Protecting Programs

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 27 minutes
Difficulty
Intermediate
CEU/CPE
3
Video Transcription
00:00
>> Welcome back to intermediate endpoint security course.
00:00
In this lesson, I'm going to talk about protecting
00:00
programs or applications that
00:00
you have installed on your PC.
00:00
I'm going to talk about
00:00
types of attacks aimed at programs applications
00:00
and the general ways
00:00
to protect the program and applications.
00:00
When you talk about types of attacks, we have viruses,
00:00
which is a typical thing
00:00
that is spread by infecting software.
00:00
Of course, except for viruses,
00:00
we also include the Trojans and other malware.
00:00
Trojans are not
00:00
essentially targeted towards applications,
00:00
but they can attack application.
00:00
Sometimes they can embed themselves directly into
00:00
operating system but it is very
00:00
similar like protecting OS you essentially have
00:00
just some malware that is going to attack your software.
00:00
When we talk about protection, first,
00:00
one is the anti-malware solution so what
00:00
is popularly known as anti-virus software.
00:00
What is also important is to have
00:00
regular testing of anti-malware solution.
00:00
In general, to do the penetration testing on
00:00
a regular basis the same
00:00
way like it's done for operating system.
00:00
As I said, I recommend this
00:00
doing being done twice a year, at least.
00:00
If you are target to
00:00
regular attacks if your company is prone to be attacked,
00:00
then maybe even more frequently.
00:00
I have heard about people
00:00
doing penetration testing once a month because they
00:00
have to stay alert and make sure that
00:00
the protection systems are extremely effective.
00:00
Now one thing, in particular,
00:00
is very important and this is when you
00:00
are implementing new software
00:00
or upgrading existing software,
00:00
you should do it in what's called the eyes
00:00
island environment meaning that
00:00
you don't let the software update
00:00
being done automatically when it comes up.
00:00
The reason for this is the famous
00:00
2015,2016 non-patia attack that
00:00
happened in Ukraine when the Russian hacking group
00:00
managed to infect more
00:00
than 60,000 PCs in less than two hours.
00:00
They did it by actually infecting
00:00
the very popular accounting software that was
00:00
used in all government businesses in
00:00
Ukraine and what this hacker group did,
00:00
is they didn't infiltrate all these institutions that
00:00
they managed to infect with the non-patia.
00:00
They have actually infiltrated the company that was
00:00
developing that software and installed malware,
00:00
non-patia virus, or whatever that is
00:00
called into the update of the software.
00:00
This one thing teaches us that we should never
00:00
trust a software update unless it's, for example,
00:00
from very renowned company
00:00
like some office package or something like that.
00:00
If ever you're using
00:00
some custom software or some specialized software,
00:00
and you're not 100 percent sure
00:00
that the software manufacturer is not being compromised,
00:00
then you should always test the new installation you
00:00
upgrade in isolated environment
00:00
before you let it go into your network.
00:00
I know that sometimes this is problem,
00:00
sometimes application update themselves
00:00
but if it's possible,
00:00
you should prevent that and find a way to do it manually,
00:00
meaning first the test and then letting
00:00
the application get the update.
00:00
If this is not possible,
00:00
my suggestion is not to let
00:00
such an application run on
00:00
your system unless it's absolutely necessary.
00:00
Let's do the quick learning check and the question is,
00:00
what is the best way to test endpoint protection?
00:00
Is it by giving PC to
00:00
employee with history of carelessness so
00:00
somebody who clicks on phishing links on a regular basis,
00:00
is it to do the simulated virus attack,
00:00
or is it to do PEN testing or penetration testing?
00:00
The correct answer is, of course,
00:00
to do penetration testing because it's
00:00
all-around way to test
00:00
everything that you have on your PC.
00:00
In this video, you have learned about
00:00
how to protect programs and applications
00:00
on a PC from different types of
00:00
attacks and what precautions you
00:00
should use in order to
00:00
make sure that your PC doesn't get
00:00
infected in any possible way.
00:00
In next lesson, I'm going to talk about
00:00
protecting network from PCs.
Up Next