❤️🔥 Prevention Techniques ❤️🔥
1▰Spywares Prevention⭐️
1▻Try to avoid using any computer system which is not totally under your control.
2▻ Adjust browser security settings to medium or higher for Internet zone.
3▻ Be cautious about suspicious emails and sites.
4▻ Update the software regularly and use a firewall with outbound protection.
5▻ Regularly check task manager report and MS configuration manager report.
6▻ Update virus definition files and scan the system for spyware regularly.
7▻ Install and use anti-spyware software.
8▻ Perform web surfing safely and download cautiously.
9▻ Do not use administrative mode unless it is necessary.
10▻ Do not use public terminals for banking and other sensitive activities.
11▻ Do not download free music files, screensavers, or smiley faces from Internet.
12▻ Beware of pop-up windows or web pages. Never click anywhere on these
windows.
13▻ Carefully read all disclosures, including the license agreement and privacy
statement before installing any application.
14▻ Do not store personal information on any computer system that is not totally under your control.
2▰Privilege Escalation Prevention⭐️
1▻Restrict the interactive logon privileges.
2▻ Use encryption technique to protect sensitive data.
3▻ Run users and applications on the least privileges.
4▻ Reduce the amount of code that runs with particular privilege.
5▻ Implement multi-factor authentication and authorization.
6▻ Perform debugging using bounds checkers and stress tests.
7▻ Run services as unprivileged accounts.
8▻ Test operating system and application coding errors and bugs thoroughly.
9▻ Implement a privilege separation methodology to limit the scope of programming errors and bugs.
3▰Keyloggers Prevention⭐️
1▻ Use pop-up blocker.
2▻ Install anti-spyware/antivirus programs and keeps the signatures up to date.
3▻ Install good professional firewall software and anti-keylogging software.
4▻ Recognize phishing emails and delete them.
5▻ Choose new passwords for different online accounts and change them frequently.
6▻ Avoid opening junk emails.
7▻ Do not click on links in unwanted or doubtful emails that may point to malicious sites.
8▻ Use keystroke interference software, which inserts randomized characters into every keystroke.
9▻ Scan the files before installing them on to the computer and use registry editor or process explorer to check for the keystroke loggers.
10▻ Keep your hardware systems in a locked environment and frequently check the keyboard cables for the attached connectors.
11▻ Use Windows on-screen keyboard to enter confidential information.
12▻ Install a host-based IDS, which can monitor your system and disable the
installation of keyloggers.
13▻ Use automatic form-filling programs or virtual keyboard
14▻ Use software that frequently scans and monitors the changes in the system or network.
4▰Rootkits Prevention⭐️
▻ Reinstall OS/applications from a trusted source after backing up the critical data.
▻ Well-documented automated installation procedures need to be kept.
▻ Perform kernel memory dump analysis to determine the presence of rootkits.
▻ Harden the workstation or server against the attack.
▻ Educate staff not to download any files/programs from untrusted sources.
▻ Install network and host-based firewalls.
▻ Ensure the availability of trusted restoration media.
▻ Update and patch operating systems and applications.
▻ Verify the integrity of system files regularly using cryptographically strong digital fingerprint technologies.
▻ Update antivirus and anti-spyware software regularly.
▻ Avoid logging in an account with administrative privileges.
▻ Adhere to the least privilege principle.
▻ Ensure the chosen antivirus software posses rootkit protection.
▻ Do not install unnecessary applications and also disable the features and services not in use.
1▰Spywares Prevention⭐️
1▻Try to avoid using any computer system which is not totally under your control.
2▻ Adjust browser security settings to medium or higher for Internet zone.
3▻ Be cautious about suspicious emails and sites.
4▻ Update the software regularly and use a firewall with outbound protection.
5▻ Regularly check task manager report and MS configuration manager report.
6▻ Update virus definition files and scan the system for spyware regularly.
7▻ Install and use anti-spyware software.
8▻ Perform web surfing safely and download cautiously.
9▻ Do not use administrative mode unless it is necessary.
10▻ Do not use public terminals for banking and other sensitive activities.
11▻ Do not download free music files, screensavers, or smiley faces from Internet.
12▻ Beware of pop-up windows or web pages. Never click anywhere on these
windows.
13▻ Carefully read all disclosures, including the license agreement and privacy
statement before installing any application.
14▻ Do not store personal information on any computer system that is not totally under your control.
2▰Privilege Escalation Prevention⭐️
1▻Restrict the interactive logon privileges.
2▻ Use encryption technique to protect sensitive data.
3▻ Run users and applications on the least privileges.
4▻ Reduce the amount of code that runs with particular privilege.
5▻ Implement multi-factor authentication and authorization.
6▻ Perform debugging using bounds checkers and stress tests.
7▻ Run services as unprivileged accounts.
8▻ Test operating system and application coding errors and bugs thoroughly.
9▻ Implement a privilege separation methodology to limit the scope of programming errors and bugs.
3▰Keyloggers Prevention⭐️
1▻ Use pop-up blocker.
2▻ Install anti-spyware/antivirus programs and keeps the signatures up to date.
3▻ Install good professional firewall software and anti-keylogging software.
4▻ Recognize phishing emails and delete them.
5▻ Choose new passwords for different online accounts and change them frequently.
6▻ Avoid opening junk emails.
7▻ Do not click on links in unwanted or doubtful emails that may point to malicious sites.
8▻ Use keystroke interference software, which inserts randomized characters into every keystroke.
9▻ Scan the files before installing them on to the computer and use registry editor or process explorer to check for the keystroke loggers.
10▻ Keep your hardware systems in a locked environment and frequently check the keyboard cables for the attached connectors.
11▻ Use Windows on-screen keyboard to enter confidential information.
12▻ Install a host-based IDS, which can monitor your system and disable the
installation of keyloggers.
13▻ Use automatic form-filling programs or virtual keyboard
14▻ Use software that frequently scans and monitors the changes in the system or network.
4▰Rootkits Prevention⭐️
▻ Reinstall OS/applications from a trusted source after backing up the critical data.
▻ Well-documented automated installation procedures need to be kept.
▻ Perform kernel memory dump analysis to determine the presence of rootkits.
▻ Harden the workstation or server against the attack.
▻ Educate staff not to download any files/programs from untrusted sources.
▻ Install network and host-based firewalls.
▻ Ensure the availability of trusted restoration media.
▻ Update and patch operating systems and applications.
▻ Verify the integrity of system files regularly using cryptographically strong digital fingerprint technologies.
▻ Update antivirus and anti-spyware software regularly.
▻ Avoid logging in an account with administrative privileges.
▻ Adhere to the least privilege principle.
▻ Ensure the chosen antivirus software posses rootkit protection.
▻ Do not install unnecessary applications and also disable the features and services not in use.