Вы находитесь на странице: 1из 53

Secure the

Computer
Copyright 2014 CyberSecurity
Malaysia

Introduction
Nowadays, everyone has computers,
digital data, online identity and
account credentials. Not everyone is
serious about security.
But malicious hackers are constantly
looking for weaknesses of their prey
in order to successfully execute their
malicious activities on the internet.
In this session, well examine our
common mistakes and how hackers
exploit that mistakes.
Let us think likes HACKERS!
2

Goals
Users Perspective
Most users are more focused
on how to use computer to do
their daily tasks but not so
much about their security

Hackers Perspective
Hackers are constantly finding
for the weakness of each
components to ensure the
success of malicious attack

Copyright 2014 CyberSecurity Malaysia

Objectives

Windows Logon
Password
Antivirus Software
Operating System
Application
Patches Update
Internet Access
Networking Devices
External Devices
Online Surfing

Copyright 2014 CyberSecurity Malaysia

1) Windows Logon

Windows Logon
Logon Screen
Screen Saver
User
Management

Copyright 2014 CyberSecurity Malaysia

Logon Screen

Copyright 2014 CyberSecurity Malaysia

Password Protected Screen Saver

Copyright 2014 CyberSecurity Malaysia

Access Control
Work-Related Information

company information
(structure, process,
systems)
corporate email

business
applications
access
business servers access
business documents
customer information
vendor information
Personal-Related
Information
personal information
personal emails
online banking
social networking
personal documents
personal photos
your dirty little secrets 8

Software Keylogger

The Keylogger allows you to secretly track


all activities from all computer users and
automatically receive logs to a desire email

Copyright 2011 CyberSecurity Malaysia

User Management

10

2) Password

Password
Password
Strength
Managing
Accounts
Managing
Password

Copyright 2014 CyberSecurity Malaysia

11

Password Strength

Copyright 2011 CyberSecurity Malaysia


https://www.microsoft.com/security/pc-

12

Managing Accounts

DONT USE
SAME

Copyright 2014 CyberSecurity Malaysia

Userna
Passwor
me
d

13

Managing Password

Avoid creating passwords that use:


Dictionary words in any language.
Words spelled backwards, common misspellings, and
abbreviations.
Sequences or repeated characters.Examples: 12345678,
222222, abcdefg, or adjacent letters on your keyboard
(qwerty).
Personal information.Your name, birthday, driver's license,
passport number, or similar information.
Copyright 2014 CyberSecurity Malaysia

14

Dangerous Password

15

3) Antivirus Software

Antivirus
Software
Antivirus
Categories
Online Scanner
Signature
Updates

Copyright 2014 CyberSecurity Malaysia

16

Antivirus Categories

Free Edition Antivirus


Commercial Antivirus
Online Scanner

Copyright 2014 CyberSecurity Malaysia

17

Antivirus Comparatives

Copyright 2011 CyberSecurity Malaysia


http://www.av-comparatives.org/

18

Online Scanner

Copyright 2011 CyberSecurity Malaysia

19

Windows Security Center

2011 CyberSecurity Malaysia


ws Start > Control PanelCopyright
> Security
> Check this computers20security

Signature Updates

Virus
Definition

Computer

Copyright 2014 CyberSecurity Malaysia

21

4) Operating System

Operating
System
Service Pack
Validate Win &
Office
Microsoft
Support

Copyright 2014 CyberSecurity Malaysia

22

Service Pack

http://windows.microsoft.com/enUS/windows/downloads/service-packs
Copyright 2014 CyberSecurity Malaysia

23

Validate Windows and Office

http://www.microsoft.com/genuine/validate/

Copyright 2014 CyberSecurity Malaysia

24

Microsoft Fix it

http://support.microsoft.c
om/fixit/
Copyright 2014 CyberSecurity Malaysia

25

Microsoft Product Lifecycle

http://support.microsoft.com/gp/lifeselect
Copyright 2014 CyberSecurity Malaysia

26

5) Application

Application
Paid Application
Cracked
Application
Malicious
Application

Copyright 2014 CyberSecurity Malaysia

27

Paid Application

Copyright 2014 CyberSecurity Malaysia

28

Cracked Application

Copyright 2014 CyberSecurity Malaysia

29

Rogue Antivirus

Copyright 2014 CyberSecurity Malaysia

30

Potentially Unwanted Program

Copyright 2014 CyberSecurity Malaysia

31

6) Patches Updates

Patches Updates
Service Pack
Windows
Updates
Third Party
Updates

Copyright 2014 CyberSecurity Malaysia

32

Microsoft Download Center

http://www.microsoft.com/download/en/d
Copyright 2011 CyberSecurity Malaysia
efault.aspx

33

Windows Updates

34

Third Party Updates

Copyright 2011 CyberSecurity Malaysia


http://secunia.com/vulnerability_scanni

35

7) Internet Access

Internet Access
Wired Network
Wireless
Network
Other Computer

Copyright 2014 CyberSecurity Malaysia

36

Wired Network

WEB APP ATTACKS


VIRUS & MALWARE
REMOTE CODE
EXECUTION

Copyright 2014 CyberSecurity Malaysia

37

Wireless Network

Copyright 2011 CyberSecurity Malaysia

38

8) Networking Devices

Networking
Devices
Microsoft
Keyboard
Webcam

Copyright 2014 CyberSecurity Malaysia

39

Wireless Microsoft Keyboard


The team of Dreamlab Technologies has hacked two wireless
keyboards from Microsoft. Dreamlab warns that it is possible to
sniff the keyboardstrokes- possible to capture and decrypt
keystrokes - user names, passwords,bank detailsor confidential
correspondence can be very easily copied.

https://www.dreamlab.net/files/articles/27_Mhz_keyboar
d_insecurities.pdf
Copyright 2014 CyberSecurity Malaysia

40

Webcam
Webca
m

Copyright 2014 CyberSecurity Malaysia

41

9) External Devices

External Devices
Thumb Drive
External HD
CD/DVD

Copyright 2014 CyberSecurity Malaysia

42

AutoPlay

Copyright 2014 CyberSecurity Malaysia

43

10) Online Surfing

Online Surfing
Browser
Malicious
website
Phishing website

Copyright 2014 CyberSecurity Malaysia

44

Web Browser

Copyright 2011 CyberSecurity Malaysia

45

Browser Preferences

Copyright 2011 CyberSecurity Malaysia


Copyright 2014 CyberSecurity Malaysia

46

Clear Browsing Data

Copyright 2011 CyberSecurity Malaysia

47

Malicious Website

48

Phishing Attacks

Copyright 2011 CyberSecurity Malaysia

49

Check the Suspicious Website

Copyright 2014 CyberSecurity Malaysia

50

Summary

Act
Now!

Copyright 2014 CyberSecurity Malaysia

Windows Logon
Password
Antivirus
Software
Operating
System
Application
Patches Update
Internet Access
Networking
Devices
External
51
Devices

Action Time!
Netbook

Laptop

Desktop

If you think technology can solve your security problems,


then you don't understand the problems and you don't
understand the technology
- Bruce Schneier
Copyright 2014 CyberSecurity Malaysia

52

Copyright 2013 CyberSecurity Malaysia

53

Вам также может понравиться