SlideShare a Scribd company logo
1 of 90
:
: 55500777 , Fax . 215523 ,
Email : somvang.phengsavanh@ltc.laotel.com
Last update 13/06/2013
Part I
Last update 13/06/2013
( Internet Threat )

Last update 13/06/2013
Malware

Last update 13/06/2013
Virus

Last update 13/06/2013
Botnet
 Bot
Worm Trojan
Last update 13/06/2013
Phishing

Last update 13/06/2013
( Spyware ).

Last update 13/06/2013
Adware
Last update 13/06/2013
•Adware software
download
.
• Adware Spyware
hijacker
Browser hijacker
malware
Start page, error page
search page
malware
Last update 13/06/2013
Identity Theft / Social
Engineering

Indentity
Theft
WEB “myspace”
:
“rnyspace”
Email Address
Last update 13/06/2013
Social
Network
Hacker
http://www.dek-d.com/board/view/2529707/
Last update 13/06/2013
SQL Injection
SQL Login
SELECT UserID
FROM User
WHERE UserName = '$userName'
AND Password = '$password'
userName password POST input tag Username Password
SQL Injection Post input tag
WHERE CLAUSE
User name: 1' = OR '1 = 1
Password: 1' = OR '1 = 1
SQL
SELECT UserID
FROM User
WHERE UserName = '1' = OR '1 = 1'
AND Password = '1' = OR '1 = 1'
Last update 13/06/2013
SQL Injection
hacker
SQL
Input UI
INSERT, UPDATE, DELETE, DROP
form input
post
Ransomware

”
”
Last update 13/06/2013
http://www.androidgyan.com/th/20
12/10/ransomware-internet-
security-risks.html
( OS )
.

.
(OS).
Windows, MacOS, Linux
,
OS
.
 Last update 13/06/2013
Top 10 of Social Network
1.
Facebook
2. Twitter
3.Google
4.Myspace
5.LinkedIn
6. Orkut
7. Friendster
8. Hi5
9. BeBo
10. NetLog
Last update 13/06/2013
Top 10 of Anti-VIRUS
Last update 13/06/2013
Online Anti-VIRUS
https://www.virustotal.com/en/Last update 13/06/2013
The top threats for 2013, as
seen by McAfee
 Mobile threats
Mobile worm infections could go on a shopping spree in 2013 -- once embedded in a
smartphone or tablet after a dodgy download, they'll purchase malicious apps and do
their stealing through near-field communications (NFC) technology, McAfee says. NFC
and other "tap and pay" mechanisms could also make it easier for our phones to become
infiltrated. McAfee suggests that "bump and infect" scenarios will become more common
in order to steal money and that these kinds of malware will be most commonly found in
densely populated areas including airports and malls.
 In addition, mobile malware that prevents your smartphone or tablet from updating
security software is expected to rise.
 Build your own ransomware
McAfee predicts that ransomware "kits" designed around mobile technology will rise, allowing people
without advanced programming skills to be able to more easily attempt to extort money out of the
general public, especially through the Windows PC platform, which saw reported attacks triple in 2012.
Ransomware differs from backdoors, keyloggers or Trojans as it "locks" a system, leaving users without
the means to access their data or system. This is where the malicious software comes in; pay up or
potentially lose your data.
Last update 13/06/2013
The top threats for 2013, as
seen by McAfee
 Attacks focused on new platforms
The report suggests that we will see a "rapid development" in ways to attack both
Microsoft'snew Windows 8 platform and HTML5, a standard for Web-based applications.
Rootkits, the use of bootkit techniques and attacks which target master boot records, the
BIOS and volume boot records are expected to diversify and evolve. Windows 8 platform is
expected to be targeted through malware as well as phishing techniques. McAfee warns that
platform upgrades will not necessarily protect your system, although it is deemed more
secure that previous versions.
 An increase in large-scale attacks
According to the firm, large scale attacks reminiscent of Stuxnet or Flame, designed to destroy infrastructure
rather than based on purely financial gain, will firmly take hold in 2013. Used in order to cripple
businesses, steal intellectual property and simply cause as much damage as possible, large-scale hacktivism
can be devastating for businesses that are often vulnerable to the simplest methods, such as distributed
denial-of-service (DDoS) attacks.
Last update 13/06/2013
The top threats for 2013, as
seen by McAfee
 Snowshoes and spam
In addition to an increase in attacks based on botnets, "shoeshoe" spamming of
legitimate products available online, made through numerous IP addresses, is expected
to be a cyberattack trend in 2013. Well-known businesses can fall prey to shady
marketing companies that promise e-mail address lists of potential customers, and
blatant spamming still goes unchecked.
 Hacking as a service
Hacking "as a service" is expected to rise, mainly due to the rise of invitation-only and fee-
paying professional hacker forums available to only those who have guarantors to ensure their
authenticity. Based on e-commerce shopping cart models, it is expected that anonymity will be
maintained through anonymous payment methods including Liberty Reserve.
 The decline of Anonymous, but a rise in
extreme hacktivism
McAfee argues that a lack of structure and organization in the hacking collective referred to as Anonymous has
impacted the idea's reputation. Misinformation, false claims and hacking for the simple joy of it may result in the
collective's political claims taking a beating. As a result, success and fame will decline -- but higher-level
professional hacking groups may take up the slack, and promote a rise in military, religious, political and
"extreme" campaign attacks.
Last update 13/06/2013
Last update 13/06/2013

