Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 2 Personal Cyber Security and Social Engineering Part 2.

Similar presentations


Presentation on theme: "Unit 2 Personal Cyber Security and Social Engineering Part 2."— Presentation transcript:

1 Unit 2 Personal Cyber Security and Social Engineering Part 2

2 PROTECTION TIP #7 Physical Authentication Devices Hardware Devices that make computer systems unusable by unauthorized users.  _________ ______  Biometric devices

3 Physical Authentication Devices

4 PROTECTIONB TIP #8 Monitor Event Logging and Auditing The auditing systems available with most operating systems consists of two major components: A _________ policy (or audit rules ), which defines the types of events that will be monitored and added to the system’s security logs Audit entries (or audit records), which consist of the individual entries added to the security log when an audited event occurs

5 Event Logging and Auditing

6 Data Encryption _______________ scrambling plain text to prevent unauthorized users. It is a method for developing a code (algorithm) for altering the message so that unauthorized people cannot read it ___________ process of converting text to a key code Encryption key that defines how the original (plaintext) version of the data has been manipulated.

7 Disk Level Encryption Data encryption in a digital device or network can occur at many levels As file system level (file and folder level) encryption As disk level encryption As transport level encryptions :

8 Hardware Level Disk Encryption ___________ Platform Module ( TPM ) a built-in microchip that stores cryptographic information (encryption key/ start up key ). Information stored on the TPM is more secure from external software attacks and physical theft.

9 File and Folder Level Encryption File and folder level ___________ tools enable users to encrypt files stored on their drives using keys only the designated user ( recovery agent ) can decode. This prevents theft of data by those who do not possess the password or a decoding tool.

10 Remote Access Protection 8 eight basic steps for protecting local computing devices from Internet-based threats: Use a secure connection. Establish and configure a firewall to control the flow of information between the computing device and the Internet. Install and use anti-malware software on the local computer. Remove unnecessary software from the computer. Disable any nonessential services running on the computer. Disable unnecessary OS default features. Secure the Web browser. Apply operating system and application software updates and patches.

11 Local Protection Tools 5 common tools used at the local level to protect computing devices from exploitation through the Internet world: 1. Local Firewalls 2. Host-Based Intrusion Detection Systems 3. Browser Security Options 4. Anti-Virus/Anti-Malware Tools 5. Software Updates and Patches

12 PROTECTION TIP # 9 Protection tools Software-Based Local Firewalls Local ___________ is a device that protects computers connected directly to the Internet from outsider attacks..

13 Software-Based Local Firewalls  The firewall inspects all ___________ going to and coming from the outside connection and can be configured to control traffic flow between the Internet and the local device based on desirable properties.  Firewalls are configured so they will only pass data to and from designated IP addresses and TCP/UDP ports.

14 Software-Based Local Firewalls Firewall filters are configured around services recognized by the TCP and UDP networking protocols. These protocols use ______ numbers to identify specific processes such as HTTP or FTP and are used to refer incoming packets to a software application that will process them. Many of the port numbers are standardized, and are referred to as well-known ports. Similarly, their associated applications are called well-known services.

15 Firewall Functionality When the firewall examines the incoming __________, unit of data, it can read the source and destination IP addresses of the packet and any TCP/UDP port numbers. It will use the IP address and port information in the packet headers to determine if an incoming packet should be routed into the internal network.

16 PROTECTION TIP #10 Local Intrusion Detection System Intrusion ________________ Systems (IDS) notifying proper authorities of an intrusion (IDS) can be implemented in two ways 1. as network based IDS ( NBIDS ) 2. host based IDS ( HBIDS ). In both cases, the system is designed primarily to monitor the system (local computer or network environment), log key events and policy violations, and report them as directed.

17 User Selectable Security Options _______ Browsers- are also designed to appeal to users who by and large are non- technical Web browsers routinely offer a variety of user-selectable security options that can be established to compensate for the added vulnerability Internet browsing and searching brings to the system. These options include: Configuring Security Levels Configuring Scripting Configuring Proxies Controlling Cookies

18 Malicious Software Protection Increased connectivity through networks and the Internet have made personal computers vulnerable to an array of different types of malware and grayware. ____________ is the term used to describe programs designed to be malicious in nature. Grayware describes programs that have behavior that is undisclosed or that is undesirable.

19 Hardening Operating Systems The second level of ___________ local computer systems against attacks is to secure their operating systems. This involves updating vulnerable code segments of the OS as they become known. OS hardening occurs through the application of new programming in the form of: Service Packs Patches Updates

20 Social Engineering  Psychologically _______________ people into sharing confidential information or performing  It is the biggest threat organization can encounter today.

21 References  https://www.google.com/search?q=Personal+cyber+security&safe=active&rls=com.microsoft:en-US:IE- Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIo4Kz9e-PyAIVRPM- Ch3nrAA5&biw=1600&bih=907#imgrc=lk-sylJipU_MqM%3A https://www.google.com/search?q=Personal+cyber+security&safe=active&rls=com.microsoft:en-US:IE- Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIo4Kz9e-PyAIVRPM- Ch3nrAA5&biw=1600&bih=907#imgrc=lk-sylJipU_MqM%3A  https://www.google.com/search?q=flash+drive&safe=active&rls=com.microsoft:en-US:IE- Address&source=lnms&tbm=isch&sa=X&ved=0CAkQ_AUoAmoVChMIgPuG7_WPyAIVgSs- Ch3_ogBS&biw=1600&bih=907#imgrc=wdCKFaJNWP-wdM%3A https://www.google.com/search?q=flash+drive&safe=active&rls=com.microsoft:en-US:IE- Address&source=lnms&tbm=isch&sa=X&ved=0CAkQ_AUoAmoVChMIgPuG7_WPyAIVgSs- Ch3_ogBS&biw=1600&bih=907#imgrc=wdCKFaJNWP-wdM%3A  https://www.google.com/search?q=esata+ports&safe=active&rls=com.microsoft:en-US:IE- Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMI6v_gzf2PyAIVBj4- Ch2MfAW5&biw=1366&bih=652#imgrc=KeYqIbgCDnK0tM%3A https://www.google.com/search?q=esata+ports&safe=active&rls=com.microsoft:en-US:IE- Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMI6v_gzf2PyAIVBj4- Ch2MfAW5&biw=1366&bih=652#imgrc=KeYqIbgCDnK0tM%3A  https://www.google.com/search?q=password+phrase+generator&safe=active&rls=com.microsoft:en-US:IE- SearchBox&biw=1366&bih=652&source=lnms&tbm=isch&sa=X&sqi=2&ved=0CAgQ_AUoA2oVChMI28SqvoiQyAIVSaCA Ch1mSwYn#imgrc=Ibji2SZ9FoLynM%3A https://www.google.com/search?q=password+phrase+generator&safe=active&rls=com.microsoft:en-US:IE- SearchBox&biw=1366&bih=652&source=lnms&tbm=isch&sa=X&sqi=2&ved=0CAgQ_AUoA2oVChMI28SqvoiQyAIVSaCA Ch1mSwYn#imgrc=Ibji2SZ9FoLynM%3A  https://www.google.com/search?q=password+encryption+algorithms&safe=active&rls=com.microsoft:en-US:IE- SearchBox&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMI7KzKypmQyAIVRI0NCh2TWgUP&biw=1366&bih =652#imgrc=qV3qgGnpg32oSM%3A https://www.google.com/search?q=password+encryption+algorithms&safe=active&rls=com.microsoft:en-US:IE- SearchBox&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMI7KzKypmQyAIVRI0NCh2TWgUP&biw=1366&bih =652#imgrc=qV3qgGnpg32oSM%3A  https://www.google.com/search?q=biometric+devices&safe=active&rls=com.microsoft:en-US:IE- Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIuMflq52QyAIVSM- ACh3GQgXN&biw=1366&bih=652 https://www.google.com/search?q=biometric+devices&safe=active&rls=com.microsoft:en-US:IE- Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIuMflq52QyAIVSM- ACh3GQgXN&biw=1366&bih=652  https://www.google.com/search?q=Firewall&rls=com.microsoft:en-US:IE- Address&oe=&safe=active&gws_rd=ssl&um=1&ie=UTF- 8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=hywFVvXmCIvx- AGbgbWQAQ#gws_rd=ssl&imgrc=G8VbnVxqjFaRZM%3A https://www.google.com/search?q=Firewall&rls=com.microsoft:en-US:IE- Address&oe=&safe=active&gws_rd=ssl&um=1&ie=UTF- 8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=hywFVvXmCIvx- AGbgbWQAQ#gws_rd=ssl&imgrc=G8VbnVxqjFaRZM%3A


Download ppt "Unit 2 Personal Cyber Security and Social Engineering Part 2."

Similar presentations


Ads by Google