Beginning Open-Source/Free Solutions for Home and Small Business Owners. Robert Baldi, CISSP- ISSEP Robert Clauff

Similar documents
How To Use Truecrypt For Free On A Pc Or Mac Or Mac (For A Laptop) For A Long Time (For Free) For Your Computer Or Ipad Or Ipa (For Mac) For Free (For Your Computer) For Long

How to easily clean an infected computer (Malware Removal Guide)

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

How to Use Windows Firewall With User Account Control (UAC)

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Free and Legal Software You Can Download By Tom Krauser

Keeping you and your computer safe in the digital world.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Preparing Your Personal Computer to Connect to the VPN

Computer Security Maintenance Information and Self-Check Activities

Contents. McAfee Internet Security 3

BitDefender Client Security Workstation Security and Management

Get Started Guide - PC Tools Internet Security

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Basic Virus Removal Steps

Basic Computer Security Part 2

FortiClient dialup-client configurations

Desktop Release Notes. Desktop Release Notes 5.2.1

TECHNOLOGY BRIEF: CA THREAT MANAGER. Protecting Endpoint Systems Using Threat Management Solutions

Endpoint protection for physical and virtual desktops

Getting Started with Symantec Endpoint Protection

What Is Ad-Aware Update Server?

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

avast! Business products 2012

Welcome back everyone from the Monmouth University Student Help Desk!

Basic Computer Maintenance

Introduction to Free Computer Tools

PC Security & Housekeeping March 2015

Endpoint protection for physical and virtual desktops

What's the difference between spyware and a virus? What is Scareware?

Spyware Doctor Enterprise Technical Data Sheet

How to Deal with Spyware A CyberAngels Quick Tutorial

SPYWARE & MALWARE. ComputerFixed.co.uk Page: 1 info@computerfixed.co.uk. How do you get infected? Will Anti-virus software protect me?

Housekeeping Your PC

Symantec Endpoint Protection Datasheet

Some simple computer maintenance to keep your computer running well.

Michelle Vonderhaar June 23, 2010

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Coillte IT has recently upgraded the Remote Access Solution to a new platform.

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Symantec Endpoint Protection Getting Started Guide

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Release Notes for Websense Security v7.2

Introduction to Computer Security Table of Contents

Ten Tips to Avoid Viruses and Spyware

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

ResNet Computer Consultant Job Description

NUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Corporate Account Takeover & Information Security Awareness

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Pro Security

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

Astaro Gateway Software Applications

Description: Objective: Attending students will learn:

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

2. Installation and System requirements

Online Banking Fraud Prevention Recommendations and Best Practices

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

How To Understand The History Of The Web (Web)

This guide will go through the common ways that a user can make their computer more secure.

K7 Business Lite User Manual

BitDefender for Microsoft ISA Servers Standard Edition

AVeS Cloud Security powered by SYMANTEC TM

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Additional details >>> HERE <<<

Advanced Diploma In Hardware, Networking & Server Configuration

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Ad-Aware Antivirus Overview

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Ad-Aware Management Server Installed together with Ad-Aware Business Client Ad-Aware Update Server Before You Start the Deployment...

Unified Threat Management, Managed Security, and the Cloud Services Model

High Speed Internet - User Guide. Welcome to. your world.

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

What Do You Mean My Cloud Data Isn t Secure?

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business.

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

User Guide for the Identity Shield

Seven for 7: Best practices for implementing Windows 7

for businesses with more than 25 seats

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

NetSupport Manager v11

Anti-Malware for Your PC

Free PC Repair Software: -What You Need to DIY- The Utilities Every PC Owner Should Have (2013)

How Spyware and Anti-Spyware Work

Sophos Enterprise Console policy setup guide. Product version: 5.2

Managed Service Plans

Leveraging Open Source / Freeware Solutions

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

PC Security and Maintenance

Open Source Security Tool Overview

Charter Business Desktop Security Administrator's Guide

Next Gen Firewall and UTM Buyers Guide

System Planning, Deployment, and Best Practices Guide

AND SERVER SECURITY

AND SERVER SECURITY

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Custom Project Work with Continuum Tech Advantage

Transcription:

Beginning Open-Source/Free Solutions for Home and Small Business Owners Robert Baldi, CISSP- ISSEP Robert Clauff

Open source.efficient.secure

TOPICS Antivirus Password Security Spyware Safe Browsing Network Security

ANTIVIRUS It is a good start to have antivirus on every computer in your network to keep you virus free Growing numbers of viruses and new definitions of viruses are being released everyday If you choose to go to a Enterprise edition you may have to pay for a license, but depending on the number of computers in the network it should still be affordable There are more than a couple free antivirus applications to keep your network free of viruses Antivirus is only one piece of the puzzle when you are securing either your home or office network

Avast Antivirus Great free home edition antivirus Free signature updates Real time protection Web and P2P Protection Anti-spyware and anti-rootkit tools Available for linux as well for free Professional and small business versions for a small fee, but still affordable http://www.avast.com

AVG Antivirus Real time protection and web surfing protection Spyware protection Compatible for Windows 7, Vista, and XP Just like others this is only for home use and not commercial. http://free.avg.com

Clamwin or Clamav Features include integration with Outlook and internet explorer Schedule automatic scans Automatically updates virus databases Easy to update to newer versions with just one click Compatible with both Windows and Linux http://www.clamwin.com/

Clamwin http://www.clamwin.com/

SECURED BROWSING The first step to securing yourself from viruses and spyware is to avoid it in the first place By making yourself secure during browsing you add another layer to your security There are applications to secure your browser as well as plugins for your browser directly

Browser Plugins Browsers have hundreds of available plugins to increase your security during browsing Plugins are all free and have a large range of abilities New plugins are getting released everyday Since there are differences between browsers we will cover a few for firefox http://www.microsoft.com/windows/internetexplorer/default.aspx http://firefox.com

Mozilla Plugins NoScript This prevents scripts in websites from running unless you allow them to Show MyIP This shows you your current address Firebug This plugin will troubleshoot code on the website Ghostery Watches the scripts and cookies that are tracking you https://addons.mozilla.org/en-us/firefox/

Sandboxie Secures web site browsing Creates a quarantine area on harddrive Privacy is assured by "sandboxing" all history, cookies, and temp files Malware infection is isolated from your host system Run programs securely as well http://sandboxie.com

Sandboxie

SPYWARE Spyware is a growing problem on the internet today Spyware is very, very common and everyone gets a little bit These are gateways to worse problems then just slowing down a PC Spyware can open security holes, monitor your PC, and slow your PC to a standstill Getting rid of spyware is just another layer that you can add to secure your PC and your network Most free tools are as efficient if not more efficient than most paid applications

Malwarebytes Lightspeed scanning Works in tandem with other spyware applications Tools for manual, hard to remove malware Command line operability for faster scans Paid version offers Anti-malware, real-time Works with 32 and 64 bit Windows systems up through Vista http://www.malwarebytes.org

Ad-Aware Basic integrated real-time protection Fully integrates with Windows security center Quick scan, remove, and clean Rootkit removal External drive scanability Very easy to use http://www.lavasoft.com/products/ad_aware.php

pybot Search & Destroy Stops spyware in real-time and immunizes all the ways spyware can enter your system Can prevent and will alert you if any programs are allowed to install or change the registry Removes spyware, adware, and hijacks that aren't sometimes covered by antivirus definitions Works with Windows Vista http://www.safer-networking.org/en/index.html

Spybot Search & Destroy http://www.safer-networking.org/en/index.html

NETWORK SECURITY Keeping your network secure and monitored allows you to secure the biggest part of your network The main gateway to your security is through the outside of your network and keeping the network secure inside With an efficient firewall and quality network elements you should be able to keep a lock down on your network

FIREWALLS The most efficient way to secure a network is by putting a quality firewall at the edge of your network Firewalls are also a great way to secure other applications and the ability to remotely access your systems Despite what is said you do not need to spend a lot of money to get a quality firewall for your network

Pfsense Open source stateful firewall that is forked from the MoNowall project Several filtering options Plugins available for different applications Load balancing and VPN Available as a standalone install, image (for smaller hardware), or vmware appliance Real time monitoring and MORE Fantastic firewall, our personal favorite http://www.pfsense.org

Untangle Open source network gateway Can be installed on top of a Windows machine Open source package available for firewall, spam-filtering, and more Can be setup as a router, transparent bridge, or a re-router Can run on bare metal install, XP, or as a vmware appliance More detailed apps with paid subscriptions http://www.pfsense.org

NETWORK APPLICATIONS Good network applications inside of your network help you keep things secure and keep unwanted people out Some network applications will not only help secure the network, but make operations and administration easier There are numerous free applications to choose from if you go to sourceforge.net for both Linux and Windows

Wireshark Network protocol analyzer for both Linux and Windows Scans network collecting all packets to be later analyzed Supports hundreds of protocols TCPDUMP output can also be analyzed in wireshark Easily filterable and manipulated Great for troubleshooting network problems http://www.wireshark.org

Lansweeper Inventory network clients including Active Directory integration Lansweeper allows you scan machines remotely without installing agents Locate non-compliant programs Track licenses and inventory or generate reports via SQL http://www.lansweeper.com

Lansweeper http://www.lansweeper.com

PASSWORD SECURITY One of the most common things that put a network at risk is not having secure passwords If you have a lot of passwords the worst thing you can do is save them in a browser or something else Having a way to securely log the passwords is a very good practice to have

KeePass A secure password manager Requires only one master password to open the database AES or Twofish Encryption http://www.keepass.info

KeePass http://www.keepass.info

Security This brief overview of the security concepts that we have covered today will drastically improve the security of your network All of the tools that we covered today will be distributed out on a DVD for you to use at your leisure (accept the OS firewalls) Hopefully the things we covered today were of interest to you and make you want to focus more on your security for you and your data The things we didn t show tutorials on today do have great documentation at their websites as well.