 (
‘‘ ’’)





 Last update 13/06/2013
No.1
​ ​ ​
,
Last update 13/06/2013
No.
USB​ ​ ​ , ​ ​ ​
, Last update 13/06/2013
No.
CD ​ , ​
​ ​ ​ ​ ​
​
Last update 13/06/2013
No.
CD/USB
,
,
Last update 13/06/2013
No.
-
Last update 13/06/2013
No.
USB ​ ​
CD, USB ,
Last update 13/06/2013
No.
Last update 13/06/2013
No.
[ ]
Windows Update
Safety & Security
http://www.microsoft.com/securitity/
Windows Update
Last update 13/06/2013
No.
Last update 13/06/2013
No.
Last update 13/06/2013
No.
Last update 13/06/2013
No. ( Pass
  
ABC123
ABC123
?
Last update 13/06/2013
No.
(
Virus )
ID
Last update 13/06/2013
No.
Last update 13/06/2013
No.
FAX
FAX
FAX
!!!
To
!!!!
Last update 13/06/2013
No.
( E-mails )
TO, CC, BCC
Last update 13/06/2013
No.
( E-
mails )
Last update 13/06/2013
No.
Last update 13/06/2013
No.
Last update 13/06/2013
No.
Last update 13/06/2013
No.
Last update 13/06/2013
No.
「
」
Last update 13/06/2013
No.
Last update 13/06/2013
No.
Last update 13/06/2013
No.
!
!
Last update 13/06/2013
Part III
Last update 13/06/2013
( User Account )
.
(
User Account )
Last update 13/06/2013
Notebook, Desktop ​ ​
​ ​ ​ ​
​ ​ MAC Address ​
​ ​ ​​ ​ ​ ​
​ ​​ ​ ​ ​ ​ ​
.
2
Last update 13/06/2013
3  ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ : USB
, Storage Device, External Hard Drive, ​ Floppy disk
​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​​ ​ ​ ​ ​
password ​ . ​ ​ ​
​ ​ ​ ​​ ​ ​
​ ​ ​ ​ ​ ​​ ​ . ​ ​
​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​
​ ​ ​​
​ .
Last update 13/06/2013
4

