Bay Ridge Security Consulting (BRSC)
Importance in Securing System If don’t keep up with security issues or fixes Exploitation of root access Installation of back doors Installation of trojan horses Mail worm propagation Mail relay exploitation
Key steps to securing host system Install operating system updates Protect passwords Protect files and directories Encryption Monitoring security of system Log files
Physical Security Hardware locks Keyed entry locks, privacy locks, patio locks, passage locks, standard keyed entry lock, deadbolt lock, cipher locks Proximity Readers Access List Mantraps Video Surveillance Fencing
Hardware Security Cable lock Place in a safe Locking cabinets Mobile Device Security Remote wipe/sanitation GPS tracking Voice encryption
Secure Operating System Software Develop the security policy Perform host software baselining Configure operating system security and settings Deploy the settings Implement patch management
Anti-Malware Software Anti-Virus Examine computer for infections Monitors PC recent activities Scan new documents Performed when files opened, created, or closed
Anti-Virus Software cont. If virus found Cleaning file of virus Quarantining infected file Deleting file
Anti-Malware Software cont. Anti-Spam Filtering software ○ Works with server Technique called Bayesian filtering ○ Divides messages into spam and not- spam piles ○ Analyzes each word in each ○ Traps higher percentage of spam then other techniques
Anti-Spam cont. Filtering Spam Black list ○ List of senders not to receive s from White list ○ List to receive s from Block s from entire countries or regions
Anti-Malware Software cont. Pop-up blockers Pop-up: small browser appears when other web sites being viewed. ○ Created by advertisements Separate program or included feature Stops pop-up advertisements from showing Anti-spyware Helps prevents computers from becoming infected by different spyware
Pop-up blockers & Anti-Spyware Cont. Pop-up blockers part of package known as anti-spyware Similarities Regularly update Continuous, real-time monitoring Perform complete scan of entire computer at one time Trap variety of malware
Anti-Malware Software cont. Firewalls Help stop malicious packets from entering/leaving system Software or hardware based Filters incoming/outgoing traffic Inclusive or exclusive Improve services running
Sources “Securing the Host”. Etutorials Web. 30 Oct onal+secrets/Part+IV+Managing+Red+Hat+Linux/Chapter+2 2+System+and+Network+Security/Securing+the+Host/ Ciampa, Mark. Ph.D. Security+ Guide to Network Security Fundamentals. 4th ed. United States of America: Course Technology, Cengage Learning, Print. 30 Oct. 2012
Sources cont “Securing Your Host”. Department of Computer Science. The University of Texas at Austin Web. 30 Oct hosts Barbish, J. Joseph “Firewall Concepts”. Free BSD Handbook. Web. 30 Oct /books/handbook/firewalls-concepts.html