Академический Документы
Профессиональный Документы
Культура Документы
Computer
Copyright 2014 CyberSecurity
Malaysia
Introduction
Nowadays, everyone has computers,
digital data, online identity and
account credentials. Not everyone is
serious about security.
But malicious hackers are constantly
looking for weaknesses of their prey
in order to successfully execute their
malicious activities on the internet.
In this session, well examine our
common mistakes and how hackers
exploit that mistakes.
Let us think likes HACKERS!
2
Goals
Users Perspective
Most users are more focused
on how to use computer to do
their daily tasks but not so
much about their security
Hackers Perspective
Hackers are constantly finding
for the weakness of each
components to ensure the
success of malicious attack
Objectives
Windows Logon
Password
Antivirus Software
Operating System
Application
Patches Update
Internet Access
Networking Devices
External Devices
Online Surfing
1) Windows Logon
Windows Logon
Logon Screen
Screen Saver
User
Management
Logon Screen
Access Control
Work-Related Information
company information
(structure, process,
systems)
corporate email
business
applications
access
business servers access
business documents
customer information
vendor information
Personal-Related
Information
personal information
personal emails
online banking
social networking
personal documents
personal photos
your dirty little secrets 8
Software Keylogger
User Management
10
2) Password
Password
Password
Strength
Managing
Accounts
Managing
Password
11
Password Strength
12
Managing Accounts
DONT USE
SAME
Userna
Passwor
me
d
13
Managing Password
14
Dangerous Password
15
3) Antivirus Software
Antivirus
Software
Antivirus
Categories
Online Scanner
Signature
Updates
16
Antivirus Categories
17
Antivirus Comparatives
18
Online Scanner
19
Signature Updates
Virus
Definition
Computer
21
4) Operating System
Operating
System
Service Pack
Validate Win &
Office
Microsoft
Support
22
Service Pack
http://windows.microsoft.com/enUS/windows/downloads/service-packs
Copyright 2014 CyberSecurity Malaysia
23
http://www.microsoft.com/genuine/validate/
24
Microsoft Fix it
http://support.microsoft.c
om/fixit/
Copyright 2014 CyberSecurity Malaysia
25
http://support.microsoft.com/gp/lifeselect
Copyright 2014 CyberSecurity Malaysia
26
5) Application
Application
Paid Application
Cracked
Application
Malicious
Application
27
Paid Application
28
Cracked Application
29
Rogue Antivirus
30
31
6) Patches Updates
Patches Updates
Service Pack
Windows
Updates
Third Party
Updates
32
http://www.microsoft.com/download/en/d
Copyright 2011 CyberSecurity Malaysia
efault.aspx
33
Windows Updates
34
35
7) Internet Access
Internet Access
Wired Network
Wireless
Network
Other Computer
36
Wired Network
37
Wireless Network
38
8) Networking Devices
Networking
Devices
Microsoft
Keyboard
Webcam
39
https://www.dreamlab.net/files/articles/27_Mhz_keyboar
d_insecurities.pdf
Copyright 2014 CyberSecurity Malaysia
40
Webcam
Webca
m
41
9) External Devices
External Devices
Thumb Drive
External HD
CD/DVD
42
AutoPlay
43
Online Surfing
Browser
Malicious
website
Phishing website
44
Web Browser
45
Browser Preferences
46
47
Malicious Website
48
Phishing Attacks
49
50
Summary
Act
Now!
Windows Logon
Password
Antivirus
Software
Operating
System
Application
Patches Update
Internet Access
Networking
Devices
External
51
Devices
Action Time!
Netbook
Laptop
Desktop
52
53