Which are forced to wait for the creation of a physical file on the user's computer, network protection begins to analyze incoming data streams entering the user's computer through the network and blocks threats before they enter the system.

The main areas of network protection provided by Symantec technologies are:

Drive-by downloads, web attacks;
- “Social Engineering” attacks: FakeAV (fake antiviruses) and codecs;
- Attacks through social media like Facebook;
- Detection of malware, rootkits and systems infected with bots;
- Protection against advanced threats;
- Zero-day threats;
- Protection against unpatched software vulnerabilities;
- Protection from malicious domains and IP addresses.

Network Protection Technologies

The "Network Protection" level includes 3 different technologies.

Network Intrusion Prevention Solution (Network IPS)

Network IPS technology understands and scans over 200 different protocols. It intelligently and accurately cuts through binary and network protocol, simultaneously looking for signs of malicious traffic. This intelligence allows for more accurate network scanning while still providing reliable protection. At its “heart” is an exploit blocking engine that provides open vulnerabilities with virtually impenetrable protection. Unique feature Symantec IPS is that this component does not require any configuration. All its functions work, as they say, “out of the box”. Every Norton consumer product, and every Symantec Endpoint Protection product version 12.1 and later, has this critical technology enabled by default.

Browser Protection

This security engine is located inside the browser. It is capable of detecting the most complex threats that neither traditional antivirus nor Network IPS are able to detect. Nowadays, many network attacks use obfuscation techniques to avoid detection. Because Browser Protection runs inside the browser, it is able to examine not-yet-hidden (obfuscated) code as it runs. This allows you to detect and block an attack if it was missed at lower levels of program protection.

Un-Authorized Download Protection (UXP)

Located within the network defense layer, the last line of defense helps cover and mitigate the effects of unknown and unpatched vulnerabilities, without the use of signatures. This provides an additional layer of protection against Zero Day attacks.

Focusing on problems

Working together, network security technologies solve the following problems.

Drive-by downloads and web attack kits

Using Network IPS, Browser Protection, and UXP technology, Symantec's network protection technologies block Drive-by downloads and essentially prevent malware from even reaching the user's system. Various preventive methods are practiced that include the use of these same technologies, including Generic Exploit Blocking technology and web attack detection tools. A general web attack detection tool analyzes the characteristics of a common web attack, regardless of the specific vulnerability that the attack targets. This allows you to provide additional protection for new and unknown vulnerabilities. The best thing about this type of protection is that if a malicious file were to “silently” infect a system, it would still be proactively stopped and removed from the system: this is precisely the behavior that traditional antivirus products usually miss. But Symantec continues to block tens of millions of variants of malware that typically cannot be detected by other means.

Social Engineering Attacks

Because Symantec's technology monitors network and browser traffic as it travels, it detects "Social Engineering" attacks such as FakeAV or fake codecs. Technologies are designed to block such attacks before they appear on the user's screen. Most other competing solutions do not include this powerful capability.

Symantec blocks hundreds of millions of these types of attacks with online threat protection technology.

Attacks targeting social media applications

Social media applications have recently become widely popular as they allow you to instantly share various messages, interesting videos and information with thousands of friends and users. The wide distribution and potential of such programs make them the No. 1 target for hackers. Some common hacker tricks include creating fake accounts and sending spam.

Symantec IPS technology can protect against these types of deception methods, often preventing them before the user even clicks on them. Symantec stops fraudulent and spoofed URLs, applications, and other deception techniques with online threat protection technology.

Detection of malware, rootkits and bot-infected systems

Wouldn’t it be nice to know exactly where on the network the infected computer is located? Symantec's IPS solutions provide this capability, also including detection and recovery of threats that may have evaded other layers of protection. Symantec solutions detect malware and bots that attempt to make auto-dialers or download “updates” to increase their activity on the system. This allows IT managers, who have a clear list of systems to review, to have assurance that their enterprise is secure. Polymorphic and complex stealth threats using rootkit techniques like Tidserv, ZeroAccess, Koobface and Zbot can be stopped and removed using this method.

Protection against obfuscated threats

Today's web attacks use complex techniques to increase the complexity of their attacks. Symantec's Browser Protection sits inside the browser and can detect very complex threats that traditional methods often cannot detect.

Zero-day threats and unpatched vulnerabilities

One of the past security additions the company has added is an additional layer of protection against zero-day threats and unpatched vulnerabilities. Using signatureless protection, the program intercepts System API calls and protects against malware downloads. This technology is called Un-Authorized Download Protection (UXP). It is the last line of support within the network threat protection ecosystem. This allows the product to “cover” unknown and unpatched vulnerabilities without using signatures. This technology is enabled by default and has been found in every product released since Norton 2010 debuted.

Protection against unpatched software vulnerabilities

Malicious programs are often installed without the user's knowledge, using vulnerabilities in the software. Symantec network security provides an additional layer of protection called Generic Exploit Blocking (GEB). Regardless of whether Latest updates or not, GEB "mostly" protects underlying vulnerabilities from exploitation. Vulnerabilities in Oracle Sun Java, Adobe Acrobat Reader, Adobe Flash, Internet Explorer, ActiveX controls, or QuickTime are now ubiquitous. Generic Exploit Protection was created by "reverse engineering" by figuring out how the vulnerability could be exploited on the network, while providing a special patch for network level. A single GEB, or vulnerability signature, can provide protection against thousands of malware variants, new and unknown.

Malicious IPs and domain blocking

Symantec's network protection also includes the ability to block malicious domains and IP addresses while stopping malware and traffic from known malicious sites. Through STAR's rigorous website analysis and updating, Symantec provides real-time protection against ever-changing threats.

Improved Evasion Resistance

Support for additional encodings has been added to improve the effectiveness of attack detection using encryption techniques such as base64 and gzip.

Network audit detection to enforce usage policies and identify data leakage

Network IPS can be used to identify applications and tools that may violate corporate usage policies, or to prevent data leakage across the network. It is possible to detect, warn or prevent traffic like IM, P2P, social media, or other "interesting" types of traffic.

STAR Intelligence Communication Protocol

Network security technology does not work on its own. The engine communicates with other security services using the STAR Intelligence Communication (STAR ​​ICB) protocol. The Network IPS engine connects to the Symantec Sonar engine, and then to the Insight Reputation engine. This allows you to provide more informative and accurate protection.

In the next article we will look at the Behavior Analyzer level.

Based on materials from Symantec

A very accurate phrase: “there are no invulnerable systems.” No system is completely secure. If the power is on and the computer is connected to the network, no matter what precautions are taken, the system is vulnerable and can make other computers on the network vulnerable. It is always necessary to assume the presence of previously unrecognized weaknesses and threats and continue to strengthen the security of the system.

Human factor and its shortcomings

If an employee of a company, due to the nature of his activity, has access to the latter’s computing resources, then he has information that may be valuable to attackers. Let's look at examples of information leaks.

  • Passwords that are difficult to crack are also difficult to remember, so they are often written down on paper ( Notebook, business diary, sticker on the monitor, etc.).
  • In a normal conversation, a person may blurt out too much.
  • Sociotechnique, or manipulative behavior, is an effective technique for attackers. For example, an attacker can impersonate a boss and force the user to give him important information, or, conversely, impersonate the user and ask the administrator to tell him the password over the phone.
  • Disgruntled employees can pose a serious threat. This is especially dangerous if such an employee is System Administrator or a person with access to important information, constituting a trade secret.

The best defense against these vulnerabilities and threats is to train staff, increase their awareness, and establish penalties for violating system rules.

System and network administrators in this process they play an auxiliary but very important role. For example, an administrator can monitor user actions and, being thoroughly familiar with the rules of operation in the system, identify unauthorized activity and report it to the security service.

Vigilance is never enough

Always be aware of what is happening in your environment. If anything unusual appears, find out why. Cover identified weaknesses and try to reduce the likelihood of threats.
The main means of regular monitoring is log files. Analyzing the log files will provide insight into what happened and possibly who is responsible. It often helps identify weaknesses and potential threats. Interpreting information stored in log files is a completely manual process.
Possible threat of free software
The advantage of such programs is the availability of their source codes. Even if some of us don't have enough knowledge to check source or create a test environment, other people can do this. They report noticed flaws to developers, and also publish their comments on mailing lists ( bugtraq).
Always check for weaknesses, PGP signatures and checksums(KS) MD5 downloadable programs. If CS or C is missing, analyze the source code or run the program in a safe environment and see what happens.

Currently there are hacks user computers are becoming more widespread. Hackers try to gain access to other people's devices for various purposes - from simply sending spam from your email address before using personal information for personal gain, and your task is to protect your PC by all means. Let's figure out how to protect your computer from hackers.

How do hackers penetrate?

First, you need to understand how hackers can penetrate your device and by what means they gain access to your files and information located directly on your hard drive. Only then will it be possible to protect the device.

In most cases, the role of the burglar is played by specific program, which lands on your PC in one of possible ways. In other words, malicious software most often called viruses. You can protect your computer from unauthorized access and penetration into your personal space using an antivirus program. In this case, the system will warn you that you are trying to download malicious or suspicious software. All programs can be divided into several types according to the level of harm:


What to do if your computer is hacked?

First of all, copy all important information to third party drive, which does not apply to this PC. If you couldn’t protect it on one device, then on external media she will be safe. However, before this you need to check the files using an antivirus possible infections. If hackers didn’t get to the files, then feel free to copy them to a flash drive or external HDD, and delete it from your PC.

After this, you need to scan the system for viruses and suspicious software. After scanning, disconnect the system from the Internet and reboot. If the antivirus does not sound the alarm when checking again, it means that the danger has passed. For greater reliability, use only licensed antivirus programs and update databases promptly. This will help reliably protect your system. Now you know how to protect your PC.

Disabling remote access to the computer

  • Go to the Start menu and go to Explorer;
  • Right-click on the “My Computer” icon and select “Properties”;
  • On the left, select the item “Setting up remote access”;
  • “Remote access” tab, click “Advanced”;
  • Uncheck "Allow remote control this computer";

An antivirus must be installed on every Windows PC. For a long time This was considered the golden rule, but today IT security experts debate the effectiveness of security software. Critics argue that antiviruses do not always protect, and sometimes even the opposite - due to careless implementation, they can create gaps in the security of the system. The developers of such solutions counter this opinion with impressive numbers of blocked attacks, and marketing departments continue to assure them of the comprehensive protection that their products provide.

The truth lies somewhere in the middle. Antiviruses do not work flawlessly, but all of them cannot be called useless. They warn about a variety of threats, but they are not enough to keep Windows as protected as possible. For you as a user, this means the following: you can either throw the antivirus in the trash, or blindly trust it. But one way or another, it is just one of the blocks (albeit a large one) in the security strategy. We will provide you with nine more of these “bricks”.

Security Threat: Antiviruses

> What critics are saying The current controversy over virus scanners was sparked by former Firefox developer Robert O'Callaghan. He claims: antiviruses threaten Windows security and must be removed. The only exception is Windows Defender from Microsoft.

> What developers say Creators of antiviruses, including Kaspersky Lab, as an argument, they cite impressive numbers. Thus, in 2016, software from this laboratory registered and prevented about 760 million Internet attacks on user computers.

> What CHIP thinks Antiviruses should not be considered either a relic or a panacea. They are just a brick in the building of security. We recommend using compact antiviruses. But don't worry too much: Windows Defender is fine. You can even use simple third-party scanners.

Choose the right antivirus

We continue to be convinced that Windows is unthinkable without antivirus protection. You only need to choose the right product. For Tens users, this could even be the built-in Windows Defender. Despite the fact that during our tests it did not show the best degree of recognition, it is perfectly integrated into the system and, most importantly, without any security problems. Besides, Microsoft company updated my product Creators Update for Windows 10 and simplified its management.

Antivirus packages from other developers often have a higher recognition rate than Defender. We stand for a compact solution. The leader of our rating on this moment is Kaspersky Internet Security 2017. Those who can refuse such additional options, How parental control and password manager, should turn their attention to a more budget-friendly option from Kaspersky Lab.

Follow updates

If we had to choose only one measure to keep Windows secure, we would definitely go with updates. In this case, of course, we are talking primarily about updates for Windows, but not only. Installed software, including Office, Firefox and iTunes, should also be updated regularly. On Windows, getting system updates is relatively easy. In both the “seven” and “ten”, patches are installed automatically using the default settings.

In the case of programs, the situation becomes more difficult, since not all of them are as easy to update as Firefox and Chrome, which have a built-in automatic update function. The SUMo (Software Update Monitor) utility will support you in solving this task and notify you about the availability of updates. A related program, DUMo (Driver Update Monitor), will do the same job for drivers. Both free assistants, however, only inform you about new versions - you will have to download and install them yourself.

Set up a firewall

The built-in firewall in Windows does its job well and reliably blocks all incoming requests. However, it is capable of more - its potential is not limited by the default configuration: all installed programs have the right to open ports in the firewall without asking. Free utility Windows Firewall Control puts more features at your fingertips.

Launch it and in the “Profiles” menu set the filter to “Medium Filtering”. This will allow the firewall to control and outgoing traffic according to a given set of rules. You decide for yourself what measures will be included. To do this, in the lower left corner of the program screen, click on the note icon. This way you can view the rules and with one click grant permission to a specific program or block it.

