1 Securing small business Firewalls Anti-virus Anti-spyware
2 Introduction Due to the phenomenal growth of the Internet in the last decade companies and individuals find it hard to operate without a presence on the Internet. This means that companies are exposed to threats, which can have a major business impact. The fact that one needs to protect company and individual computers from unauthorized or unwanted access is considered a common fact.
4 Understanding the concept In order to pick the right Firewall, understanding what a firewall does is crucial. I will quickly cover basic TCP/IP concepts and then move on to picking the right device.
5 IP Attributes
6 TCP Attributes TCP runs on top of IP: A TCP packet contains a port number: A TCP packet contains a sequence number and a FLAG:
7 Firewalls The Basic Description A firewall is a perimeter defense device: This means that any firewall splits a network into a trusted or protected, and un-trusted or unprotected side. A firewall filters traffic on a pre-defined set of rules: Any firewall is only as good as its configuration.
8 Firewall limits These 2 factors limits the effectiveness of a firewall dramatically and it is important to note that a firewall does not: Protect you from your internal network. Protect you from authorized intended or untended malicious access. This entails using granted privileges or access for unintended operations. Protect you from all harmful attacks. Exploits found on the Internet can use different techniques to penetrate basic firewall protection.
9 What kind of Firewall? Features of a good firewall: State full inspection-spi It does content checking, passing protocols through a validation exercise. It keeps a state of connections whereby it monitors the state of a TCP connection and allows traffic accordingly. It does address translation. It can authenticate connections.
10 Hardware-Software Hardware: Most basic routers do not include SPI VPN routers do Wired Wireless (WEP encryption)
11 Software Most OS before Win XP do not include any protection. Win XP does not include SPI but offers some basic protection Zone Alarm offers SPI.
13 Origins Origins was created by researchers as a way for them to communicate. This was many years before the World Wide Web, what we now refer to as The Internet.
14 Security Why is it insecure? It was not originally intended for widespread use outside of research. It was designed to be simple and easy to operate with minimum restrictions. Security controls were afterthoughts that had to be pasted on to the system, instead of being part of the original design. Because of this, security is inefficient and incomplete.
15 Define SPAM General definition un-requested or unsolicited , usually designed to initiate a financial transaction or gather data for advertising Most legitimate companies do not engage in SPAM ing A SPAM is typically sent to many millions of addresses in the expectation that even if only a fraction of 1% generate a response, the SPAM will still produce an economic return
16 The new face of SPAM how it went from obnoxious to hazardous SPAM originally was mostly just advertisements As and Internet use have become more common since the late 1990 s, has become one of the primary ways to distribute viruses Recently, there has been increasing involvement of the criminal underworld Identity theft Credit fraud
17 Self installing viruses, or how to run an server without even trying Frequently used to deliver computer programs designed to infect your computer and send new copies of the virus to other addresses and/or seize control of the computer. Can automatically install without your knowledge Uses your contact lists and s for target addresses Very small and compact program
18 Someone else s s very own server on my computer Capable of sending many thousands of s per hour Severe impact on your Internet browsing performance Severe impact on your overall computer performance Spreads virus to your friends and many others May result in your address being blocked by potential recipients. May result in your ISP suspending your service until the problem is corrected.
19 Surprises in viruses In addition to installing an server on your computer and mass ing copies of the virus to others, most of the recent viruses also carry a separate payload which installs a program on your computer Silent install you are unaware that the program has been installed
20 Steal my data please! This program often carries a component that allows the program to receive orders from an outside source. This allows an unauthorized user to take control of your computer or steal your data Often installs a key logger,, a program that captures every keyboard entry you make and records it for future transmission to other parties
21 Stealing your identity The program can report back to the original sender Allows others to steal your data: Passwords Bank account information Credit card information Personal information
22 Putting down Roots A new type of virus is just being seen that is an even more serious threat. This is a Root Kit installer. Replaces key parts of your operating system Root Kit virus is almost impossible to detect Is able to take complete control of your computer Very few anti virus programs can even detect whether a Root Kit has been installed
23 Tearing out the Roots There are only a few anti-virus companies that have Root Kit detectors. F-Secure has a product in Beta testing called Blacklight (www.f-secure.com/blacklight)) that attempts to detect and remove Root Kits Currently, the only fully effective remedy if infected is to wipe the computer hard drive clean and reinstall everything Fortunately, Root Kits are still very rare, but that will rapidly change
24 What can we do? Don t t rely on a single defense use a layered approach Use your ISP s s virus filtering service, if available Use a hardware firewall Install a software firewall Install and maintain anti-virus software Use common sense.