​ ​
Password
Screen Saver
​ ​ ​
​ ​​ ​
​ ​ ​ ​
Last update 13/06/2013
5  ​​ ​ ​​ ​ ​ ​
​ ​ ​ , ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​ ​ ​
 ​ ​ ​, ​
​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ :
Hup, Switch, Bridge, Router ​ Access point ​
​ ​ ​ ​ ​.
Network Network
Last update 13/06/2013
6  ​​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​ : ​
​ scan port, sniffer, hacker ​ ​ .
 ​​ , ​ ​ ​ , ​ , ​
, ​ ​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ .
Last update 13/06/2013
7  ​ ​ ​ ​ ​ ​ ​ ​ ​​ ​
​ ​ ​ ​ ​ ​ : ​ , ​ ,
​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ Share file ​ .
 ​ ​ ​ IP Address ​ ​
.
 ​​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​
​ IP Address, Bridging, Routing ​ ​
Internet Traffic ​ ​ ​ ​ ​ ​ ​ ​ ​ ​
Proxy, DHCP Server, Bridge Router ​ ​ ​ ​
​ ​ ​.
Last update 13/06/2013
8
 ​ ​ ​ ​ ​ : ​ ​ ​
MS Excel, MS Powerpoint ​ ​ ​ ​
​ ​ :
1. ​ ​ ​ ​ ​
, ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​ ​ ​ ​
​.pdf .
2. ​ ​​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​
​ ​ .
Last update 13/06/2013
9
 Software ​ ​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ .
​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ .
Last update 13/06/2013
10
 Sofware
.
Last update 13/06/2013
11
 ​​ Internet ​ ​
​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ .
LTC
Network (
Billing ,
Accounting
, POS … ) ADSL , WIFI
, HSPA …
Last update 13/06/2013
12  E-mail account ​ ​ ​
​ ​ ​ ​​​
​ ​ ​ ​​ ​
​ ​
.
xxxxxxxx@laotel.com
xxxxxxxx@ltc.laotel.com
Last update 13/06/2013
13  E-mail Internet
Posters .
Last update 13/06/2013
14
:
(
Application System ),
.
.
Last update 13/06/2013
15
Share files
.
Last update 13/06/2013
16

.
Last update 13/06/2013
17 
Password
Poster
.
Last update 13/06/2013
18
 ​ ​ ​ ​ ​ ​ ​ ​ ​
​​ ​ ​ ​
Antivirus/Anti-Spyware ​ ​ IT ​
​ ​ . ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​ .
​ ​ ​​ ​ ​ ​ Update
​ Virus (Virus Definition) ​ ​
​ ​ ​ ​ ​ .
 ​ ​ ​ ​ ​ ​ ​ ​ E-
mail, USB Storage Device External
Hard Drive ​ ​ ​ ​
Antivirus Copy Transfer ​
​ ​ ​ ​ . Last update 13/06/2013
Last update 13/06/2013
 Password Server ​
Network ​ ​
​ ​ ​
​ ​ ​
​ ​ ​ ​​
Password 06 ​
​ ​ ​ ​
​ ​ ​​ ​
​ ​ ​ ​ ​ ​ ​
​ .
 Default Password ​ ​
Application ​
​ ​ ​ ​ ​ ​ ​
​ ​ ​​ ​ ​ ​
​ ​​ ​ ​ .
 ​ ​ ​ ​ ​
06 ​ Password
Server ​ ​ NetworkLast update 13/06/2013
20 
 Server
Network
Authentication logs, Web
Server Logs, Mail Server
logs, File Server logs
, Remote access
Logs,
( Application
logs )
( Login-
Logout logs )
( Login Attempts )
commandline
firewall logs
3
. Last update 13/06/2013
21  Server ​ ​
​ ​ ​ ​
​ Port service
​ ​ ​ .
 Server ​ ​ ​ ​
​ ​ Antivirus /
Anti-Spyware ​ ​
​ ​ ​ ​
​ ​
​ ​ ​ .
 Server ​ ​ ​
​ ​ Server
​ ​
Backup, ​ ​ ​
​ ​Last update 13/06/2013
22  ​ Remote Access /
Administration ​ ​
​
Secure Channels ​
: SSH ​ VPN ​
​ .
 ​ ​ ​​ ​ ​
​ ​ ​ ​
​ ​ Remote
Access ​ ​
System
Administrator ​
​ ​ ​ ​
​ ​ ​
​​
Last update 13/06/2013
23

patch
(system software)
DBMS web
server
.

Firewall
.

:
◦
.
◦ .
◦
.
Last update 13/06/2013
24

parameter
parameter
.
.
 (tools)
Last update 13/06/2013
25
◦
( Operating System ) ,
( Application
System )
.
◦
:

.
 ( Media ).
 ( Copy ). Last update 13/06/2013
26
 ( log book )
.

1
.

.

