SlideShare una empresa de Scribd logo
1 de 26
LimKokWing University Security and Windows 7 SanjayW – MVP (Security) Azra Rizal – MVP (Security)
Topics Why anyone should care about information security? Introduction & Goals The 10 security misconceptions New and emerging threats Protecting privacy and information with Windows 7 and other Microsoft solutions Demos Certifications – Your competitive advantage
Why anyone should care about information security? Just about every professional  discipline uses computers Keeping your data, yours The Internet Social engineering Knowledge is power Threat of espionage  If you don’t then who will? It is your responsibility, legally speaking! It’s a lifelong benefit
Introduction
Our Goal
Top ten security myths I’ve got antivirus, I’m good to go I have a strong password on my laptop, no one can access my data I don’t use Windows,  I’m already secure No one can see what I do in a public/private WiFi/network The campus IT guys got me covered
Top ten security myths –Cont’d I never visit “bad” internet sites, I will be safe I hide all my stuff in hidden folders and such, my data is safe I never add anyone Idon’t know on socialnetworking sites, blogs, etc.. I install lots of security software, I think I am fine I store all my data externally and I carry that everywhere safely
Why Antivirus alone isn’t enough? Antivirus rely on patterns, i.e. it’s as good as the pattern you use Worms can potentially disarm protection and access to security websites Thus, most exploits become successful because of one primary thing: Lack of patching, both application and OS
P@sswords? What constitute a good password? Definitely not a passWORD, should a passPHRASE instead FACT! - Longer passwords are better than short complex ones 5 characters (all lowercase) takes about a minute to crack @ 500,000 passwords/sec 10 characters (all lowercase) would take approximately 10 years @ 500,000 passwords/sec Of course, don’t use known (dictionary) words la..
Security problems are everywhere, anywhere.. Which is more secure? Unix/Linux or Windows? Or Mac? Security is as strong as it’s weakest link Sometimes (actually most of the time) it’s the human factor E.g. lack of patching E.g. lack of security updates in applications E.g. use of weak passwords
Wired/Wireless Network Which is “better”? Use of public networks (e.g. hotspots) Do’s  Don’ts
Organizational security Protects a lot but not enough The perimeter should be your own machine Moving out of the org Using 3G modems, wireless peer, 3rd party connectivity
Threats come uninvited (too) Almost 50% of threats finds its own way to you The rest are probably invited ones  Plug an unpatched, unprotected computer out on an unprotected internet connection Takes approximately 20 minutes to get it ridiculed with worms and viruses
Obscurity  Security through obscurity is not security It’s merely hiding E.g. hiding a folder in your computer Using “hide tools” Hiding is fine, just as long you know, it’s not securing
Online Friends The issue is not whether who you add or allow to see your private data Social networking,  blogs, picture sites etc.. It’s human to trust friends, disallowing people you don’t know Thin line between friends and foes
Beefing up security The fact is, the more you have isn’t always the best when the sum of it matters That doesn’t also mean, the less is better The important thing to remember, the easier the better That you understand, you best use That you don’t you may misuse
Mobile storage Easiest way to access your data Does not carry any security by default Password protection on those drives can be easily defeated
New and emerging threats Social networking Mobile devices Web 2.0
Social Networking Facebook/Tweeter – The open book of one’s life Be careful what you post and update in there There’s always search engines to profile you
Read the prints Always check what an application, website etc is asking you for..
Read the prints Google’s ad sensing technology Google scans the text of Gmail messages in order to filter spam and detect viruses, just as all major webmail services do. Google also uses this scanning technology to deliver targeted text ads and other related information. This is completely automated and involves no humans.
Mobile devices PDA/Smartphones iPods etc… Any device that has data, and its mobile and it can connect to the internet
Web 2.0 Blogs, youtube, photos, online spaces, virtual worlds Try searching yourself from here www.123people.com
Other stuff that make it to the headlines
How much information you can deduce from this..? A facebook status message I saw 2 days ago.. “We are packed and ready for Singapore. Peace and quiet! Then, some friends replied, including this.. “Don’t worry bro, Goggles is in good hands..”
How much information you can deduce from this..? The person is not contactable The person will most likely be away on a holiday/not working He’s not travelling alone They have not left *yet*, safe bet, 1 day top Most likely Fluff is dog/cat/fish, and his house will be empty!!!!!  His pet’s name is Googles His friend (probably a neighbor) will either frequent the house to feed the animal..

