html5-img
1 / 16

Trend Micro Deployment Kelvin Hwang IT Services University of Windsor

Trend Micro Deployment Kelvin Hwang IT Services University of Windsor. Agenda Definition of Malware Malware Characteristics Malware Evolution Google’s Study Challenges in Educational Environment Solution - Web Reputation Service Test & Results Overall Experience

zahina
Download Presentation

Trend Micro Deployment Kelvin Hwang IT Services University of Windsor

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trend Micro Deployment Kelvin Hwang IT Services University of Windsor

  2. Agenda • Definition of Malware • Malware Characteristics • Malware Evolution • Google’s Study • Challenges in Educational Environment • Solution - Web Reputation Service • Test & Results • Overall Experience • Enough Protection? • Questions ?

  3. Definition of Malware A malicious software that is designed to specifically damage or disrupt a system, such as: • Virus • Worm • Trojan Horse • Bot

  4. Malware Characteristics

  5. Malware Evolution • Diskettes • Network shares • Email(e.g. LoveLetteremail worm) • Peer to Peer networks (P2P) • The World Wide Web Reasons: • Malicious file size is getting bigger • End users have more knowledge • Use of Mobile code

  6. Google’s Study The Ghost In The Browser – Analysis of Web-based Malware (NielsProvos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and NagendraModadugu Google, Inc.) Google closely analyzed 4.5 million web pages over the course of a year (March 2006 – March 2007) and found that approximately 10 %, or 450,000, had the capability of installing malware withoutusers' knowledge.

  7. Challenges in Educational Environment • Academic Freedom.Campus community is sensitive to: • Blocking • Filtering • Logging • Local Administrator Rights

  8. Solution - Web Reputation Service • Prevention is always better than treatment • Web Reputation works in real time to prevent both users and applications from accessing malicious or infiltrated websites • Credit check for Web sites (Check before visit) • Based on threats not categories

  9. Solution - Web Reputation Service (Continue) Web site “reputation” score is assigned based on: • Threat Types 1. "a Web threat" 2. "very likely to be a Web threat" 3. "likely to be a Web threat"

  10. Solution - Web Reputation Service (Continue) • Security Levels • High: Blocks URLs that are unrated, a Web threat, very likely to be a Web threat, or likely to be a Web threat • Medium: Blocks URLs that are unrated, a Web threat, or very likely to be a Web threat

  11. Solution - Web Reputation Service (Continue) • 3. Medium-low: Blocks URLs that are a • Web threat or very likely to be a Web • threat • 4. Low: Blocks only URLs that are a Web • threat

  12. Test & Results • Monday – Friday, 9AM – 3PM October 2007 • 15,000 URLs Blocked • 41% reduction in the number of infected machines • 81% reduction in the number of detected malware. • One unblock request

  13. Overall Experience • Trend Micro deployment in 2002 (quarantined malware 300 - 400 daily) • Add new protection without extra equipment: • Intrusion Defense Firewall Plugin • Trend Micro Security for Mac Plugin • Mobil Security Plugin • Virtual Desktop Support Plugin

  14. Overall Experience (Continue) • Web Threat Protection (30,000URLs blocked monthly) • Device Control to handle autorunvirus • Helpdesk virus related calls: • 2001 – 12 %(Before Trend Micro) • 2009 – 0.4 %(Productivity increased) • Campus departments begin to use IT Services anti-virus solution

  15. Enough Protection? • User Education • OS & application updates • Use anti-virus application & firewall • Use different web browser • Surfing carefully (Be careful with • popup, plug-ins, warnings, links.…) • Disable autorun • Security compliance monitoring

  16. Questions ?

More Related