Last update 13/06/2013
27

( computer
operator )
- ,
,
. Last update 13/06/2013
28
•
.
•
, , Hard disk ,
(CPU)
(capacity) .
•
Billing , OCS , Internet .
Last update 13/06/2013
29
 ​ ​ ​
​ ​ ​ supplier,
Third party ​ Outsource ​
​ ​ ​ ​ ​ ​ ​ .
 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​​ Development System ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​ ​
​ ​ .
 ​ ​ ​ Supplier, Third party ​ Outsource
​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​
2
Last update 13/06/2013
Last update 13/06/2013
30

,
.
:
 ( Stickly Confidential )
Last update 13/06/2013
31
◦
( storage ) , ( input ) ,
(operate) (output)
(distributed database)
.
◦
Last update 13/06/2013
32
 ​ ​ ​ ​ ​ /
​ ​ ​ ​ ​ ​ ​
​ ​ ​ : ​ ​ ​ ​
, Flowchart ​, Software Supplier ​
​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ .
 ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ .
 ​ ​ ​ ​ ​Last update 13/06/2013
33
 ​​ ​ ​ ​ ​ ​
​ ​ ​ Recycle.
 ​ ​ ​ ​ ​ ​ ​
​ ​ ​ ​ ​ ​
2048 bit ​ RSA
DSS.
 Encrypt ​
Last update 13/06/2013
Last update 13/06/2013
34
◦
, ,
.
◦
(emergency
change)
.
◦
.
◦
(
electronic transaction email )
Last update 13/06/2013
35
◦
( operation )
( security ) (
functionality ) .
◦
.
◦
(develop environment)
(promotion environment)
Last update 13/06/2013
36
◦
.
◦ (security)
(availability )
.
◦
Last update 13/06/2013
37
◦
.
◦
.
◦
, ,
, Last update 13/06/2013
Last update 13/06/2013

More Related Content

What's hot (6)

THE GAME OF PHISHING
THE GAME OF PHISHINGTHE GAME OF PHISHING
THE GAME OF PHISHING
 
Zeus
ZeusZeus
Zeus
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
OlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_FinalOlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_Final
 
50120140504017
5012014050401750120140504017
50120140504017
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook
 

Similar to Top Internet Threats and Security Tips

When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiYury Chemerkin
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiSTO STRATEGY
 
Operations security - SyPy Dec 2014 (Sydney Python users)
Operations security - SyPy Dec 2014 (Sydney Python users)Operations security - SyPy Dec 2014 (Sydney Python users)
Operations security - SyPy Dec 2014 (Sydney Python users)Mikko Ohtamaa
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Operations Security - SF Bitcoin Hackday March 2015
Operations Security - SF Bitcoin Hackday March 2015Operations Security - SF Bitcoin Hackday March 2015
Operations Security - SF Bitcoin Hackday March 2015Mikko Ohtamaa
 
Operations security (OPSEC)
Operations security (OPSEC)Operations security (OPSEC)
Operations security (OPSEC)Mikko Ohtamaa
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
internet privacy and myths (second edition)
internet privacy and myths (second edition)internet privacy and myths (second edition)
internet privacy and myths (second edition)Christos Beretas
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacksJohn Davis
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Aniq Eastrarulkhair
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270Dario
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문Jiransoft Korea
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Denis Gorchakov
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10William Mann
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threatsmahesh43211
 
What’s the Difference Between Identity Fraud and Identity Theft?
What’s the Difference Between Identity Fraud and Identity Theft?What’s the Difference Between Identity Fraud and Identity Theft?
What’s the Difference Between Identity Fraud and Identity Theft?K7 Computing Pvt Ltd
 

Similar to Top Internet Threats and Security Tips (20)

When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Operations security - SyPy Dec 2014 (Sydney Python users)
Operations security - SyPy Dec 2014 (Sydney Python users)Operations security - SyPy Dec 2014 (Sydney Python users)
Operations security - SyPy Dec 2014 (Sydney Python users)
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
Operations Security - SF Bitcoin Hackday March 2015
Operations Security - SF Bitcoin Hackday March 2015Operations Security - SF Bitcoin Hackday March 2015
Operations Security - SF Bitcoin Hackday March 2015
 
Operations security (OPSEC)
Operations security (OPSEC)Operations security (OPSEC)
Operations security (OPSEC)
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
internet privacy and myths (second edition)
internet privacy and myths (second edition)internet privacy and myths (second edition)
internet privacy and myths (second edition)
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Newsbytes april2013
Newsbytes april2013Newsbytes april2013
Newsbytes april2013
 
What’s the Difference Between Identity Fraud and Identity Theft?
What’s the Difference Between Identity Fraud and Identity Theft?What’s the Difference Between Identity Fraud and Identity Theft?
What’s the Difference Between Identity Fraud and Identity Theft?
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Top Internet Threats and Security Tips

  • 1. : : 55500777 , Fax . 215523 , Email : somvang.phengsavanh@ltc.laotel.com Last update 13/06/2013
  • 2. Part I Last update 13/06/2013
  • 3. ( Internet Threat )  Last update 13/06/2013
  • 8. ( Spyware ).  Last update 13/06/2013
  • 9. Adware Last update 13/06/2013 •Adware software download . • Adware Spyware
  • 10. hijacker Browser hijacker malware Start page, error page search page malware Last update 13/06/2013
  • 11. Identity Theft / Social Engineering  Indentity Theft WEB “myspace” : “rnyspace” Email Address Last update 13/06/2013 Social Network
  • 13. SQL Injection SQL Login SELECT UserID FROM User WHERE UserName = '$userName' AND Password = '$password' userName password POST input tag Username Password SQL Injection Post input tag WHERE CLAUSE User name: 1' = OR '1 = 1 Password: 1' = OR '1 = 1 SQL SELECT UserID FROM User WHERE UserName = '1' = OR '1 = 1' AND Password = '1' = OR '1 = 1' Last update 13/06/2013 SQL Injection hacker SQL Input UI INSERT, UPDATE, DELETE, DROP form input post
  • 15. ( OS ) .  . (OS). Windows, MacOS, Linux , OS .  Last update 13/06/2013
  • 16. Top 10 of Social Network 1. Facebook 2. Twitter 3.Google 4.Myspace 5.LinkedIn 6. Orkut 7. Friendster 8. Hi5 9. BeBo 10. NetLog Last update 13/06/2013
  • 17. Top 10 of Anti-VIRUS Last update 13/06/2013
  • 19. The top threats for 2013, as seen by McAfee  Mobile threats Mobile worm infections could go on a shopping spree in 2013 -- once embedded in a smartphone or tablet after a dodgy download, they'll purchase malicious apps and do their stealing through near-field communications (NFC) technology, McAfee says. NFC and other "tap and pay" mechanisms could also make it easier for our phones to become infiltrated. McAfee suggests that "bump and infect" scenarios will become more common in order to steal money and that these kinds of malware will be most commonly found in densely populated areas including airports and malls.  In addition, mobile malware that prevents your smartphone or tablet from updating security software is expected to rise.  Build your own ransomware McAfee predicts that ransomware "kits" designed around mobile technology will rise, allowing people without advanced programming skills to be able to more easily attempt to extort money out of the general public, especially through the Windows PC platform, which saw reported attacks triple in 2012. Ransomware differs from backdoors, keyloggers or Trojans as it "locks" a system, leaving users without the means to access their data or system. This is where the malicious software comes in; pay up or potentially lose your data. Last update 13/06/2013
  • 20. The top threats for 2013, as seen by McAfee  Attacks focused on new platforms The report suggests that we will see a "rapid development" in ways to attack both Microsoft'snew Windows 8 platform and HTML5, a standard for Web-based applications. Rootkits, the use of bootkit techniques and attacks which target master boot records, the BIOS and volume boot records are expected to diversify and evolve. Windows 8 platform is expected to be targeted through malware as well as phishing techniques. McAfee warns that platform upgrades will not necessarily protect your system, although it is deemed more secure that previous versions.  An increase in large-scale attacks According to the firm, large scale attacks reminiscent of Stuxnet or Flame, designed to destroy infrastructure rather than based on purely financial gain, will firmly take hold in 2013. Used in order to cripple businesses, steal intellectual property and simply cause as much damage as possible, large-scale hacktivism can be devastating for businesses that are often vulnerable to the simplest methods, such as distributed denial-of-service (DDoS) attacks. Last update 13/06/2013
  • 21. The top threats for 2013, as seen by McAfee  Snowshoes and spam In addition to an increase in attacks based on botnets, "shoeshoe" spamming of legitimate products available online, made through numerous IP addresses, is expected to be a cyberattack trend in 2013. Well-known businesses can fall prey to shady marketing companies that promise e-mail address lists of potential customers, and blatant spamming still goes unchecked.  Hacking as a service Hacking "as a service" is expected to rise, mainly due to the rise of invitation-only and fee- paying professional hacker forums available to only those who have guarantors to ensure their authenticity. Based on e-commerce shopping cart models, it is expected that anonymity will be maintained through anonymous payment methods including Liberty Reserve.  The decline of Anonymous, but a rise in extreme hacktivism McAfee argues that a lack of structure and organization in the hacking collective referred to as Anonymous has impacted the idea's reputation. Misinformation, false claims and hacking for the simple joy of it may result in the collective's political claims taking a beating. As a result, success and fame will decline -- but higher-level professional hacking groups may take up the slack, and promote a rise in military, religious, political and "extreme" campaign attacks. Last update 13/06/2013
  • 24. No.1 ​ ​ ​ , Last update 13/06/2013
  • 25. No. USB​ ​ ​ , ​ ​ ​ , Last update 13/06/2013
  • 26. No. CD ​ , ​ ​ ​ ​ ​ ​ ​ Last update 13/06/2013
  • 29. No. USB ​ ​ CD, USB , Last update 13/06/2013
  • 31. No. [ ] Windows Update Safety & Security http://www.microsoft.com/securitity/ Windows Update Last update 13/06/2013
  • 35. No. ( Pass    ABC123 ABC123 ? Last update 13/06/2013
  • 39. No. ( E-mails ) TO, CC, BCC Last update 13/06/2013
  • 40. No. ( E- mails ) Last update 13/06/2013
  • 49. Part III Last update 13/06/2013
  • 50. ( User Account ) . ( User Account ) Last update 13/06/2013
  • 51. Notebook, Desktop ​ ​ ​ ​ ​ ​ ​ ​ MAC Address ​ ​ ​ ​​ ​ ​ ​ ​ ​​ ​ ​ ​ ​ ​ . 2 Last update 13/06/2013
  • 52. 3  ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ : USB , Storage Device, External Hard Drive, ​ Floppy disk ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​​ ​ ​ ​ ​ password ​ . ​ ​ ​ ​ ​ ​ ​​ ​ ​ ​ ​ ​ ​ ​ ​​ ​ . ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​​ ​ . Last update 13/06/2013
  • 53. 4  ​ ​ Password Screen Saver ​ ​ ​ ​ ​​ ​ ​ ​ ​ ​ Last update 13/06/2013
  • 54. 5  ​​ ​ ​​ ​ ​ ​ ​ ​ ​ , ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​  ​ ​ ​, ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ : Hup, Switch, Bridge, Router ​ Access point ​ ​ ​ ​ ​ ​. Network Network Last update 13/06/2013
  • 55. 6  ​​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ : ​ ​ scan port, sniffer, hacker ​ ​ .  ​​ , ​ ​ ​ , ​ , ​ , ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ . Last update 13/06/2013
