7. • Where are the threats from
– Russian Mafia
– Triads
• When
– Websites (upto 80% of legitimate websites are infected
1in 150)
– P2P Software (Limewire)
• How?
– You may see a pop up
– You may see nothing
Where, When, How will I Know
8. Research by Kaspersky Lab in 2010 suggests that 1 in
every how many legitimate websites is infected by
malware?
50%
25%
20%
5%
0%
10%
20%
30%
40%
50%
60%
12 150 275 No response
PercentageofRespondents
10. • Sorry I personally don’t believe you are.
– Apple’s penetration of the market
– The lack of security Products
• My advice is protect your mac now, by
installing a 3rd Party Anti-Virus product
I’m Safe I use a Mac
11. • unsolicited or undesired bulk electronic
messages. There are many types of electronic
spam.
• 50 – 80 % of all emails are Spam.
• Possibly used as a delivery method for Viruses,
worms etc.
• Using Bandwidth.
• Waste of Storage.
SPAM
12. Percentage of emails sent in April 2011 were classified
as SPAM?
5%
35%
50%
10%
0%
10%
20%
30%
40%
50%
60%
16.8% 58.7% 72.9% No response
PercentageofRespondents
13. • Use an effective anti – spam tool
– Piece of software installed locally
– Carried out at your ISP
– Or through a hosted service
• When using an address publically, use a
different address
• Hide email addresses in websites.
Spam – what you can do!
14. True or false – to stop receiving spam you should
always click the ‘unsubscribe’ link in the email?
15%
75%
10%
0%
10%
20%
30%
40%
50%
60%
70%
80%
TRUE FALSE No response
PercentageofRespondents
15. • Network Devices (Routers, Switches etc.)
• Hard Drive Failure
• End Result of Virus
• Accidental deletion
Physical Security
16. According to IDC statistics, what percentage of
businesses that suffer a major data loss cease trading
within 12 months?
45%
15%
25%
15%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Up to 30% Up to 50% Up to 70% No response
PercentageofRespondents
18. • These measure can be thought of those similar to the ones we carry out on our cars (checking
lights, fluid levels etc.)
• Get information about what's new
• Sign up to receive notification when patches are available for the software you have
installed. You can usually do this by going to the manufacturer's Web site.
• Register new software. Software publishers can keep you informed about patches and updates.
You can opt in or opt out of other services they offer.
• Subscribe to free Microsoft product security bulletins. Microsoft offers an e-mail alert service for
home users, as well as one for IT Professionals and others with a strong understanding of technical
issues. (http://www.microsoft.com/technet/security/bulletin/notify.mspx)
• Install software updates immediately.
Regular Maintenance
19. • Back up your files. Backing up files helps you protect your information from accidental erasure or
from a hardware failure, as well as from damage by hackers. The more virulent types of attacks
damage or infect your hard drive and you can lose valuable personal information. When you back
up your files, make sure you:
– Have a recent backup before installing new software programs or updates.
– Use at least a couple of storage disks, to cut down on the risk of one disk becoming damaged or infected.
Write the backup date on the label.
– Verify that you can read the backup disk.
– Do store your backup disks away from your computer. If content is irreplaceable, consider a fireproof box or
a safe deposit box.
• Let your antivirus software scan your files. Schedule your antivirus software to conduct weekly
scans. It can scan data files, executable files, and system files in any combination. If an infection is
found, the antivirus software will repair or quarantine specific files. Contact your antivirus vendor's
Web site for further clean-up instructions.
• Check for software and antivirus signature updates. Software programs for which you are not
receiving automatic updates or notifications, check the software publishers' Web sites.
• Defragment your Hard Disk. Use the built in Disk defragmenter or a third party utility to keep your
hard drives contents organised, and help improve the drives performance.
Regular Maintenance (Weekly)
20. • Change your passwords. Keeping the same passwords increases the likelihood that
someone else will discover your password. (See
http://www.microsoft.com/protect/yourself/password/create.mspx)
• Verify that your antivirus subscription is current. Treat it like car insurance. Don't let it
lapse.
• Reassess your situation. Your security and privacy needs might have changed due to
who is using your computer, how it's being used, or new threats on the Internet.
• Tip:
• Use the Windows Task Scheduler to schedule routine file maintenance such as
automatic disk cleanup, disk defragmenter, and virus scans. Check the Windows Help
files for instructions.
• Automate your maintenance tasks
• Computers are good at this! For example, if you are using Windows XP, Windows Me, or
Windows 2000 SP3, you can receive automatic alerts about updates needed to help
maintain security and improve operation. Contact your software vendors to see what
automated services they provide
Regular Maintenance (6 Monthly)
Notas do Editor
Virus – A Program that can infect other programs by modifying them to include a possibly evolved, copy of itself.
Structure – Infection way or ways the virus spreads, Payload: what will it do, trigger: what causes the payload to deploy
Trojan - A Program that does something undocumented that the programmer intended, but that some users would not approve of if they knew about it.
Worm – is a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems (Usually via network connections)
Other Malware –
Threats from Russian Mafia, Chinese Triads.
A lot of the threats are now from websites.
Threats from Russian Mafia, Chinese Triads.
A lot of the threats are now from websites.
Threats from Russian Mafia, Chinese Triads.
A lot of the threats are now from websites.
Network Devices – West Mercia Police have arrested several people recently for stealing bandwidth. Did you know you are responsible for anything that goes on through your wireless connection? Make sure your wireless is secure, but also change the password that protects your equipment.
Hard-drive failure – Back up your data, depending on whose figures you believe up to 80% of businesses that suffer a data loss cease trading within 12 months.
Data loss could be the end result of a virus, but more likely accidental deletion will be the cause of data there are simple steps that can be taken on the latest versions of windows to prevent this being a problem.