All About Security & Virus IndocommIT 12 September 2007 Jakarta Convention Center Author: Harry Sufehmi Revision : 20070908.

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

Web Exploits and the Rise of Cybercriminals Roger Thompson AVG Chief Research Officer.
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
Slide 11 June 2014© IRM Plc 2001 Eaten by the Worms Eaten by the Worms The perils of network hostile code Dr Neil Barrett Technical Director - IRM Plc.
Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
By Hiranmayi Pai Neeraj Jain
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
(n)Code Solutions Presentation on the importance of a Secure Technology Infrastructure.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Worms By: Aaron Stahler. Difference Between a Worm and A Virus Viruses are computer programs that are designed to spread themselves from one file to another.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Video Following is a video of what can happen if you don’t update your security settings! security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Technology Solutions Conference School Security Technology Solutions Conference School Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
Malicious Software Malicious Software Han Zhang & Ruochen Sun.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
CERN’s Computer Security Challenge
1 ISA 662 Information System Security 20 Years Of PC Viruses.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Computer Viruses By: Eyad Al-Hazmi. Roadmap Introduction : Computer Viruses in brief Danger of Virus attacks Virus Attacks and Ethics Economic Impact.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
Understand Malware LESSON Security Fundamentals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Evolution of Computer Viruses A Technical Presentation by: Logan Kallop.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Evolution of Computer Viruses
Ilija Jovičić Sophos Consultant.
TMG Client Protection 6NPS – Session 7.
Microsoft’s Security Strategy
Home Internet Vulnerabilities
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

All About Security & Virus IndocommIT 12 September 2007 Jakarta Convention Center Author: Harry Sufehmi Revision :

Now : Managing Rimbalinux.com : Making IT Works. Husband & Father of Four – 2005 : Senior Birmingham City Council Achievements Taking control of Nimda epidemic ( desktops, all over a city the size of Bandung) Best Europe : Head of Asuransi Takaful All About the Author

History of Virus FUN / BRAGGING RIGHTSFINANCIAL/MALICIOUS INTENT 1970 : Creeper : Menyerang Tenex operating system, menyebar melalui ARPANET (cikal bakal Internet) 1986 : (c) Brain : Virus pertama yang menyerang PC 1987 : Jerusalem : Wabah virus dalam skala global. Menghancurkan file exe setiap Friday 13 th 1988 : Morris worm : Pertama yang menyebar melalui Internet & memperkenalkan attack vector : buffer overrun : 1260 : first polymorphic virus 1999 : Melissa : first wide-scale macro virus 2000 : ILOVEYOU : menyebabkan kerugian US$ 5,5 milyar.

History of Virus FUN / BRAGGING RIGHTSFINANCIAL/MALICIOUS INTENT 2001 : Ramen / Lion: first worm for (RedHat) Linux (via wu-ftpd, rpc-statd, lpd) 2003 – 2004 : Slammer, Blaster, Welchia, Sobig, Sober, MyDoom, Witty, Sasser : Menyerang platform Windows, multiple attack vectors : MyDoom : worm tercepat, dibuat oleh spammer, 1 juta komputer yang terinfeksi menyerang sco.com (lenyap dari internet, pindah ke thescogroup.com). Biggest DDoS attack. Melumpuhkan Google pada tanggal 26 Juli : Zotob : menginstall malware & menjalankan credit card forgery scam, korban a/l CNN, NYT, ABC, AP, US Dept. Homeland Security, dll. Microsoft mengumumkan imbalan US$ bagi yang menangkap pembuatnya, mengerahkan 50 detektif : lOrdOfthenOOse : Menyerang 70 juta anggota MySpace.com

Spread : Virus Executables : EXE, COM,.. Removable media : floppy, flashdisc,.. Macro : , Office files,.. Server security holes : IIS, SQL server.. Client security holes : IE holes,.. Web-app vulnerability : Santy virus,.. Data files : JPG, MP3,..

The Evolution Ways to avoid detection Anti-debugging code Stealth : the early rootkit Polymorphic code : triggered heuristic scanners Metamorphic code : Total transformation, Huge virus size

The E(x)ternal Threat : The Security Shell Model Y o u Security holes virus Brute force Data files Sneaker Net

Keeping Them Out : Prevention Network Firewall : Close All, then Open Selectively App Firewall : mod_security Server hardening Anti gateway Anti Web gateway Security Patch Management User education : against PEBKAC

The Internal Threat : Hello mate, trust me Data theft : workstation lock-down System sabotage : access control & audit Social engineering : user education Physical security : lock, procedures

Monitoring : Did we really stop them ? IDS : Intrusion Detection System Problem : false positive Enhancement : context-aware IDS Local Anti Virus : against sneaker net, etc Vulnerability scanners : proactive Log files monitor : Access audit

Summary Layered Security Approach : Biggest bang for the buck first Monitoring Preparing for the rainy day : Disaster Recovery Be Paranoid : One breach = All at risk The chain is only as strong as its weakest link Thank You