbroadcasting unsolicited advertisingmessages via e-mail
Takes up time and storage space on theircomputer
Report it to ISP. Check your ISP help areas to
find out how to report spam
-
8/7/2019 rohit ppt - Copy
12/25
Phishing is defined as activity where someone tries totrick a computer user into revealing confidentialinformation
The site looks to be authentic, but the URL is incorrectand no digital certificate is used Phishers are primarily focused upon obtaining bank,
credit card, and personal information to sell on theopen market
Phishers have become more savvy in their approach,now moving into membership programs anddonations
How bad is the problem? The New York Office ofCyber Security sent an internal email asking employeesto enter their passwords into a password checker.
17% of their 10,000 complied with the request
-
8/7/2019 rohit ppt - Copy
13/25
Digital signatures are used to identify
phishing signatures in emails URL database is checked to verify if
the URL is categorized as a phishingsite
Content is analyzed to determine if itmatches the phishing definitions
-
8/7/2019 rohit ppt - Copy
14/25
Adware are created by
advertising companies
Comes in the form of popups,
unexplained advertisingprograms on your computer
desktop like Casino Night.
Advertising companies hope to
generate money from
customers who receive the
popups or unexplainedprograms on their computers.
Also a LEGAL program!
-
8/7/2019 rohit ppt - Copy
15/25
Spyware must be considered a severe securitythreat for campus users. Many spywareprograms monitor web traffic, store copies of
your passwords, and harvest email addressesand personal information for marketingpurposes. The shadowy nature of spywarecompanies means that this information couldeasily end up in the hands of criminal hackersor identity theft scam artists.
-
8/7/2019 rohit ppt - Copy
16/25
Block incoming spyware, adware, and maliciousapplications
Block against virus infections from web downloadsand web based email
Block internet access based upon categories
Prevent infected systems from sending informationback to the spyware server
Control different protocols such as streamingmedia, IM, and P2P
-
8/7/2019 rohit ppt - Copy
17/25
Scan HTTP/HTTPS/FTP traffic forvirus, worm, trojans, and othermalware before it reaches thedesktop
Checks page content andattachments
Allow/disallow certain types of
attachments by file format or textstring
Scan downloaded files in assembledstate
Updates on a regular basis
-
8/7/2019 rohit ppt - Copy
18/25
Copyright 2005 The Sterlyn Group
Use a Firewall software or appliance. Especially for
always on connections like DSL and Cable Modem. If
configured properly, it will eliminate many of the bad
guys.
File-sharing and instant messaging applications are not
only security threats, some also contain firewall evading
technology. If your home computer contains critical
business information you may want to reconsider letting thekids roam the Internet freely
At the office, restrict access to only business critical
applications.
-
8/7/2019 rohit ppt - Copy
19/25
ACTION PLAN:
1)Write down the error or alert message
inform your tech support teamquarantine the machine
2) Look up the message in an
authoritative anti-virus site (demo)diagnose the problemtake recommended remedial action
-
8/7/2019 rohit ppt - Copy
20/25
ACTION PLAN:
1)Write down the error or alert message
inform your tech support teamquarantine the machine
2) Look up the message in an
authoritative anti-virus site (demo)diagnose the problemtake recommended remedial action
-
8/7/2019 rohit ppt - Copy
21/25
SECURITY TIPS
1. Use protection software "anti-virus software" and keep it up to date.2. Don't open unknown, unscanned or unexpected email attachements.
3. Use hard-to-guess passwords.
4. Protect your computer from Internet intruders -- use "firewalls".
5. Don't share access to your computers with strangers. Learn about file
sharing risks.
Stay Safe Online www.staysafeonline.info/sectips.adpsponsored by the National Cyber Security
Alliance
-
8/7/2019 rohit ppt - Copy
22/25
SECURITY TIPS
6. Disconnect from the Internet when not in use.7. Back up your computer data.
8. Regularly download security protection update "patches".
9. Check your security on a regular basis. Understand the risks anduse measures to minimize your exposure.
10. Share security tips with family members , co-workers and friends.
Stay Safe Online www.staysafeonline.info/sectips.adpsponsored by the National Cyber Security
Alliance
-
8/7/2019 rohit ppt - Copy
23/25
Simplest and most common way to ensure thatonly those that have permission can enter yourcomputer or certain parts of your computernetwork
Virtually ineffective if people do not protect their
passwords. The golden rules, or policies for passwords are:
Make passwords as meaningless as possible
Change passwords regularly
Never divulge passwords to anyoneUA Password Standard
http://security.arizona.edu/drafts.html
-
8/7/2019 rohit ppt - Copy
24/25
Password Construction
On systems that support them, passwords should contain at leasteight characters
One of each of the following characters:
- Uppercase letters ( A-Z )- Lowercase letters ( a-z )- Numbers ( 0-9 )- Punctuation marks ( !@#$%^&*()_+=- )
-
8/7/2019 rohit ppt - Copy
25/25
Treat your password likeyou treat your toothbrush.Never give it to anyoneelse to use, and change itevery few months.
A final word: