Loading in 2 Seconds...
Loading in 2 Seconds...
The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms Or careless owners…. Often it is the person, not the process that is the threat. (“guns don’t kill people, people do”).
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Presented by Carol Bott, Asst. Director ICT Security Professionalisation, DSD
I received this from a reliable family friend this morning. 10/28/01 BIG TROUBLE !!!!
DO NOT OPEN "WTC Survivor" It is a virus that will erase your whole "C" drive. It will come to you in the form of an E-Mail from a familiar person.
I repeat a friend sent it to me, but called and warned me before I opened it.
He was not so lucky and now he can't even start his computer! Forward this to everyone in your address book. I would rather receive this 25 times than not not all.If you receive an email called "WTC Survivor" do not open it. Delete it right away! This virus removes all dynamic link libraries (.dll files) from your computer. This is a serious one.
Social proof… reciprocity… liking… authority…
Received: from mail.nntt.gov.au ([10.10.0.93]) by perdcexch.nntt.gov.au with Microsoft SMTPSVC(6.0.3790.3959);
Wed, 24 Mar 2010 10:59:28 +0800
Received: from outbound-mail01.westnet.com.au ([188.8.131.52])
by ironport.nntt.gov.au with ESMTP; 24 Mar 2010 10:59:28 +0800
Received: from dsl-202-72-179-136.wa.westnet.com.au (HELO remote.rossgriffin.com.au) ([184.108.40.206])
by outbound-mail01.westnet.com.au with ESMTP/TLS/AES128-SHA; 24 Mar 2010 10:59:16 +0800
Received: from RGH-FS1.rgh.com.au ([fe80::2064:1a0f:44e0:5d5d]) by
RGH-FS1.rgh.com.au ([fe80::2064:1a0f:44e0:5d5d%10]) with mapi; Wed, 24 Mar
2010 10:59:15 +0800
From: Reception <firstname.lastname@example.org>
To: "Dart, Martin" <Martin.Dart@nntt.gov.au>
Date: Wed, 24 Mar 2010 10:59:14 +0800
Subject: RE: Car
Accept-Language: en-US, en-AU
acceptlanguage: en-US, en-AU
X-OriginalArrivalTime: 24 Mar 2010 02:59:28.0318 (UTC) FILETIME=[04B86DE0:01CACAFE]
Content-Type: text/plain; charset="us-ascii"
Content-Type: text/html; charset="us-ascii"
70% of targeted attacks can be mitigated by following 4 basic strategies
Defence is targeted around 200 times each year by organisations seeking to steal specific information.
Non-defence agencies are targeted some 220 times.
Dr Ian J Watt AOSecretary of Defence
Anonymity & non-attribution the main benefits attacks enjoy.
Mining sector a recently expanding battlefield
“We must all hang together, or most assuredly, we will hang alone”. (Benjamin Franklin)
Duncan Lewis AONational Security Advisor DPMC
Any network can be utilised as a jumping off point for bigger attacks (hence we are a target)
(at home and work)
Automated patching makes your system self-learning
Easy – Start/search/”update”
Choose the right user account…
…and put them in the right group!