63
Nathan J. Gibson, CISSP-CISM-CCNA- MCSA

Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Embed Size (px)

Citation preview

Page 1: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Nathan J. Gibson, CISSP-CISM-CCNA-MCSA

Page 2: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Virus Trojans Worms Spyware BotNets Social Engineering

Thieves Hackers Sexual predators Harassers

Page 3: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Personal Data Identity Theft Bank Account Information

Hard Drive Space Pornography Storage Hide stolen information Distribute copyrighted material

CPU cycles Cracking code Writing Software

Robot Computer Attack other sites Profit from large BotNet

Page 4: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

E-mail Greeting Cards Chain Letters Hoax

WebPages Phishing Blogs

CD’s, Jump Drives, Floppy Disk Instant Messengers PDA’s

Page 5: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Fake Greeting Cards Appear to come from a friend Links in e-mail point to malicious sites Automatically Downloads malicious files

Chain Letters “Bill Gates is tracking this e-mail” Religious Emails Sue needs your help emails “Forward to Everyone you Know!!!!”

Page 6: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 7: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Hoax E-mails “Diplomat Husband died and left me $100

Million $198.4 Million Lost in 2006 alone Date Line “ To catch an ID Thief”

http://www.msnbc.msn.com/id/17805134/ Investment E-mails Hoax Virus Alert E-mails

Good Times Virus

Page 8: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Teenagers like to make friends Messenger

Skilled in extracting information Blogs

To much sensitive information MySpace - 500 people tested 80% release

sensitive information Pictures reveal a lot of information and

motivate attackers

Page 9: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

AntiVirus AntiSpyware Firewalls Updates Safe Browsing Habits Common Sense and Knowledge Rules

Page 10: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Antivirus Free protection is available

McAfee: http://it.ouhsc.edu/services/desktopmgmnt/antivirussoftware.asp

AVG: http://free.grisoft.com/

Install Scan Immediately

Configure Daily Automatic Updates At least Weekly Scans

Page 11: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Anti Spyware Again Free Protection for all

Spybot S & D: http://www.safer-networking.org/en/download/index.html

Configure Automatic Updates At least Weekly Scans

Page 12: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Firewall Windows XP SP2 comes with a built in Firewall

Turn on/Configure Don’t Ignore Warnings Periodically Check Exceptions

Page 13: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 14: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 15: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 16: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 17: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 18: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Updates Configure to Automatically Update and Install Check Software vendor sites for updates

periodically Don’t postpone/ignore computer notifications.

Page 19: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 20: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 21: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 22: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Safe Browsing Habits Active X

Set Internet Explorer Settings Think before clicking “Yes”

Java Prompts Certificates

Don’t except certificates from people you don’t trust

SSL/Https Internet Explorer Phishing Tools

Page 23: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 24: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Okay! Okay! I understand not to click on everything. But my computer doesn’t give me that prompt.

Configure your security level

Page 25: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 26: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 27: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 28: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 29: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Certificates – SSL – HTTPS Secure & Confidential Internet Requires a degree of Trust

What is Phishing? www.bankofthewest.com vs.

www.bankofthevvest.com How can I be sure the site I am browsing

is legit?

Page 30: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

DOES THIS PROVE MY IDENTITY?

Page 31: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

STATE LICENSE HERE

-- This really proves my Identity

Page 32: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 33: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 34: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 35: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 36: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Your in Luck, Built in Phishing Help!

Page 37: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 38: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 39: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Search Engine & Website Information McAfee Site Advisor - Free

Malicious Downloads Spam e-mail Site Phishing Sites Links to other known bad sites

http://www.siteadvisor.com/download/ie.html

Page 40: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 41: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Common Sense and Knowledge If it is too good to be true….. Research e-mails and websites

www.snopes.com http://hoaxbusters.ciac.org/

Advise Family Members Block them if you have to

Criminal Act???? Mail Fraud(18 USC S1341)

Page 42: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

How to keep your kids safe on the internet1. Parenting

Communicating

2. Technology Enforcing and Monitoring

Page 43: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Step 1: Establish a contract

Times that are allowed Activities that are allowed Punishment for rule violation

Computer should be in an open space and not in their room

Page 44: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Step 2: Separate user accounts for you and your

kids You should have more rights than them to

restrict and monitor their activity Each child should have their own account and

password Trace unauthorized activity to a specific person

Page 45: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 46: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 47: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 48: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 49: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 50: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 51: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 52: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Step 3: Controlling Internet Activity

There are bad sites on the internet Some legit and education sites can be flagged

because of certain content

Page 53: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 54: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 55: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 56: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 57: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 58: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 59: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 60: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
Page 61: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Uninstall Chat programs you don’t want them to use

Create an e-mail with your ISP for them You can monitor and view e-mail Block other e-mail sites(e.g. hotmail, yahoo,

etc.) Key Loggers

Messengers E-mail Blogs

Browser History Programs

Page 62: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Configure your modems/routers to disable internet activity during certain hours Consult your ISP Technical support; they will

gladly help you

Page 63: Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

QUESTIONS/COMMENTS