25 The Multi-level level Defense ISP Filtering Firewall Anti-virus software YOU
26 Anti-virus programs Install and keep up to date at least one anti-virus program What capabilities should it have? Real time file checking should be able to check every file you use on your computer, as you open it Real time checking should be able to check all incoming and outgoing
27 Are two better than one? Some Anti-virus programs require more resources on your computer than others Norton and McAfee are resource intensive and will not play well with other anti-virus programs. Consider the horsepower of your computer before installing a second program, especially if you are using one of these packages. Anti-virus programs that appear to work reasonably well together are (there may be other programs as well): Authentium/Command Antivirus (www.authentium.com( AVG (www.grisoft.com( F-Prot (www.f(
28 The Last Line of Defense: YOU Learn how to identify common attributes of SPAM and virus s. Listed below are some common SPAM/virus traits but this is not a complete list. Unusual characters in the Subject line that asks you to provide confidential information, either in a reply or by asking you to go to a website. Be very careful about providing information such as: Credit Card number / Bank Account number Social Security number
29 You re still the last line of defense If it sounds too good to be true, it probably is. No, there really isn t t a former Nigerian government official that wants to share his $20,000,000 with you. Do you really want to buy stock or bonds from someone who makes his living sending unsolicited ? If the stock was really that good (or even existed), he wouldn t t need to spend his time trying to get you to buy it. How much do you want to entrust your health to a pill or lotion you saw in a SPAM , from an undocumented source, with no safety inspection or valid certification?
30 What else can we do? Don t t reward SPAM My own personal policy is to never visit a website or purchase a product as a result of SPAM. Take responsibility for your computer and use common sense Self reliance and common sense are your most effective tools. Remember, what happens to your computer is your responsibility. No software or hardware can properly protect your computer without your help.
31 SpyWare Who is Watching Me?
32 SpyWare, Adware & Malware SpyWare is any technology that aids in gathering information about a person or organization without their knowledge. AdWare is any software application in which advertising banners are displayed while the program is running. MalWare is short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.
33 How did I get this? SpyWare SpyWare applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Trojans/Malware can be installed without the user's consent, as a drive-by download,, or as the result of clicking some option in a deceptive pop-up window. Trojans/Malware
34 Typical SpyWare/Maleware Developer Tricks Hide it inside another program's installer. Keep asking to install until the user says Yes. Create a false pretense for the user needing the software. Hide software out in group directories on peer-to peer networks. Design it to look essential, or to be invisible. Design it not to uninstall, even when asked.
35 Common Applications that have or are SpyWare Comet Cursor Bonzi Buddy InterNet Games CoolWebSearch Weather Bug Incredimail Snood & Dynomite Web Search Toolbars Instant Messengers File Sharing Programs Kazaa Morpheus
36 Things SpyWare/Malware can do Monitor your keystrokes Collect information about you and your surfing habits Modify system settings Redirect your browser Send/Receive cookies to other SpyWare programs Leave a backdoor open for hackers Install other programs directly onto you PC Load adult orientated images on your PC Dial a service, most likely adult content sites, for which you will be billed!
37 Signs of SpyWare/Malware Does your computer seem slow? Do you see programs you don t remember installing? When you start your Internet browser, does it open to a page you've never seen before? Do you see a sudden increase in popup advertisements on pages where you've never seen them before? Antivirus messages keep popping up.
38 Ways to avoid SpyWare/Malware Keep Windows up to date. Keep your Antivirus up to date. Install software only from Web sites you trust. Read the fine print on free software. There is no such thing as a free lunch Use a tool to help detect and remove unwanted software.
39 IE Defense Set your Internet Security settings to at least Medium. Open Internet Explorer and click the Tools menu and then the Internet Options...sub sub-menu. Click on the Security tab at the top. Next click on the Internet icon. The Security Level bar should be set to Medium. Next click on the Restricted Sites icon. The Security Level bar should be set to High. Next click on the Trusted Sites icon. The Security Level bar should be set to Low.
