Secure the Computer
-
Upload
dweomer2005 -
Category
Documents
-
view
220 -
download
2
description
Transcript of Secure the Computer
![Page 1: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/1.jpg)
Aaron I. MokhtarSr. Executive Content R&D
Outreach Department
SECURING YOUR COMPUTER
POWERED BY
PRESENTED BY
Kementerian Pendidikan
Malaysia
![Page 2: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/2.jpg)
2
Objectives
Copyright © 2012 CyberSecurity Malaysia
we will learn 10 lessons for
protecting our computers by
securing the following
![Page 3: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/3.jpg)
3
Lesson 1: Windows Logins
1.1 Login Screen 1.2 Screen Saver1.3 User Management
![Page 4: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/4.jpg)
4
Access Control
Work-Related Information
company information
(structure, process, systems)
corporate email
business applications access
business servers access
business documents
customer information
vendor information
Personal-Related Information
personal information
personal emails
online banking
social networking
personal documents
personal photos
your dirty little secrets
LIMITING ACCESS TO YOUR COMPUTER
![Page 5: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/5.jpg)
Copyright © 2011 CyberSecurity Malaysia 5
Software Keylogger
The Keylogger allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail
![Page 6: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/6.jpg)
6
Lesson 1.1: Login Screen
Copyright © 2012 CyberSecurity Malaysia
CONTROL ACCESS TO YOUR COMPUTER
![Page 7: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/7.jpg)
7
Lesson 1.2: Screen Saver
Copyright © 2012 CyberSecurity MalaysiaPASSWORD PROTECT YOUR SCREEN SAVER
![Page 8: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/8.jpg)
8
Lesson 1.3: User Management
![Page 9: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/9.jpg)
9
Lesson 2: Passwords
2.1 Password Strength 2.2 Managing Accounts2.3 Managing Password2.4 Dangerous Passwords
Copyright © 2012 CyberSecurity Malaysia
![Page 10: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/10.jpg)
Copyright © 2011 CyberSecurity Malaysia 10
Lesson 2.1: Password Strength
https://www.microsoft.com/security/pc-security/password-checker.aspx
INSURE THE QUALITY
OF YOUR PASSWORD
![Page 11: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/11.jpg)
11
Lesson 2.2: Managing Accounts
DON’T USE THE SAME PASSWORD
Copyright © 2012 CyberSecurity Malaysia
![Page 12: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/12.jpg)
Avoid creating passwords that use:
Dictionary words in any language.
Words spelled backwards, common misspellings, and abbreviations.
Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).
Personal information. Your name, birthday, driver's license, passport number, or similar information.
12
Lesson 2.3: Managing Password
Copyright © 2012 CyberSecurity Malaysia
HAVE GOOD PASSWORD HABITS
![Page 13: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/13.jpg)
13
Lesson 2.4: Dangerous Password
Avoid the obvious
![Page 14: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/14.jpg)
14
3) Antivirus Software
Antivirus Software3.1 Antivirus Categories3.2 Online Scanner3.3 Signature Updates3.4 Signature Updates
Copyright © 2012 CyberSecurity Malaysia
![Page 15: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/15.jpg)
15
Lesson 3.1: Antivirus Categories
Free Edition Antivirus
Commercial Antivirus
Online Scanner
Copyright © 2012 CyberSecurity Malaysia
![Page 16: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/16.jpg)
Copyright © 2011 CyberSecurity Malaysia 16
Lesson 3.2: Online Scanner
![Page 17: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/17.jpg)
Copyright © 2011 CyberSecurity Malaysia 17
Lesson 3.3: Antivirus Comparatives
http://www.av-comparatives.org/
![Page 18: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/18.jpg)
18
Lesson 3.4: Signature Updates
Virus Definition
Computer
Copyright © 2012 CyberSecurity Malaysia
![Page 19: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/19.jpg)
19
4) Operating System
Operating System4.1 Service Pack 4.2 Validate Win & Office4.3 Microsoft Support4.4 Windows Security Centre
Copyright © 2012 CyberSecurity Malaysia
![Page 20: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/20.jpg)
20
Lesson 4.1: Service Pack
http://windows.microsoft.com/en-US/windows/downloads/service-packs
Copyright © 2012 CyberSecurity Malaysia
![Page 21: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/21.jpg)
21
Lesson 4.2: Validate Windows and Office
http://www.microsoft.com/genuine/validate/
Copyright © 2012 CyberSecurity Malaysia
![Page 22: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/22.jpg)
22
Lesson 4.3.1: Microsoft Fix it
http://support.microsoft.com/fixit/
Copyright © 2012 CyberSecurity Malaysia
![Page 23: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/23.jpg)
23
Lesson 4.3.2: Microsoft Product Lifecycle
http://support.microsoft.com/gp/lifeselect
Copyright © 2012 CyberSecurity Malaysia
![Page 24: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/24.jpg)
Copyright © 2011 CyberSecurity Malaysia 24
Lesson 4.4: Windows Security Center
Windows Start > Control Panel > Security > Check this computer’s security status
![Page 25: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/25.jpg)
25
5) Application
Application5.1 Paid Application 5.2 Cracked Application5.3 Malicious Application
Copyright © 2012 CyberSecurity Malaysia
![Page 26: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/26.jpg)