  • 56. 7  ​ ​ ​ ​ ​ ​ ​ ​ ​​ ​ ​ ​ ​ ​ ​ ​ : ​ , ​ , ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ Share file ​ .  ​ ​ ​ IP Address ​ ​ .  ​​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ IP Address, Bridging, Routing ​ ​ Internet Traffic ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ Proxy, DHCP Server, Bridge Router ​ ​ ​ ​ ​ ​ ​. Last update 13/06/2013
  • 57. 8  ​ ​ ​ ​ ​ : ​ ​ ​ MS Excel, MS Powerpoint ​ ​ ​ ​ ​ ​ : 1. ​ ​ ​ ​ ​ , ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​.pdf . 2. ​ ​​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ . Last update 13/06/2013
  • 58. 9  Software ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ . ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ . Last update 13/06/2013
  • 60. 11  ​​ Internet ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ . LTC Network ( Billing , Accounting , POS … ) ADSL , WIFI , HSPA … Last update 13/06/2013
  • 61. 12  E-mail account ​ ​ ​ ​ ​ ​ ​​​ ​ ​ ​ ​​ ​ ​ ​ . xxxxxxxx@laotel.com xxxxxxxx@ltc.laotel.com Last update 13/06/2013
  • 62. 13  E-mail Internet Posters . Last update 13/06/2013
  • 67. 18  ​ ​ ​ ​ ​ ​ ​ ​ ​ ​​ ​ ​ ​ Antivirus/Anti-Spyware ​ ​ IT ​ ​ ​ . ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ . ​ ​ ​​ ​ ​ ​ Update ​ Virus (Virus Definition) ​ ​ ​ ​ ​ ​ ​ .  ​ ​ ​ ​ ​ ​ ​ ​ E- mail, USB Storage Device External Hard Drive ​ ​ ​ ​ Antivirus Copy Transfer ​ ​ ​ ​ ​ . Last update 13/06/2013
  • 69.  Password Server ​ Network ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​​ Password 06 ​ ​ ​ ​ ​ ​ ​ ​​ ​ ​ ​ ​ ​ ​ ​ ​ ​ .  Default Password ​ ​ Application ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​​ ​ ​ ​ ​ ​​ ​ ​ .  ​ ​ ​ ​ ​ 06 ​ Password Server ​ ​ NetworkLast update 13/06/2013
  • 70. 20   Server Network Authentication logs, Web Server Logs, Mail Server logs, File Server logs , Remote access Logs, ( Application logs ) ( Login- Logout logs ) ( Login Attempts ) commandline firewall logs 3 . Last update 13/06/2013
  • 71. 21  Server ​ ​ ​ ​ ​ ​ ​ Port service ​ ​ ​ .  Server ​ ​ ​ ​ ​ ​ Antivirus / Anti-Spyware ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ .  Server ​ ​ ​ ​ ​ Server ​ ​ Backup, ​ ​ ​ ​ ​Last update 13/06/2013
  • 72. 22  ​ Remote Access / Administration ​ ​ ​ Secure Channels ​ : SSH ​ VPN ​ ​ .  ​ ​ ​​ ​ ​ ​ ​ ​ ​ ​ ​ Remote Access ​ ​ System Administrator ​ ​ ​ ​ ​ ​ ​ ​ ​​ Last update 13/06/2013
  • 75. 25 ◦ ( Operating System ) , ( Application System ) . ◦ :  .  ( Media ).  ( Copy ). Last update 13/06/2013
  • 76. 26  ( log book ) .  1 .  .  Last update 13/06/2013
  • 77. 27  ( computer operator ) - , , . Last update 13/06/2013
  • 78. 28 • . • , , Hard disk , (CPU) (capacity) . • Billing , OCS , Internet . Last update 13/06/2013
  • 79. 29  ​ ​ ​ ​ ​ ​ supplier, Third party ​ Outsource ​ ​ ​ ​ ​ ​ ​ ​ .  ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​​ Development System ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ .  ​ ​ ​ Supplier, Third party ​ Outsource ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 2 Last update 13/06/2013
  • 81. 30  , . :  ( Stickly Confidential ) Last update 13/06/2013
  • 82. 31 ◦ ( storage ) , ( input ) , (operate) (output) (distributed database) . ◦ Last update 13/06/2013
  • 83. 32  ​ ​ ​ ​ ​ / ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ : ​ ​ ​ ​ , Flowchart ​, Software Supplier ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ .  ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ .  ​ ​ ​ ​ ​Last update 13/06/2013
  • 84. 33  ​​ ​ ​ ​ ​ ​ ​ ​ ​ Recycle.  ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 2048 bit ​ RSA DSS.  Encrypt ​ Last update 13/06/2013
  • 87. 35 ◦ ( operation ) ( security ) ( functionality ) . ◦ . ◦ (develop environment) (promotion environment) Last update 13/06/2013
  • 89. 37 ◦ . ◦ . ◦ , , , Last update 13/06/2013