Más contenido relacionado

La actualidad más candente

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMuthu Kumar
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 

La actualidad más candente (20)

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Protect
ProtectProtect
Protect
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Computer safety
Computer safetyComputer safety
Computer safety
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 

Destacado

Windows 7 For Students_MVP Jabez Gan
Windows 7 For Students_MVP Jabez GanWindows 7 For Students_MVP Jabez Gan
Windows 7 For Students_MVP Jabez GanQuek Lilian
 
SharePoint 2010 launch_MVP Sampath Perera
SharePoint 2010 launch_MVP Sampath PereraSharePoint 2010 launch_MVP Sampath Perera
SharePoint 2010 launch_MVP Sampath PereraQuek Lilian
 
Express web development with visual studio 2010 express_MVP Ronald Rajagukguk
Express web development with visual studio 2010 express_MVP Ronald Rajagukguk Express web development with visual studio 2010 express_MVP Ronald Rajagukguk
Express web development with visual studio 2010 express_MVP Ronald Rajagukguk Quek Lilian
 
Windows server 2008 r2 and web platform_MVP Fajar
Windows server 2008 r2 and web platform_MVP FajarWindows server 2008 r2 and web platform_MVP Fajar
Windows server 2008 r2 and web platform_MVP FajarQuek Lilian
 
Expression studio overview_MVP Kok Chiann
Expression studio overview_MVP Kok ChiannExpression studio overview_MVP Kok Chiann
Expression studio overview_MVP Kok ChiannQuek Lilian
 
Singapore MVP gazette
Singapore MVP gazetteSingapore MVP gazette
Singapore MVP gazetteQuek Lilian
 
Sql2008 R2 Dw (Phua Chiu Kiang)
Sql2008 R2 Dw (Phua Chiu Kiang)Sql2008 R2 Dw (Phua Chiu Kiang)
Sql2008 R2 Dw (Phua Chiu Kiang)Quek Lilian
 
Installation and Adminstration of AD_MVP Padman
Installation and Adminstration of AD_MVP PadmanInstallation and Adminstration of AD_MVP Padman
Installation and Adminstration of AD_MVP PadmanQuek Lilian
 

Destacado (8)

Windows 7 For Students_MVP Jabez Gan
Windows 7 For Students_MVP Jabez GanWindows 7 For Students_MVP Jabez Gan
Windows 7 For Students_MVP Jabez Gan
 
SharePoint 2010 launch_MVP Sampath Perera
SharePoint 2010 launch_MVP Sampath PereraSharePoint 2010 launch_MVP Sampath Perera
SharePoint 2010 launch_MVP Sampath Perera
 
Express web development with visual studio 2010 express_MVP Ronald Rajagukguk
Express web development with visual studio 2010 express_MVP Ronald Rajagukguk Express web development with visual studio 2010 express_MVP Ronald Rajagukguk
Express web development with visual studio 2010 express_MVP Ronald Rajagukguk
 
Windows server 2008 r2 and web platform_MVP Fajar
Windows server 2008 r2 and web platform_MVP FajarWindows server 2008 r2 and web platform_MVP Fajar
Windows server 2008 r2 and web platform_MVP Fajar
 
Expression studio overview_MVP Kok Chiann
Expression studio overview_MVP Kok ChiannExpression studio overview_MVP Kok Chiann
Expression studio overview_MVP Kok Chiann
 
Singapore MVP gazette
Singapore MVP gazetteSingapore MVP gazette
Singapore MVP gazette
 
Sql2008 R2 Dw (Phua Chiu Kiang)
Sql2008 R2 Dw (Phua Chiu Kiang)Sql2008 R2 Dw (Phua Chiu Kiang)
Sql2008 R2 Dw (Phua Chiu Kiang)
 
Installation and Adminstration of AD_MVP Padman
Installation and Adminstration of AD_MVP PadmanInstallation and Adminstration of AD_MVP Padman
Installation and Adminstration of AD_MVP Padman
 

Similar a Lkw Security Part 1_MVPs Azra & Sanjay

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Intro to web 2.0 Security
Intro to web 2.0 SecurityIntro to web 2.0 Security
Intro to web 2.0 SecurityJP Bourget
 

Similar a Lkw Security Part 1_MVPs Azra & Sanjay (20)

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Security
SecuritySecurity
Security
 
IT Security
IT SecurityIT Security
IT Security
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Intro to web 2.0 Security
Intro to web 2.0 SecurityIntro to web 2.0 Security
Intro to web 2.0 Security
 

