information security awareness
play

INFORMATION SECURITY AWARENESS Information Security Education - PowerPoint PPT Presentation

Leading a Secured Digital Life. INFORMATION SECURITY AWARENESS Information Security Education & Awareness Team C-DAC Hyderabad keeping yourself and your family safe in a tech driven world Free No : 1 1800 0 425 6 6235 Toll F


  1. Leading a Secured Digital Life……. INFORMATION SECURITY AWARENESS Information Security Education & Awareness Team C-DAC Hyderabad keeping yourself and your family safe in a tech driven world Free No : 1 1800 0 425 6 6235 Toll F Ministry of Electronics & Information Technology Government of India Tuesday, December 5, 2017

  2. INFO NFORMA RMATION TION SE SECUR CURITY ITY AWAR AREN ENESS ESS Inform formati ation on Se Secur urit ity y Educ ucati ation on & Aware arene ness ss Team keeping yourself and your family safe in C-DAC DAC Hyde dera rabad bad a tech driven world www.infosecawareness.in

  3. Cyber society In today’s world, we depend on Internet at home, in school and at work place Tuesday, December 5, 2017

  4. How and for what purpose do you use the Internet ?? Communication Education Online Shopping E-mail Fun/Entertainment Social Networking Online Banking Tuesday, December 5, 2017

  5. While using the Internet what are the primary online risks you face Tuesday, December 5, 2017

  6. Yes, the answer is Malware Tuesday, December 5, 2017

  7. What is a malware ?? Malware in short known for malicious software. It is software designed to infiltrate a computer system without the owner's informed consent. Tuesday, December 5, 2017

  8. Types of Malwares ? Ransomware 'M 'Malware' ware' is an umb mbrell rella a ter erm m used d to ref efer r to a variety ety of form rms s of host stile e or intrusive sive softw ftwar are e including ding comput puter er viruses, uses, worms, s, Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

  9. Ransomware These type of malware alter the normal operation of your machine, thus barring you to use it properly. Thereafter, these programs display warning messages asking for money to get your device back to normal working condition. After reading this, you might be thinking why people create Malware. Here are some reasons which may compel a coder to write malware codes: • Take control of a person’s computer for personal or professional reasons. • To get financial benefits. • To steal confidential data. 'M 'Malware' ware' is an umb mbrell rella a ter erm m used d to ref efer r • To prove their point regarding a security breach that can be done on to a variety ety of form rms s of host stile e or intrusive sive softw ftwar are e including ding comput puter er viruses, uses, worms, s, a system. Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, • To take down an individual computer or a complete network. adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

  10. Let’s Discuss about recent ransomware attack happened ? Wa Wanna nnaCry Cry/Wa Wann nnaCrypt aCrypt Ransomwa ansomware re ? ? The WannaCry ransomware attack is an ongoing worldwide cyberattack by the WannaCry ransomware cryptoworm, which targets computers running the Microsoft Windows 'M 'Malware' ware' is an umb mbrell rella a ter erm m used d to ref efer r operating system by encrypting data and demanding ransom to a variety ety of form rms s of host stile e or intrusive sive payments in the Bitcoin cryptocurrency. softw ftwar are e including ding comput puter er viruses, uses, worms, s, Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

  11. How the WannaCry attack Spread the Countries 'M 'Malware' ware' is an umb mbrell rella a ter erm m used d to ref efer r to a variety ety of form rms s of host stile e or intrusive sive softw ftwar are e including ding comput puter er viruses, uses, worms, s, Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

  12. Cont.. • On Friday morning Spanish mobile operator Telefonica was among the first large organizations to report infection by WannaCry. • By late morning, hospitals and clinics across the UK began reporting problems to the national cyber incident response Centre. • In Europe, French carmaker Renault was hit, in Germany, Deutsche Bahn became another high-profile victim. • In Russia, the ministry of the interior, mobile phone provider Megafon and Sberbank became infected. • Although WannaCry's spread had already been checked, the US was not entirely spared, with FedEx being the highest-profile victim. Tuesday, December 5, 2017

  13. • Wannacry encrypts the files on infected Windows systems. This ransomware spreads by using a vulnerability in implementations of Server Message Block (SMB) in Windows systems. This exploit is named as ETERNALBLUE. • The ransomware called WannaCrypt or WannaCry encrypts the computer's hard disk drive and then spreads laterally between computers on the same LAN. The ransomware also spreads through malicious attachments to emails. • In order to prevent infection, users and organizations are advised to apply patches to Windows systems as mentioned in Microsoft Security Bulletin MS17-010. 'Malware' 'M ware' is an umb mbrell rella a ter erm m used d to ref efer r to a variety ety of form rms s of host stile e or intrusive sive softw ftwar are e including ding comput puter er viruses, uses, worms, s, Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

  14. The The file ile extensions xtensions that hat the the mal alwar ware is is targ targeting eting contain contain cer certain tain clusters sters of of formats ormats including ncluding: • Commonly used office file extensions (.ppt, .doc, .docx, .xlsx, .sxi). • Less common and nation-specific office formats (.sxw, .odt, .hwp). • Archives, media files (.zip, .rar, .tar, .bz2, .mp4, .mkv) • Emails and email databases (.eml, .msg, .ost, .pst, .edb). • Database files (.sql, .accdb, .mdb, .dbf, .odb, .myd). • Developers' sourcecode and project files (.php, .java, .cpp, .pas, .asm). • Encryption keys and certificates (.key, .pfx, .pem, .p12, .csr, .gpg, .aes). • 'Malware' 'M ware' is an umb mbrell rella a ter erm m used d to ref efer r Graphic designers, artists and photographers files (.vsd, .odg, .raw, to a variety ety of form rms s of host stile e or intrusive sive .nef, .svg, .psd). softw ftwar are e including ding comput puter er viruses, uses, worms, s, • Virtual machine files (.vmx, .vmdk, .vdi). Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

  15. Best practices to prevent ransomware attacks: Maintain updated • Antivirus software on all systems. • Check regularly for the integrity of the information stored in the 'M 'Malware' ware' is an umb mbrell rella a ter erm m used d to ref efer r databases. to a variety ety of form rms s of host stile e or intrusive sive softw ftwar are e including ding comput puter er viruses, uses, worms, s, Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

  16. Cont.. • Regularly check the contents of backup files of databases for any unauthorized encrypted contents of data records or external elements, (backdoors /malicious scripts.) • Ensure integrity of the codes /scripts being used in database, authentication and sensitive 'Malware' 'M ware' is an umb mbrell rella a ter erm m used d to ref efer r systems to a variety ety of form rms s of host stile e or intrusive sive softw ftwar are e including ding comput puter er viruses, uses, worms, s, Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

  17. Cont.. • Keep the operating system third party applications (MS office, browsers, browser Plugins) up-to-date with the latest patches. • Application whitelisting/Strict implementation of Software Restriction Policies (SRP) to block binaries running from 'Malware' 'M ware' is an umb mbrell rella a ter erm m used d to ref efer r %APPDATA% and %TEMP% to a variety ety of form rms s of host stile e or intrusive sive paths. Ransomware sample softw ftwar are e including ding comput puter er viruses, uses, worms, s, drops and executes generally Troj ojan an horse rses, s, ransom somware ware, , spyw ywar are, e, from these locations. adware, ware, scareware areware, , and other er ma malicious ous prog ograms. rams. Tuesday, December 5, 2017

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend