Site hosted by Angelfire.com: Build your free website today!

Page01

Page02

Page03

Page04

Page05

Page06

Page07

Page08

Page09 Page10

HOME

"All people dream: but not equally.Those who dream by night in the dusty recesses of their minds wake in the day to find that it was vanity; but the dreamers of the day are dangerous people,for they may act their dreams with open eye, to make it possible."

T.E. Lawrence .

 Team

This Website is designed together by the Malmon team consisting Ahmad Mohamad , Saiful Islam and Jaafar Najmuddin.

 

GB 3020 PROJECT

What are the countermeasures to the these threats? 

The countermeasures to these threats involve three elements, people, technology and policy. People will be concerned on the awareness, knowledge and skills as countermeasures, technology will be concerned on tools and programs as countermeasures and policies and Standard Operating Procedures to govern the implementation of the countermeasures. Secure DSL connection A secure DSL connections depends on the topology of the component in a DSL connection. The most wide spread use of the DSL format is ADSL which stands for Asymmetric Digital Subscriber Line and is used for residential and small businesses to connect to the Internet at high speeds. 

Sean Boran in his article at http://www.securityportal.com  has recommended modem topology for a secure ADSL connection. We find this is a good and secure topology for home users using DSL connection. Recommended secure ADSL connection topology: NOTE: The modem must be external and not an internal card in a PC. Assuming a single PC is protected: ADSL Modem Internal PC Phone line Personal Firewall Assuming a small network of up to a few PCs are protected 

Generally, another way is to turn off your computer or disconnect its Ethernet interface when you are not using your computer as an intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network. Patch your system with latest patches as many security incidents are attributed to .vbs virus and unprotected file sharing are as a result of not keeping updated with Microsoft's latest patches. Microsoft (http://www.microsoft.com) is always coming up with latest patches to patch any vulnerabilities discovered on Windows operating systems. These patches are critical to defend against vulnerabilities in Windows and Internet Explorer. 

Install a personal firewall 

Basically, a personal firewall defends computers and networks from malicious and unauthorized access or connections. Personal firewall alerts users when someone is attempting unauthorized connection to their PCs and has the ability to block intruders from connecting to the computer again. The following personal firewalls are good defense mechanism against these threats. Zone Alarm has the capability to close netbios port and other ports in Windows operating systems, will stealth ports and stop covert information exchange in the system. It is available at http:// www.zonelabs.com . Zone Alarm's newest version also has a feature to help guard against .vbs viruses. These programs are also good to use for small networks using a dial up connection, DSL or cable modems. ATGuard can be configured to handle ActiveX and JavaScript and restrict access to other areas of your system. BlackIce Defender has the packet-filtering firewall component and intrusion detection component which has stateful inspection capabilities to monitor the system. Interestingly, Black Ice Defender can identify a malicious traffic before permitting the traffic in and upon detection it will alert you, log the activities and block it. Black Ice Defender is also able to gather information about the attacker such as host name and MAC address.

Install anti-virus softwares and malicious program detectors.  

It is important to have an updated version of anti-virus softwares installed in your PCs to scan and detect the presence of any virus. They look for patterns in the files or memory of your computer that indicate the possible presence of a known virus. Anti-virus packages know what to look for through the use of virus profiles (sometimes called signatures") provided by the vendor. Anti-virus should be updated with latest virus definitions or the anti-virus should support automatic updates in order to detect new viruses since new viruses are discovered daily. List of well known anti-virus vendors is available at http://www.mycert.org.my/antivirus.htm A trojan horse detector is also fairly important and most anti-virus softwares can detect trojan horses. Tauscan, a trojan horse detect program, available at http://www.agnitum.com, is updated

 

Thanks For Visiting Our Site

Site Map

| PYTHON | BLACKBOARD | WEBMAIL | NPS | HOME |

Yahoo! GeoCities Member Banner Exchange



TODAY 

This is the beginning of a New Day. I have this day to use as I will. I can waste it or grow in its light and be of service to others.
But what I do with this day is important because I have exchange a day of my life for it. When tomorrow comes, today will be gone forever. I hope I will not regret the price I paid for it."

 Today :



1