Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
7 hours 6 minutes
Hey, everyone, welcome back to the course. So in this video, we're gonna talk about some countermeasures you could do against malware attacks.
So one of the best things to do is just train your users and yourself not to open unknown attachments. So if you're not expecting an attachment email to you, why would you ever click on it and open it? Especially if the email looks suspicious
using a good antivirus anti malware solution to help protect against attacks, especially if you do open that unknown attachment, It can help block some of the more common attacks blocking unnecessary ports on your system. So making sure that the attacker doesn't have a way to communicate to your target device
hardening system. So making sure your software in your firmware is up to date.
Changing the default credentials is part of hardening, making sure that you're not using that default user name and password for things like your routers
avoiding getting files or software from untrusted sources. So making sure that's really coming from that manufacturer
using things like privileged access management. So just making sure that the right people can access the right things and that we segment out our privileges and that we only limit to people or systems to what
minimum access they need
file integrity. So going back to make sure we get the files from the trusted source, we also want to make sure that this file has not been altered. So we wanna make sure we look at the hash of that file from the source and then compare that to the hash of the file that we've downloaded and make sure those actually match up. If they don't, it could indicate that the files been tampered with,
using a host based intrusion detection system that can try to mitigate some of those threats as they're coming in
and using a host based firewall to block certain I P addresses that are on blacklist,
making sure that we train our employees, making sure that our employees can recognize
phishing emails, phishing attacks via phone. So phishing attacks, phishing attacks via text messaging, and the more we train people. Yes, people are still the weakest link, but the more we train them and show them why they should be doing this and how it affects their individual day, the more likely they are to not take those actions that we don't want them to take.
That being said, even the best security professional
might click a malicious link. In fact, I've seen that when I worked in health care, i t. That someone that was over the security team
put in their default credentials in a spreadsheet or excuse me, a Google sheet that supposedly HR had sent them. But it wasn't actually HR was a spoofed email address, and their credentials were stolen
doing things like sand boxing. So when a user downloads a file, they launch it basically in the sandbox. So no matter what the files not actually executed on their local machine,
So just a quick, quick question for you. The ways to comment malware include which of the following is it Privileged access management is a file integrity checking or is it hosts using a host? I d. S
alright. This one was pretty easy. It's all of them right? These were many of the things that we mentioned privileged access management file integrity checking as well as using a host based intrusion detection system using anti virus or anti Mauer solutions as well as educating our users.
So in this video, we just cover some different ways that we can try to counter malware