1 00:00:14,340 --> 00:00:18,770 Well, let's conclude this section by learning the countermeasures. 2 00:00:19,770 --> 00:00:25,170 It is important to learn how to mitigate cyber attacks by learning the countermeasures. 3 00:00:25,590 --> 00:00:33,470 So in this lecture, we will see how countermeasures Trojan attacks and how we can prevent megadose, 4 00:00:33,750 --> 00:00:40,830 like how we can stop an attacker from installing and backdoor and then virus and Romes countermeasures. 5 00:00:41,130 --> 00:00:47,670 If you know the bomb and the virus difference, the only difference is that womb's are not self replicating. 6 00:00:47,670 --> 00:00:50,670 Virus viruses are sort of replicating. 7 00:00:50,850 --> 00:00:55,950 So without wasting much time, let us start Trojan countermeasures. 8 00:00:56,790 --> 00:01:06,210 So avoid opening e-mail attachments received from unknown senders, then block unnecessary ports and 9 00:01:06,210 --> 00:01:14,790 the host and the firewall avoid accepting programs transferred by instant messaging applications, harden 10 00:01:15,240 --> 00:01:20,070 weak default configuration settings and disable unused functionality. 11 00:01:22,090 --> 00:01:29,050 This what I said just a few seconds ago is known as security misconfiguration, this happens a lot of 12 00:01:29,050 --> 00:01:29,440 time. 13 00:01:29,440 --> 00:01:35,920 Generally, the administrator who has installed softwoods forgets it to configure it properly. 14 00:01:36,430 --> 00:01:41,470 He or she ignores the fact that, you know, the administrator and no one will have password and all 15 00:01:41,470 --> 00:01:42,040 those things. 16 00:01:42,040 --> 00:01:45,040 But attackers are one step ahead. 17 00:01:45,410 --> 00:01:50,340 Then the security professionals may always find a way to breach into the system. 18 00:01:50,350 --> 00:01:59,620 So and security professional security expert should know each and every step of how Endako can think 19 00:01:59,620 --> 00:02:01,080 to enter into your PC. 20 00:02:01,570 --> 00:02:09,040 So that is why they always see security architects or security officers professional always need to 21 00:02:09,040 --> 00:02:11,530 think from the perspective of an heckel. 22 00:02:12,520 --> 00:02:20,080 Then the next step is to monitor the entire network traffic for Allport or encrypted traffic, then 23 00:02:20,080 --> 00:02:24,150 avoid downloading and executing applications from untoasted sources. 24 00:02:24,580 --> 00:02:27,210 I have been telling this since the start of the lecture. 25 00:02:27,220 --> 00:02:34,840 I know, but it's really important that we download it from the official windows, then install patches 26 00:02:34,840 --> 00:02:42,040 and security updates for the operating systems and applications, scan external USB devices and DVD 27 00:02:42,310 --> 00:02:48,790 with antivirus software before using then the district permissions within the next top environment to 28 00:02:48,790 --> 00:02:55,880 prevent malicious applications from being installed and reinforced with antivirus firewalls and ideas 29 00:02:55,880 --> 00:02:56,510 like this. 30 00:02:57,220 --> 00:03:00,460 How we can prevent hackers from placing back doors. 31 00:03:01,240 --> 00:03:07,900 The most commercial antivirus products can automatically scan and detect backdoor programs before they 32 00:03:07,900 --> 00:03:09,150 can cause damage. 33 00:03:09,490 --> 00:03:12,460 So it is important that you install commercial programs. 34 00:03:13,120 --> 00:03:20,020 Then you have to educate users not to install applications downloaded from untoasted Internet sites 35 00:03:20,020 --> 00:03:27,280 and e-mail attachments, avoid untoasted software and ensure that every device is protected by a firewall. 36 00:03:28,200 --> 00:03:34,840 Use the antivirus tools such as McAfee, Norten, etc., to detect and eliminate back doors. 37 00:03:35,730 --> 00:03:42,450 I would like to tell you that when before I started studying for security, when I was in my school, 38 00:03:42,720 --> 00:03:45,840 I was always fond of downloading free Microsoft Office. 39 00:03:45,840 --> 00:03:52,080 And one day without telling my father I downloaded the free Microsoft Office would have activated it. 40 00:03:52,380 --> 00:03:56,940 I was very sharp in computers and, you know, accessing all those data from the web. 41 00:03:57,270 --> 00:03:59,480 I extracted the passwords I downloaded. 