40 Pop up Blockers The Google Toolbar - for IE Maxthon Tabbed Browser
41 Spybot (Search & Destroy)
42 Ad-Aware Aware
44 Tools of Defense Set up IE in a secure fashion A good popup blocker A good Antivirus A good removal tool SpySweeper (by Webroot) Spybot-Search Search & Destroy (by Spybot) Ad-aware (by Lavasoft)
45 SpyWare Don t t Be A Victim! Questions?
46 What does RGV do to protect you?
47 Two Layered Protection RGV Outsourcers mail Filtering Spam Viruses RGV Implements its own filtering Spam Viruses Port filtering
48 August 18, 2005 Combined Domain Messages Bytes % of Bytes Blocked Msgs % of Msgs rockbridge.net 30, ,495, , Domain Viruses Quarantined rockbridge.net 180
49 What Next? RGV will introduce a new free service in October
50 Web Filtering Residential Customers Parental Control Parents will be able to control and limit their children s s use
51 Web Filtering SMB Customers Will be able to control and limit use of each employee.
52 Protect yourself Develop a policy Implement the policy Evaluate the solution Cost less in the long run Patch, Patch, Patch
Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.
Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There
10 Common Questions About Internet Safety Spyware, online fraud, and other Internet threats are certainly not new. But they are growing more sophisticated and criminal every day. So how can you protect
COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
Computer Security and Privacy 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Guidelines for Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures
NewNet 66 Network Security Spyware... Understanding the Threat What is Spyware? Spyware is an evolved term. In the mid 90s, it was used to refer to high-tech espionage gadgets. By the late 90s, it became
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College Defining the Problem Symantec documented 2,636 new vulnerabilities in 2003, an average of seven
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?
Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF
Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read
What's spyware? The answers vary widely, but there are five components to every spyware definition: Users don't knowingly request spyware. Spyware applications operate on the user's computer and have not
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Spyware and Adware What s in Your Computer? Part 1 Welcome to Part 1 of the online course, Spyware and Adware What s in your computer? Are you being bombarded by advertisements on your computer, has your
CSCA0101 COMPUTING BASICS Chapter 8 1 1. 2. Usage of 3. Types of 4. How Spreads? 5. How Can You Protect Computer? 6. Symptoms 7. Anti- Program 2 Short for malicious software. A is software used or created
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Welcome Windows XP and Vista Users Welcome to Alliance Internet. You have joined one of the fastest growing Internet providers in the area. This information will help you understand how your Internet works.
Computer infiltration Computer infiltration means unauthorized entering program code into computer system in order to perform undesired (often concealed) activities. Currently, there are about 80,000 types
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer
Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
We are a volunteer-based organization that is spreading cyber awareness and creating a cyber first responders unit. We participate in several team-based competitions a year to serve as training and experience
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password
Security Statement The security of your accounts and personal information is Sonabank s highest priority. Regardless of your preferred method of banking in person, by telephone or online you need to know
7 7 PRACTICES FOR SAFER COMPUTING EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES TRAVEL PLANNING SPORTS, HOBBIES, AND SOCIAL NETWORKS CONNECTIONS TO FAMILY AND FRIENDS
Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft Kim Duffy Internet Security Systems Agenda What are the trends? Why should I be concerned? How does Spyware
User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
EA USA Online Data Protection Suite Frequently Asked Questions TABLE OF CONTENTS EA USA ONLINE DATA PROTECTION SUITE ABOUT THE ONLINE DATA PROTECTION SUITE... 3 What is included in the Online Data Protection
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Information Security Training on Malware Outline Introduction Goal Malware defined Motivation for Malware Types of Malware Recognizing Malware How to prevent Malware Introduction Welcome to LSUHSC-NO s
Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
Spyware Study Prof. Robila CMPT 495 Computer and Data Security Group: Francis Rivera Douglas Schemly Igor Yussim Due: December 12, 2005 Table of Contents Topic Page Spyware and the History of 3 Spyware
Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
Understanding Internet Security What you need to protect yourself online. Understanding Internet Security What you need to protect yourself online. Table of Contents SECTION ONE Internet Security: What
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
3GPP TSG SA WG3 Security S3#34 S3-040583 6-9 Jul 2004 updated S3-040566 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040566 based on the comments on SA3 mailing list Source:
Introduction to Free Computer Tools About me Serge Aubin Technology Advisor / OLS-N Programmer / DBA - 9yrs Web design / Web applications Intranet/Extranet Today s session Terminology Anti-Spyware software
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click