1 / 28

NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution

NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution. The changing world has changed …. The Concept of Money …. And hence the methods of Crime. The Concept of Data & Records …. And hence the way it is stored, preserved and protected.

rafal
Download Presentation

NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution

  2. The changing world has changed … • The Concept of Money …. And hence the methods of Crime. • The Concept of Data & Records …. And hence the way it is stored, preserved and protected. • The Concept of Infrastructure…. And hence the way it is maintained and managed. • The Concept of Attack…. And hence the way security is to be implemented

  3. Money has moved inside Computer

  4. The Concept of Crime

  5. Copy the Key Methodology

  6. The Aides Get passwords, Credit Card Nos and other sensitive data on the Server Install & Propagate Spywares Install Key Loggers

  7. The Smart Thug Methodology Q : Why break in if you can get it easily ? A : The typical Thug style.

  8. The Aides Phishing through websites hacking Phishing through look alike Website (typographic errors are welcome) Phishing through SPAM

  9. Phishing mail tempting user to click on the link

  10. Nigeria Scam Personalized Mail Asking for few hundred or thousand dollars against Million Claim to be last obstacle before big money is released ‘You have won $1,000,000. Kindly send your bank details for crediting your account.’

  11. The Aides • Pushing spyware with • Hot Selling item SEX (normally through porn sites) • Harmless looking items like wallpaper, themes and other utilities FREE. ( Off course with some Free trouble as well.) • Free tools to help you get rid of Spywares !! • Though Click on Advertisements as well!!

  12. The fake scanner redirects to "antivirus-scan online" from and the bogus "video decoder" is a variant of Trojan.Zlob (install_player_3913241.exe)

  13. Major Control Tools

  14. User Awareness

  15. Attacks through social engineering. • Lure user into launching an infected file or link. • Free utility • P2P sites • Crack sites • Tempting message in eMail • Fake eMail & attachments

  16. Exploiting Vulnerabilities • Vulnerabilities in Operating System • Vulnerabilities in Application like Adobe, Flash, Outlook, Internet Explorer…. • Intranet • 1 PC infection can spread to 100 PC network in seconds. • External storage (Pen Drive, External HDD, CD etc…)

  17. Alarming activities • High network traffic • Increased Disk Activity • Suspicious files • Deletion of file • Alarm raised by O/S or firewall • Your Anti Virus starts reporting malware attack

  18. Major Control Tools Desktop Security – Anti Virus, Anti Spyware, Anti Malware etc. Perimeter Security – Firewall, Content Filtering, Anti Virus, Anti Spyware, Intrusion Prevention etc.

  19. Features you may look forward in Anti Virus Example based on Quick Heal Av

  20. Setting update path

  21. Blocking of USB

  22. Securely deletion of Data

  23. Clean traces

  24. Hijack Restore

  25. Parental Control

  26. Desktop Firewall etc….

  27. FortiGate Unified Threat Management Solutions Firewall (ICSA Certified) VPN (ICSA Certified) Antivirus (ICSA Certified) IPS (ICSA & NSS Certified) URL filtering (CIPA compliant) AntiSpam(ICSA Certified) SSL-VPN(ICSA Certified) FortiGate Unified Threat Management - A new generation of security solutions Fortinet Confidential

  28. Thanks

More Related