3. What is Cyber Terrorism?
• Online Scams • Identity Theft
» Auctions : Selling and buying » Social Engineering
goods online has become
popular • Forgery
» Security flaws
• Fraud
» Credit-Cards • Scams and Biometrics
» ATM’s and » Crime Fighting and Privacy
Telecommunications
• Embezzlement and
Sabotage
» Insider Attacks
4. This is an International Problem..
• International Trends in Cyber Crime
» Backdrop
• Insecure Web Infrastructure, Constantly evolving
Technology
• Cloud Computing, System Virtualization
• Cyber Threats
» Malware, Intrusions, SPAM, Financial fraud
» Child exploitation
• Social Websites, Trojans Attacks, Access Computer
resources
8. Integrated Threat Protection in Action
Problem:
Error message:
“Drops” copy of itself on
“Innocent” Video Link: system and attempts to
Redirects to malicious Website propagate
“Out of date” Flash player error:
“Download” malware file
Solution:
Integrated Web Filtering
Blocks access to malicious Website
Network Antivirus
Blocks download of virus
Intrusion Protection
Blocks the spread of the worm
9. Integrated Threat Protection in Action
• Application Control: Unwanted Services and P2P Limiting
Botnet command channel, compromised Facebook applications, independent of port or protocol
• Intrusion Prevention: Vulnerabilities and Exploits
Browser and website attack code crafted by hackers and criminal gangs.
• Web Filtering: Multiple categories and Malicious sites
Botnet command, phishing, search poisoning, inappropriate content
• Vulnerability Management: Real time exploit updates
Multiple scanning points Firewall Gate, Analyzer, Web, DB, and Scan
• Antispam: Unsolicited messages
Phishing, Malware, Social Engineering and Junk
• Antivirus: All malicious code
Documents, macros, scripts, executable
Delivered via Web, Email, USB, Instant messaging, social networks, etc.
10. LHS Connections and Updates
#harsh_ jangra
#HackingTechnoS
Get Latest Facebook
Hacking &
Security Updates
Security Updates Connect with us
Subscribed on
Facebook.com/HackingTechn
Hands-On Labs LHS/ePaper ologies
Here is an example of our approach in action. This is the Koobface attack, which is still active in the wild.Starts as a link to a non-existent video on a malicious site sent via IM, email, or webmail. The first layer of protection is web filtering to block access to the site. If the user clicks on the link, he would receive a phony alert telling him his player is not working, and to download a non-existent new version on a malicious site. By clicking on the “OK” button on the phony Error message, the user is actually instructing his system to install the virus. Antivirus protection would detect the file that the user is trying to install, and block itOnce installed, the worm would try to propagate. The IPS technology would detect the propagation effort, and block it before it could succeed.