NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Security Awareness Presenter: Royce Wilkerson.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
eScan Total Security Suite with Cloud Security
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
What is Spam? d min.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Computer Security Keeping you and your computer safe in the digital world.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Presentation transcript:

NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution

The changing world has changed … The Concept of Money …. And hence the methods of Crime. The Concept of Data & Records …. And hence the way it is stored, preserved and protected. The Concept of Infrastructure…. And hence the way it is maintained and managed. The Concept of Attack…. And hence the way security is to be implemented

Money has moved inside Computer

The Concept of Crime

Copy the Key Methodology

The Aides Install & Propagate Spywares Install Key Loggers Get passwords, Credit Card Nos and other sensitive data on the Server

The Smart Thug Methodology Q : Why break in if you can get it easily ? A : The typical Thug style.

The Aides Phishing through websites hacking Phishing through look alike Website (typographic errors are welcome) Phishing through SPAM

Phishing mail tempting user to click on the link

‘You have won $1,000,000. Kindly send your bank details for crediting your account.’ Nigeria Scam Personalized Mail Asking for few hundred or thousand dollars against Million Claim to be last obstacle before big money is released

The Aides Pushing spyware with –Hot Selling item SEX (normally through porn sites) –Harmless looking items like wallpaper, themes and other utilities FREE. ( Off course with some Free trouble as well.) –Free tools to help you get rid of Spywares !! –Though Click on Advertisements as well!!

The fake scanner redirects to "antivirus-scan online" from and the bogus "video decoder" is a variant of Trojan.Zlob (install_player_ exe)

Major Control Tools

User Awareness

Attacks through social engineering. Lure user into launching an infected file or link. –Free utility –P2P sites –Crack sites –Tempting message in –Fake & attachments

Exploiting Vulnerabilities Vulnerabilities in Operating System Vulnerabilities in Application like Adobe, Flash, Outlook, Internet Explorer…. Intranet –1 PC infection can spread to 100 PC network in seconds. –External storage (Pen Drive, External HDD, CD etc…)

Alarming activities High network traffic Increased Disk Activity Suspicious files Deletion of file Alarm raised by O/S or firewall Your Anti Virus starts reporting malware attack

Major Control Tools Desktop Security – Anti Virus, Anti Spyware, Anti Malware etc. Perimeter Security – Firewall, Content Filtering, Anti Virus, Anti Spyware, Intrusion Prevention etc.

Features you may look forward in Anti Virus Example based on Quick Heal Av

Setting update path

Blocking of USB

Securely deletion of Data

Clean traces

Hijack Restore

Parental Control

Desktop Firewall etc….

Fortinet Confidential FortiGate Unified Threat Management - A new generation of security solutions FortiGate Unified Threat Management Solutions –Firewall (ICSA Certified) –VPN (ICSA Certified) –Antivirus (ICSA Certified) –IPS (ICSA & NSS Certified) –URL filtering (CIPA compliant) –AntiSpam (ICSA Certified) –SSL-VPN (ICSA Certified)

Thanks