Más de Quek Lilian

Sgug print copy pdf ll
Sgug print copy pdf llSgug print copy pdf ll
Sgug print copy pdf llQuek Lilian
 
Exchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP PadmanExchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP PadmanQuek Lilian
 
Installing managing windows server 2008 r2_MVP Shaminda
Installing managing windows server 2008 r2_MVP ShamindaInstalling managing windows server 2008 r2_MVP Shaminda
Installing managing windows server 2008 r2_MVP ShamindaQuek Lilian
 
NUS exam 70-432_MVP Choirul Amri
NUS exam 70-432_MVP Choirul AmriNUS exam 70-432_MVP Choirul Amri
NUS exam 70-432_MVP Choirul AmriQuek Lilian
 
Commercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev ChalermvongCommercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev ChalermvongQuek Lilian
 
Commercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev ChalermvongCommercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev ChalermvongQuek Lilian
 
Unveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy PradeepUnveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy PradeepQuek Lilian
 
Unveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy PradeepUnveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy PradeepQuek Lilian
 
Introduction To Virtualization_MVP Jabez Gan
Introduction To Virtualization_MVP Jabez GanIntroduction To Virtualization_MVP Jabez Gan
Introduction To Virtualization_MVP Jabez GanQuek Lilian
 
Vs2010 Aspnet MSP Bootcamp_MVP Ngan Seok Chern
Vs2010 Aspnet MSP Bootcamp_MVP Ngan Seok ChernVs2010 Aspnet MSP Bootcamp_MVP Ngan Seok Chern
Vs2010 Aspnet MSP Bootcamp_MVP Ngan Seok ChernQuek Lilian
 
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath PereraWindows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath PereraQuek Lilian
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoQuek Lilian
 
Microsoft Direct Access (part 1)_John Delizo
Microsoft Direct Access (part 1)_John DelizoMicrosoft Direct Access (part 1)_John Delizo
Microsoft Direct Access (part 1)_John DelizoQuek Lilian
 
Vs2010 Apiit Mix On Campus_Ngan Seok Chern
Vs2010 Apiit Mix On Campus_Ngan Seok ChernVs2010 Apiit Mix On Campus_Ngan Seok Chern
Vs2010 Apiit Mix On Campus_Ngan Seok ChernQuek Lilian
 
Web Vulnerabilities_NGAN Seok Chern
Web Vulnerabilities_NGAN Seok ChernWeb Vulnerabilities_NGAN Seok Chern
Web Vulnerabilities_NGAN Seok ChernQuek Lilian
 
Creating Dynamic Web Application Using ASP.Net 3 5_MVP Alezandra Buencamino N...
Creating Dynamic Web Application Using ASP.Net 3 5_MVP Alezandra Buencamino N...Creating Dynamic Web Application Using ASP.Net 3 5_MVP Alezandra Buencamino N...
Creating Dynamic Web Application Using ASP.Net 3 5_MVP Alezandra Buencamino N...Quek Lilian
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosQuek Lilian
 
Migration to Windows 7_MVP Tutang MM
Migration to Windows 7_MVP Tutang MMMigration to Windows 7_MVP Tutang MM
Migration to Windows 7_MVP Tutang MMQuek Lilian
 
Wave14 -EBS 2008 & SBS 2008 by MVP Jabez Gan
Wave14 -EBS 2008 & SBS 2008 by MVP Jabez GanWave14 -EBS 2008 & SBS 2008 by MVP Jabez Gan
Wave14 -EBS 2008 & SBS 2008 by MVP Jabez GanQuek Lilian
 
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching Loong
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching LoongWave14 - Exchange 2010 Beta Preview by MVP Poo Ching Loong
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching LoongQuek Lilian
 

Más de Quek Lilian (20)

Sgug print copy pdf ll
Sgug print copy pdf llSgug print copy pdf ll
Sgug print copy pdf ll
 
Exchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP PadmanExchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP Padman
 
Installing managing windows server 2008 r2_MVP Shaminda
Installing managing windows server 2008 r2_MVP ShamindaInstalling managing windows server 2008 r2_MVP Shaminda
Installing managing windows server 2008 r2_MVP Shaminda
 
NUS exam 70-432_MVP Choirul Amri
NUS exam 70-432_MVP Choirul AmriNUS exam 70-432_MVP Choirul Amri
NUS exam 70-432_MVP Choirul Amri
 
Commercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev ChalermvongCommercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev Chalermvong
 
Commercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev ChalermvongCommercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev Chalermvong
 
Unveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy PradeepUnveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy Pradeep
 
Unveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy PradeepUnveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy Pradeep
 
Introduction To Virtualization_MVP Jabez Gan
Introduction To Virtualization_MVP Jabez GanIntroduction To Virtualization_MVP Jabez Gan
Introduction To Virtualization_MVP Jabez Gan
 
Vs2010 Aspnet MSP Bootcamp_MVP Ngan Seok Chern
Vs2010 Aspnet MSP Bootcamp_MVP Ngan Seok ChernVs2010 Aspnet MSP Bootcamp_MVP Ngan Seok Chern
Vs2010 Aspnet MSP Bootcamp_MVP Ngan Seok Chern
 
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath PereraWindows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John Delizo
 
Microsoft Direct Access (part 1)_John Delizo
Microsoft Direct Access (part 1)_John DelizoMicrosoft Direct Access (part 1)_John Delizo
Microsoft Direct Access (part 1)_John Delizo
 
Vs2010 Apiit Mix On Campus_Ngan Seok Chern
Vs2010 Apiit Mix On Campus_Ngan Seok ChernVs2010 Apiit Mix On Campus_Ngan Seok Chern
Vs2010 Apiit Mix On Campus_Ngan Seok Chern
 
Web Vulnerabilities_NGAN Seok Chern
Web Vulnerabilities_NGAN Seok ChernWeb Vulnerabilities_NGAN Seok Chern
Web Vulnerabilities_NGAN Seok Chern
 
Creating Dynamic Web Application Using ASP.Net 3 5_MVP Alezandra Buencamino N...
Creating Dynamic Web Application Using ASP.Net 3 5_MVP Alezandra Buencamino N...Creating Dynamic Web Application Using ASP.Net 3 5_MVP Alezandra Buencamino N...
Creating Dynamic Web Application Using ASP.Net 3 5_MVP Alezandra Buencamino N...
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R Barrios
 
Migration to Windows 7_MVP Tutang MM
Migration to Windows 7_MVP Tutang MMMigration to Windows 7_MVP Tutang MM
Migration to Windows 7_MVP Tutang MM
 
Wave14 -EBS 2008 & SBS 2008 by MVP Jabez Gan
Wave14 -EBS 2008 & SBS 2008 by MVP Jabez GanWave14 -EBS 2008 & SBS 2008 by MVP Jabez Gan
Wave14 -EBS 2008 & SBS 2008 by MVP Jabez Gan
 
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching Loong
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching LoongWave14 - Exchange 2010 Beta Preview by MVP Poo Ching Loong
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching Loong
 