Use special protection

Updates, antivirus and firewall - you've already taken care of this great trinity of security measures. It's time fine tuning. Problem additional programs under Windows is often that they do not use all the security features offered by the system. An anti-exploit utility such as EMET (Enhanced Mitigation Experience Toolkit) further strengthens the installed software. To do this, click on “Use Recommended Settings” and let the program run automatically.

Strengthen encryption

You can significantly enhance the protection of personal data by encrypting it. Even if your information falls into the wrong hands, a hacker will not be able to remove good coding, at least not right away. In professional Windows versions The BitLocker utility is already provided, configured through the Control Panel.

VeraCrypt will be an alternative for all users. This program with open source is an unofficial successor to TrueCrypt, which was discontinued a couple of years ago. If we are talking only about protecting personal information, you can create an encrypted container through the “Create Volume” item. Select the “Create an encrypted file container” option and follow the Wizard’s instructions. The ready-made data safe is accessed through Windows Explorer, just like a regular disk.

Protect user accounts

Many vulnerabilities remain unexploited by hackers simply because work on the computer is carried out under a standard account with limited rights. Thus, for daily tasks you should also configure this account. In Windows 7, this is done through the Control Panel and the “Add and Remove User Accounts” item. In the “top ten”, click on “Settings” and “Accounts”, and then select “Family and other people”.

Activate VPN outside of home

At home in wireless network your security level is high since only you control who has access to local network, and are also responsible for encryption and access codes. Everything is different in the case of hotspots, for example,
in hotels. Here Wi-Fi is distributed among third-party users, and for security network access you are unable to exert any influence. For protection, we recommend using a VPN (Virtual Private Network). If you just need to browse sites through an access point, the built-in VPN in latest version Opera browser. Install the browser and in “Settings” click on “Security”. In the "VPN" section, check the box for "Enable VPN."

Cut off unused wireless connections


ok

Even the details can decide the outcome of a situation. If you don't use connections like Wi-Fi and Bluetooth, simply turn them off to close potential loopholes. In Windows 10, the easiest way to do this is through the Action Center. “Seven” offers a section on the Control Panel for this purpose “ Network connections».

Manage passwords

Each password must be used only once and must contain special characters, numbers, uppercase and lowercase letters. And also be as long as possible - preferably ten or more characters. The principle of password security has reached its limits today because users have to remember too much. Therefore, where possible, such protection should be replaced by other methods. Take signing into Windows for example: If you have a camera that supports Windows Hello, use facial recognition to sign in. For other codes, we recommend using password managers such as KeePass, which should be protected with a strong master password.

Secure your privacy in the browser

There are many ways to protect your privacy online. The Privacy Settings extension is ideal for Firefox. Install it and set it to "Full Privacy". After this, the browser will not provide any information about your behavior on the Internet.

Lifebuoy: backup

> Backups are extremely important Backup justifies
yourself not only after infection with the virus. It also works well when problems with hardware arise. Our advice: make a copy of all Windows once, and then additionally and regularly make backups of all important data.

> Full archiving of Windows Windows 10 inherited from the “seven” the “Archiving and Restore” module. With it you will create backup copy systems. You can also use special utilities, For example, True Image or Macrium Reflect.

> Protect True Image files and paid version Macrium Reflect is capable of making copies certain files and folders. Free alternative The Personal Backup program will be used to archive important information.

PHOTO: manufacturing companies; NicoElNino/Fotolia.com

How can you protect your computer from remote access? How to block access to a computer through a browser?

How to protect your computer from remote access, they usually think when something has already happened. But naturally this wrong decision for a person who is engaged in at least some of his own activities. And it is advisable for all users to limit access to their computer to strangers. And in this article we will not discuss the method of setting a password for logging into a computer, but will look at an option on how to deny access to a computer from a local network, or from another computer if they are connected to the same network. This information will be especially useful for new PC users.

And so, in the operating room Windows system there is a function called “ Remote access" And if it is not disabled, other users can take advantage of this to gain control of your computer. Even if you are a manager and you need to monitor your employees, then naturally you need access to their PC, but you need to close yours so that these same employees do not look at your correspondence with your secretary - this is fraught with...

March 2020
Mon W Wed Thu Fri Sat Sun
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31

ADVERTISING

    As usual, online projects are promoted. Typically, SEO copywriters try to insert as many search queries as possible into the text, inclining them towards

    Understanding the main nuances that distinguish fake iPhones from real products will help you save money and avoid buying from careless sellers. For what