26
Lesson 5.1: Paid Application
Copyright © 2012 CyberSecurity Malaysia
![Page 27: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/27.jpg)
27
Lesson 5.2: Cracked Application
Copyright © 2012 CyberSecurity Malaysia
![Page 28: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/28.jpg)
28
Lesson 5.3: Malicious Application
Copyright © 2012 CyberSecurity Malaysia
Rogue Antivirus
![Page 29: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/29.jpg)
29
Lesson 5.3.1: Potentially Unwanted Program
Copyright © 2012 CyberSecurity Malaysia
![Page 30: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/30.jpg)
30
6) Patches & Updates
Patches Updates6.1 Microsoft Download Centre6.2 Windows Updates6.3 Third Party Updates
Copyright © 2012 CyberSecurity Malaysia
![Page 31: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/31.jpg)
Copyright © 2011 CyberSecurity Malaysia 31
Lesson 6.1: Microsoft Download Center
http://www.microsoft.com/download/en/default.aspx
![Page 32: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/32.jpg)
32
Lesson 6.2: Windows Updates
![Page 33: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/33.jpg)
Copyright © 2011 CyberSecurity Malaysia 33
Lesson 6.3: Third Party Updates
http://secunia.com/vulnerability_scanning/personal/
![Page 34: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/34.jpg)
34
7) Internet Access
Internet Access7.1 Wired Network7.2 Wireless Network7.3 Other Computer
Copyright © 2012 CyberSecurity Malaysia
![Page 35: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/35.jpg)
35
Lesson 7.1: Wired Network
REMOTE CODE EXECUTION
VIRUS & MALWARE
WEB APP ATTACKS
Copyright © 2012 CyberSecurity Malaysia
![Page 36: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/36.jpg)
Copyright © 2011 CyberSecurity Malaysia 36
Lesson 7.2 Wireless Network
![Page 37: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/37.jpg)
37
Lesson 7.3: Other Computer
Security Questions
Copyright © 2012 CyberSecurity Malaysia
![Page 38: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/38.jpg)
38
8) Networking Devices
Networking Devices8.1 Microsoft Keyboard8.2 Webcam
Copyright © 2012 CyberSecurity Malaysia
![Page 39: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/39.jpg)
39
Lesson 8.1: Wireless Keyboard
https://www.dreamlab.net/files/articles/27_Mhz_keyboard_insecurities.pdf
The team of Dreamlab Technologies has hacked two wireless keyboards fromMicrosoft. Dreamlab warns that it is possible to “sniff” the keyboard strokes -possible to capture and decrypt keystrokes - user names, passwords, bankdetails or confidential correspondence can be very easily copied.
Copyright © 2012 CyberSecurity Malaysia
![Page 40: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/40.jpg)
Copyright © 2011 CyberSecurity Malaysia 40
Lesson 8.2: Webcam
Webcam
Copyright © 2012 CyberSecurity Malaysia
![Page 41: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/41.jpg)
41
9) External Devices
External Devices9.1 Thumb Drive, External HD, CD/DVD9.2 AutoPlay
Copyright © 2012 CyberSecurity Malaysia
![Page 42: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/42.jpg)
42
Lesson 9.2: AutoPlay
Copyright © 2012 CyberSecurity Malaysia
![Page 43: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/43.jpg)
43
10) Online Surfing
Online Surfing10.1 Internet Browser10.2 Malicious website10.3 Phishing website
Copyright © 2012 CyberSecurity Malaysia
![Page 44: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/44.jpg)
Copyright © 2011 CyberSecurity Malaysia 44
Lesson 10.1 Web Browser
![Page 45: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/45.jpg)
Copyright © 2011 CyberSecurity Malaysia 45
Lesson 10.1.1: Browser Preferences
![Page 46: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/46.jpg)
Copyright © 2011 CyberSecurity Malaysia 46
Lesson 10.1.2: Clear Browsing Data
![Page 47: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/47.jpg)
47
Lesson 10.2: Malicious Website
![Page 48: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/48.jpg)
Copyright © 2011 CyberSecurity Malaysia 48
Lesson 10.3: Phishing Attacks
![Page 49: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/49.jpg)
Copyright © 2012 CyberSecurity Malaysia 49
Lesson 10.3.1: Check the Suspicious Website
![Page 50: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/50.jpg)
50
Summary
Windows Logon
Password
Antivirus Software
Operating System
Application
Patches Update
Internet Access
Networking Devices
External Devices
Online Surfing
Act Now!
Copyright © 2012 CyberSecurity Malaysia
![Page 51: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/51.jpg)
51
Objectives
Copyright © 2012 CyberSecurity Malaysia
we will learn 10 lessons for
protecting our computers by
securing the following
Windows login
PasswordsAntivirus Software
Operating System
Applications PatchesInternet Access
Networking Devices
External Devices
Online Surfing
![Page 52: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/52.jpg)
Copyright © 2012 CyberSecurity Malaysia 52
Action Time!
“If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology”- Bruce Schneier
Netbook Laptop Desktop
![Page 53: Secure the Computer](https://reader033.fdocuments.net/reader033/viewer/2022042905/577cc7851a28aba711a1334d/html5/thumbnails/53.jpg)
Corporate Office:
CyberSecurity Malaysia,Level 8, Block A,Mines Waterfront Business Park,No 3 Jalan Tasik, The Mines Resort City,43300 Seri Kembangan,Selangor Darul Ehsan, Malaysia.
T +603 8946 0999F +603 8946 0888
www.cybersecurity.my
Copyright © 2011 CyberSecurity Malaysia 53