Lkw Security Part 1_MVPs Azra & Sanjay

  • 1. LimKokWing University Security and Windows 7 SanjayW – MVP (Security) Azra Rizal – MVP (Security)
  • 2. Topics Why anyone should care about information security? Introduction & Goals The 10 security misconceptions New and emerging threats Protecting privacy and information with Windows 7 and other Microsoft solutions Demos Certifications – Your competitive advantage
  • 3. Why anyone should care about information security? Just about every professional discipline uses computers Keeping your data, yours The Internet Social engineering Knowledge is power Threat of espionage If you don’t then who will? It is your responsibility, legally speaking! It’s a lifelong benefit
  • 6. Top ten security myths I’ve got antivirus, I’m good to go I have a strong password on my laptop, no one can access my data I don’t use Windows, I’m already secure No one can see what I do in a public/private WiFi/network The campus IT guys got me covered
  • 7. Top ten security myths –Cont’d I never visit “bad” internet sites, I will be safe I hide all my stuff in hidden folders and such, my data is safe I never add anyone Idon’t know on socialnetworking sites, blogs, etc.. I install lots of security software, I think I am fine I store all my data externally and I carry that everywhere safely
  • 8. Why Antivirus alone isn’t enough? Antivirus rely on patterns, i.e. it’s as good as the pattern you use Worms can potentially disarm protection and access to security websites Thus, most exploits become successful because of one primary thing: Lack of patching, both application and OS
  • 9. P@sswords? What constitute a good password? Definitely not a passWORD, should a passPHRASE instead FACT! - Longer passwords are better than short complex ones 5 characters (all lowercase) takes about a minute to crack @ 500,000 passwords/sec 10 characters (all lowercase) would take approximately 10 years @ 500,000 passwords/sec Of course, don’t use known (dictionary) words la..
  • 10. Security problems are everywhere, anywhere.. Which is more secure? Unix/Linux or Windows? Or Mac? Security is as strong as it’s weakest link Sometimes (actually most of the time) it’s the human factor E.g. lack of patching E.g. lack of security updates in applications E.g. use of weak passwords
  • 11. Wired/Wireless Network Which is “better”? Use of public networks (e.g. hotspots) Do’s Don’ts
  • 12. Organizational security Protects a lot but not enough The perimeter should be your own machine Moving out of the org Using 3G modems, wireless peer, 3rd party connectivity
  • 13. Threats come uninvited (too) Almost 50% of threats finds its own way to you The rest are probably invited ones  Plug an unpatched, unprotected computer out on an unprotected internet connection Takes approximately 20 minutes to get it ridiculed with worms and viruses
  • 14. Obscurity Security through obscurity is not security It’s merely hiding E.g. hiding a folder in your computer Using “hide tools” Hiding is fine, just as long you know, it’s not securing
  • 15. Online Friends The issue is not whether who you add or allow to see your private data Social networking, blogs, picture sites etc.. It’s human to trust friends, disallowing people you don’t know Thin line between friends and foes
  • 16. Beefing up security The fact is, the more you have isn’t always the best when the sum of it matters That doesn’t also mean, the less is better The important thing to remember, the easier the better That you understand, you best use That you don’t you may misuse
  • 17. Mobile storage Easiest way to access your data Does not carry any security by default Password protection on those drives can be easily defeated
  • 18. New and emerging threats Social networking Mobile devices Web 2.0
  • 19. Social Networking Facebook/Tweeter – The open book of one’s life Be careful what you post and update in there There’s always search engines to profile you
  • 20. Read the prints Always check what an application, website etc is asking you for..
  • 21. Read the prints Google’s ad sensing technology Google scans the text of Gmail messages in order to filter spam and detect viruses, just as all major webmail services do. Google also uses this scanning technology to deliver targeted text ads and other related information. This is completely automated and involves no humans.
  • 22. Mobile devices PDA/Smartphones iPods etc… Any device that has data, and its mobile and it can connect to the internet
  • 23. Web 2.0 Blogs, youtube, photos, online spaces, virtual worlds Try searching yourself from here www.123people.com
  • 24. Other stuff that make it to the headlines
  • 25. How much information you can deduce from this..? A facebook status message I saw 2 days ago.. “We are packed and ready for Singapore. Peace and quiet! Then, some friends replied, including this.. “Don’t worry bro, Goggles is in good hands..”
  • 26. How much information you can deduce from this..? The person is not contactable The person will most likely be away on a holiday/not working He’s not travelling alone They have not left *yet*, safe bet, 1 day top Most likely Fluff is dog/cat/fish, and his house will be empty!!!!! His pet’s name is Googles His friend (probably a neighbor) will either frequent the house to feed the animal..

Notas del editor

  1. Its hard to find professional jobs that do not use themWhat you don’t share is probably private, lets keep it that wayTakes just about 20 minutes for a computer to get infected or compromised onlineSimple examples – Bank scenario …e.g. helpdesk asking for passwordPeople will do just about anything to pin you down, why make it easy for them?It’s knowledge that you can benefit from, just like driving a car, for a lifetime
  2. You ..begins with someoneYour data - When you start having data, over the internet, email, phones, PDA, laptops, thumbdrives, shared drives etcYour network – Both physically, metaphysical, virtual and human interactions transformed into digital dataExposures – Information gets leakedExploit – Malicious intent with your data and information
  3. Show you how Windows 7 helpsYou – empower you with knowledgeAzra will show you how you can secure your dataHelp you make intelligent decisions on what to share and what not to shareShrink unwanted exposure to virtually zeroDestroy possibilities of data exploits
  4. - Antivirus -
  5. Patterns - until you don’t have the newest pattern, you won’t know you are infected or vulnerable
  6. Wifi doAlways ask if that is the SSID (the broadcast) name actually belong to that providerRequest if you can use itWifi don’tIf it’s public, avoid private sites, banking sites if possibleWhen accessing anything that require passwords, make sure its HTTPS/FTP etc, otherwise, do it later
  7. - Information disclose
  8. Not much security emphasis is given on these devicesWhile “browsing in starbucks over a unauthenticated bluetooth connection”