42 00:03:59,580 --> 00:04:01,560 I was nine to 10, I guess. 43 00:04:01,680 --> 00:04:03,060 I don't remember exactly. 44 00:04:03,360 --> 00:04:05,250 It's been almost eight to nine years. 45 00:04:05,850 --> 00:04:14,310 So and the moment I installed it and it was working perfectly fine and it activated our windows, the 46 00:04:14,310 --> 00:04:20,010 latest version of Microsoft Office and every mom appearance, everyone was happy that I had done such 47 00:04:20,010 --> 00:04:20,790 a great task. 48 00:04:21,270 --> 00:04:29,520 And all my dad's work was on that PC in that in that piece on the software is all his photos, all our 49 00:04:29,520 --> 00:04:33,110 family photos, all our documents, everything. 50 00:04:33,690 --> 00:04:40,650 And after 15 days, exactly 15 days, the Microsoft Office started getting an Arab activist. 51 00:04:40,650 --> 00:04:43,920 Otherwise you wouldn't be able to access any of the Microsoft files. 52 00:04:44,550 --> 00:04:48,000 So, you know, and I thought it was just an error. 53 00:04:48,000 --> 00:04:52,740 So I just shut down the windows and I restarted it for 10 to 15 times. 54 00:04:53,040 --> 00:04:54,840 But that error still persisted. 55 00:04:55,440 --> 00:05:02,390 And after that, my dad wasn't able to access a single file from Microsoft Office. 56 00:05:02,820 --> 00:05:09,300 He tried, you know, downloading those files from one side to another week, but to no avail. 57 00:05:09,310 --> 00:05:12,420 And unfortunately, he lost his entire data. 58 00:05:12,870 --> 00:05:15,570 And I just cannot forget that incident. 59 00:05:15,570 --> 00:05:21,570 And from that incident, I've always learned to download files only from legitimate source. 60 00:05:21,940 --> 00:05:29,270 That is, I also tell my friends and my colleagues that please do not fall into the breach of free software. 61 00:05:29,370 --> 00:05:36,210 There are there is nothing like free Microsoft Word because no one is able to actually download it at 62 00:05:36,210 --> 00:05:37,860 some point of time or the other. 63 00:05:38,340 --> 00:05:40,130 The application reverts back. 64 00:05:40,350 --> 00:05:43,620 So again, me, you learn from my lesson. 65 00:05:43,620 --> 00:05:48,330 I learned from experience that you should always download it from legitimate sources. 66 00:05:48,990 --> 00:05:56,340 And then moving ahead, you have to deploy firewalls and Libyans, make sure you inspect the network 67 00:05:56,340 --> 00:06:03,780 packets using protocol, monitoring tools, and then use antivirus tools such as McAfee and trusted 68 00:06:04,110 --> 00:06:05,100 third party tools. 69 00:06:05,880 --> 00:06:07,940 And last, this virus countermeasures. 70 00:06:08,400 --> 00:06:15,720 So the most common is install antivirus software and update it regularly, generate antivirus policy 71 00:06:15,720 --> 00:06:22,860 for safe browsing and computing, then schedule regular scans for all drivers after installation of 72 00:06:22,860 --> 00:06:30,210 antivirus software regularly maintain data backup, which I a mistake, redetermined it in any backup. 73 00:06:30,810 --> 00:06:33,780 Then stay informed about the latest virus threats. 74 00:06:34,110 --> 00:06:40,590 Keep reading different blogs, security websites to get used to latest trends and technologies. 75 00:06:41,100 --> 00:06:44,280 Then run this clean up and adjust to this kind of once a week. 76 00:06:44,700 --> 00:06:52,380 Clean up the temporary files every day, run antivirus spyware, add once a week and do not accept disks 77 00:06:52,380 --> 00:06:55,650 or programs without checking them first with your software. 78 00:06:56,190 --> 00:07:01,500 So you know you should be able to tell your friends that please do not do this. 79 00:07:02,040 --> 00:07:06,840 And being a security student, you should be able to protect other students data. 80 00:07:07,740 --> 00:07:09,420 Then let us have a quick recap. 81 00:07:09,930 --> 00:07:12,090 We discuss how to prevent a cyber threat. 82 00:07:12,090 --> 00:07:19,800 We saw countermeasures for files ones and also saw how I used to deal with freedoms. 83 00:07:19,800 --> 00:07:26,520 And finally, Girma strike back and I lost all of my data and then make sure you apply these countermeasures 84 00:07:26,520 --> 00:07:27,390 in your real life.