Welcome to Cyber Radar. I t. My name is Jonah Lake, a subject matter expert for the security plus certification. Today we're dealing with section four points to
carry out appropriate procedures to establish horse security. We started by looking at anti malware.
Malicious software would always find their way to our computers. Whether we connect online or we share media with other uses. You could share USB devices, floppy devices, external hard drives on. There's a possibility your system gets infected. So how do you correct that we use anti malware?
I'm time I'll read. Will take care of
viruses. Warms on Trojans. These software are being especially designed toe. Find the specific signatures
off the mall where the warms Trojans or viruses,
Um, the vendors that produces anti malware. They've done their research to find the specific signature so that the software given to users could be suffering. Install on host systems could
identify them on, um,
deactivate the malware, so viruses warms and trojans will be taken care off. Using anti malware, we must ensure we regularly updated the signature files, the definition files. Otherwise, the anti malware is not effective for anti spam organizations will use spam filters
on solicited messages, e mails are prevented from getting to the user's inbox. This way we're able to prevent or limits
congesting the user's inbox by putting in the fuel cells that can identify
emails that I've bean
flood by the users so that subsequent emails sent from Alicia's persons or variants off the email addresses could not be accepted through the firewalls. So anti problem is used to protect service from over congestion by
also the seated messages targeted at the end users on the Enterprise
for Anti Spyware, We have spyware software with which your activities will be trapped on the Internet.
You know, usually cookies are pushed to your system. When you visit a website cookie is pushed to your system. Could you simply a text file
that is pushed to a system to register your
user preferences stuff you have been looking at.
However, malicious persons could also track your activities online by review your cookies. They can tell what sites you visited. They can tell what you're looking at,
so your activities and this could be an invasion into our privacy. So, using anti spyware. It is possible to eradicate this tracking cookies from your system.
This talking cookies are very effective in that they would find all the tracking cookies
on. Remove those cookies from your system. If you want to leave this to use us so amuse us, we'll forget. Some users don't even know where to find the cookies or how to remove the cookies. So it's best we use the anti spiral. There are many off these on the market on
Super Antispyware is one very effective one
Usually we get pop ups.
This is what we call hardware, that what originates from the world. Two words. Advertising software. So you visit setting websites. They want to advertise to you, and they're pushing pop ups to your system. So how do we enable papa blockers if you click on start
on the system, you click on Start you go to control panel on dhe on Internet options. You cook on Internet options on the privacy top.
You can scroll down the page. You'll see it says
block pop ups. So you block pop ups. You told unpopular blockers on the Internet
options page. If you turn on papa blockers. What this means is that every site you visit,
no pop ups could be pushed their systems. However,
when you visit some websites, they let you know to best use their website. You must enable Papa bloke. So now we're the dilemma we want to tell off. Papa tell a proper blockers. Some sites are required for Papa Block has been turned off. So what do we do? Well, there's a solution to this
on the same page on the Internet options. We can just be coincidence when we could consider it allows us to populate that page with specific websites we want any boo
pop up for. So if you visit such sites, you get the pop ups. But other websites pop ups are blocked from getting to a computer, so organizations will do this and enable this across the enterprise using group policy on their systems, such that users could allow specific sites, assume a schism
meet the policies that require four Popes
Who's best firewalls? Ah, host bids. Firewall is a firewall
on the host machine itself. These are usually software based firewall. We will find them in control panel click on start
control panel on usually the last section in the control panel, and it was the bottom of the page. We will see Host base. We just say it says Windows Firewall.
Windows Firewall is a perfect example of a host based firewall. The world host refers to a computer system, so if I was that recites on that machine is a host based rival. Usually that firewall is protecting traffic coming in on living that system.
Malicious persons will usually like to turn off your firewall if your PC is attacked. So our host based firewall is something we need to monitor periodically, as this would also facilitate generating alerts on preventing intrusion into our systems.
Patch management is a very important topic. Toe
software is not perfect.
As a result, there are flaws that exist within software
on as you start to use software. Some of these floors are identified so the manufacturers off the software will periodically produce the patches. When these patches are produced, they are released to the general public.
Organizations should do best. Practice one. Whenever you get a patch, the first thing you want to do is validate the source of the patch. Where is this patch from?
To. You must have a test machine
on which you test this. The patch you want to see does this part. You do what they say it does. Is it robust? Is it sufficient to solve the issues They say he does.
How does it affect the infrastructure? Does it cause any problems? If no. For all these questions, then you could move the part to your real systems. You never download a patch on instead of directly on your little systems because malicious persons know that you need patches. They could also craft their militias payloads
like a party. And then you download it. Install it on your systems on your system. Starting is behaving. So you want to do proper patch management?
Individuals and organizations should be responsible for validating the source of the party
to test the patch for sufficiency. And three migrate the parts to the production systems once it's been found. Toby riposte on it does what they say it does. So that is how we protect our host machines.