SlideShare uma empresa Scribd logo
1 de 42
Desktop Security
 How to protect our desktop computers




                              Security4all
              Information Security Consultant
The unsinkable ship
Today’s Agenda
• The risk landscape
• The effectiveness of our technology
• Possible countermeasures
Know
your
Risks
Motivations evolved from play to
              business
  • Revenge
  • Extortion
  • Competetive Sabotage
  • Industrial espionage
  • Political Activism

2001             2003           2005           2007
                                               Political/Main
  Experimental     Extortion     For Hire          stream



         2002            2004           2006
“heike”

黑客
N.C.P.H.
 “For-profit” Hacker group

                    玫瑰
                   Wicked
                    Rose
            Source: www.mghacker.com
$242 (1,967 RMB)
$625 (5,000 RMB)

     +150%
Table: Breakdown of goods available for sale on
         underground economy servers
              Source: Symantec Corporation


 Rank       Item              Percentage     Range of Prices
 1          Credit cards      22%            0.50$ - 5$
 2          Bank accounts     21%            30$ - 400$
 3          Email passwords   8%             1$ - 350$
 4          Mailers           8%             8$ - 10$
 5          Email addresses   6%             2$/MB – 4$/MB
 6          Proxies           6%             0.50$ - 3$
 7          Full identity     6%             10$ - 150$
 8          Scams             6%             10$/week
 9          Social security   3%             5$ - 7$
            numbers
 10         Compromised       2%             2$ - 10$
            unix shells
Russian Business Network


               • Mpack
               • Storm Worm
               • Phishing
               • Banking Trojans

         www.bizeul.org/files/RBN_study.pdf
Titan Rain
November 2007


concentrated campaign of
cyber espionage against UK
 businesses
November 2007



       160GB
March 2008
The technology
Virus
scanners
11 October



  MS07-60
File .doc received on 23.10.2007



Result: 10/32 (31.25%)
File .doc received on 10.02.2008



Result: 11/32 (34.38%)
Report: All Your iFrame Are Point to Us (11 February 2008)
Firewalls
Firewalls are not security
  devices, they are more
   for network hygiene
DNS tunneling
Patching
55 Days

16 January


             11 March
Don’t forget to patch these !

• Macromedia Flash
• Acrobat Reader (PDF)
• Sun Java
• RealPlayer
• Apple Quicktime
Encryption
Countermeasures
quot;A false sense of security, is
   worse than insecurityquot;
                 - Steve Gibson

Mais conteúdo relacionado

Destaque

Exploring Self-Employment
Exploring Self-EmploymentExploring Self-Employment
Exploring Self-Employment
Cam Jones
 

Destaque (17)

Modulo2 enquadramentos
Modulo2 enquadramentosModulo2 enquadramentos
Modulo2 enquadramentos
 
9.openlayer
9.openlayer9.openlayer
9.openlayer
 
“Run mummy run” - communicative tensions in digital museum installations that...
“Run mummy run” - communicative tensions in digital museum installations that...“Run mummy run” - communicative tensions in digital museum installations that...
“Run mummy run” - communicative tensions in digital museum installations that...
 
Señales preventivas (1)
Señales preventivas (1)Señales preventivas (1)
Señales preventivas (1)
 
Exploring Self-Employment
Exploring Self-EmploymentExploring Self-Employment
Exploring Self-Employment
 
Uma aventura à Torre do Castelo
Uma aventura à Torre do CasteloUma aventura à Torre do Castelo
Uma aventura à Torre do Castelo
 
Bir Zamanlar Turkiye Amedeo Preziosi 4
Bir Zamanlar Turkiye   Amedeo Preziosi   4Bir Zamanlar Turkiye   Amedeo Preziosi   4
Bir Zamanlar Turkiye Amedeo Preziosi 4
 
Technical Writing
Technical WritingTechnical Writing
Technical Writing
 
Ppt ch13 marien_4_e-205402
Ppt ch13 marien_4_e-205402Ppt ch13 marien_4_e-205402
Ppt ch13 marien_4_e-205402
 
Загальна будова нервової системи
Загальна будова нервової системиЗагальна будова нервової системи
Загальна будова нервової системи
 
Ppt ch10 marien_4_e-205399
Ppt ch10 marien_4_e-205399Ppt ch10 marien_4_e-205399
Ppt ch10 marien_4_e-205399
 
Phot Editing Code of Ethics
Phot Editing Code of EthicsPhot Editing Code of Ethics
Phot Editing Code of Ethics
 
4580
45804580
4580
 
Swayam krushi sangham
Swayam krushi sanghamSwayam krushi sangham
Swayam krushi sangham
 
10 Eventowych Trendów 2017
10 Eventowych Trendów 201710 Eventowych Trendów 2017
10 Eventowych Trendów 2017
 
Event marketing for startups and new businesses
Event marketing for startups and new businessesEvent marketing for startups and new businesses
Event marketing for startups and new businesses
 
Analytics & mis in finance
Analytics & mis in financeAnalytics & mis in finance
Analytics & mis in finance
 

Semelhante a Security4all Desktop Security

Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
Anthony Arrott
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010
Oracle BH
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
Mike Murray
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Tripwire
 

Semelhante a Security4all Desktop Security (20)

Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
2011 October Symantec Intelligence Report
2011 October Symantec Intelligence Report2011 October Symantec Intelligence Report
2011 October Symantec Intelligence Report
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010
 
SLVA - Werksmans Security for Privacy
SLVA - Werksmans Security for PrivacySLVA - Werksmans Security for Privacy
SLVA - Werksmans Security for Privacy
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
 
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
 
Thy myth of hacking Oracle
Thy myth of hacking OracleThy myth of hacking Oracle
Thy myth of hacking Oracle
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 

Último

Último (20)

Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modelling
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 

Security4all Desktop Security