By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
UNITS meeting September 30, 2004 Network Security Roger Safian
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
A Basic Introduction to Computer Security John H. Porter University of Virginia Department of Environmental Sciences.
Security at NCAR David Mitchell February 20th, 2007.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
INTERNET SAFETY FOR KIDS
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Don’t let them catch your computer!!!!!
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Windows Administration How to protect your computer.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
What they are and how to protect against them
Unit 4 IT Security.
Secure Software Confidentiality Integrity Data Security Authentication
Cyber Security By: Pratik Gandhi.
6. Application Software Security
Presentation transcript:

By Kyle Bickel

 Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective measures  Operating system  Firewalls  Antivirus protection  Setting Secure passwords

 Some operating systems are more secure like Linux and Unix compared to other operating systems like Windows which is the most attack operating system  Operating system can help you secure your computer through the use of several built in methods  They allow you to set up passwords to help secure your user accounts and is important to set strong passwords

 Also the operating system allows a user to be an administrator which can access all the other accounts  The administrator account gives the user security options that will help better secure the computer  The administrator also allows the user to access other accounts and add or remove privileges to certain user accounts to prevent them from weakening the computer’s overall security  It is also very important to disable any guest accounts that are not being used to prevent them from being compromised

 Also important to check your operating systems build in local security and verify that your security options are set appropriately to help better secure your computer  Also important to keep your operating system up to date by installing all new patches to prevent your system from being compromised  It is important to go into your operating system and shut down any unused or unwanted processes  Lastly it is important to have the operating system’s firewalls on and preferences set to ensure protection

 A firewall is a software or hardware based network security that controls the network traffic  It is important that when connected to a network to keep your firewall on at all times  Firewalls are very important to someone who always leaves their computer on and connected to their network which leaves the user vulnerable to an attack at any time whether they are sitting behind the computer or not

 There are several different types of firewalls few of them are  Packet filtering firewalls  Stateful packet filtering firewalls  Application firewalls  Circuit level firewalls  Dynamic packet filters  Each play different roles in protecting your network from outside attackers

 The two big types of firewalls are software and hardware  Hardware is typically known as network firewalls  Hardware firewalls are a defense between your network and your router  Some routers also have built in firewalls which can effectively protect several computers that are attached to that router or can strongly protect one computer

 The advantage to hardware firewalls is that they are separate devices and run on their own operating systems which give an added security  But their major flaw is that they cost  Software is normally a built in firewall in your operating system which gives added protection to your hardware firewall  Most operating systems offer firewalls and it should always be turned on

 Firewalls do offer a decent amount of protection against attackers but doesn’t guarantee that your computer wont be attacked  Also firewalls offer very little protection against viruses that require you to run the software on your computer before they infect your computer  But the biggest disadvantage is that since the firewall is on your computer that it is the last line of defense and may not catch all malicious traffic that enters your system  But to ensure best protection against all types of attacks it is best to have a antivirus program along with your firewall

 Antivirus is the protection software that is designed to protect your computer from any malicious software  For antivirus protection to be fully effective it is important that the program is always running in the background of your computer so that it can prevent and eliminate malicious software that also runs in the background of your computer and usually goes undetected by the user

 It is very important that your antivirus has the latest update to help it protect against new types of malicious software  Also important to purchase a new copy of antivirus protection when your version runs out because your virus protection will continue to work but will not receive updates so it wont be able to defend against newer types of malicious software  It may also be a bad thing to run more than one antivirus program on the same system because the programs would conflict with each other making the programs less effective

 Antivirus programs work by scanning through segments of code and look for code that can be linked to code forms of known malicious software or look for similarities in code that might be variations of known malicious software  It also takes unknown programs and predicts what they will do by running the program in a sandbox which is a set up security space that allows the file to operate and see if the file performs any malicious actions

 Some side effects of antivirus programs is that they tend to slow down your system because they are required to always run on your system  Also the prompts may be a little more confusing for people who are computer illiterate and can cause them to choose a wrong option which could leave them vulnerable to an attack  People may turn off their antivirus protection because their antivirus gives a false positive detection to a program or file that they are trying to access and wont allow them to run it. So they turn their antivirus off. Then later they could forget to turn their antivirus back on when they are done with the file or program that was blocked leaving them vulnerable to an attack because they have no antivirus protection running

 Another big problem is a false negative in which is when a program either tricks the antivirus to think its not a threat or the antivirus judges the program to be safe and allows the program to run on the computer  Also the antivirus is located in the kernel level of the operating system and which creates a potential avenue of attack which if the antivirus is targeted specifically it could be detrimental to the computer

 A password is a string of characters used to authenticate a user  Very important not to use common words as passwords like names, all numbers or all the same letter, anything someone could easily find out about you like birth dates or house number, or the same password for everything  What makes a strong password is its length, complexity, and how unpredictable it is  Passwords should be created from random characters consisting of capital and lower case letters, numbers and extra characters and punctuation and should be kept secret  It is also important that your password is easy to remember so you don’t have to write it down and also easy to type and don’t have to look at the keyboard to type it  Also to make sure they are secure passwords should be changed frequently

 Weaknesses to passwords is that they are very unsecure  Attackers could use blacklisting which is purposely entering the wrong password in a required number of times which locks the users account  Passwords are susceptible to dictionary attacks which will crack any password that is a lower case word no matter how long the word is

 Another attack is login spoofing where you are redirected to what looks like another login page where you type your username and password to reconnect to your session. Normally it will tell you your password was invalid so that you would retype it so that they can be sure that they have the correct password  Lastly the easiest way to obtain the users password is by ing or calling them and pretending to be a network security officer and would ask the person for verification purposes or that their system has been breached and that they should change their password

 There is no best way to protect your computer 100 percent but the use of safe computing coupled with your operating system, firewalls, anti-virus, and secure passwords will provide you the best chance of protecting your computer

 Host Based Security Best Practices." Department of Computer Science Computing Guide. Princeton University Computer Science Department, Web. 11 Nov  "The University of Texas at Austin." Securing Your Host. The University of Texas at Austin, Web. 11 Nov  "Security Tip." Understanding Firewalls. Department of Homeland Security, 06 Feb Web. 11 Nov cert.gov/ncas/tips/ST04-004http:// cert.gov/ncas/tips/ST  "Antivirus Software." Wikipedia. Wikimedia Foundation, 25 Oct Web. 11 Nov  Kessler, Gary C. "Passwords — Strengths and Weaknesses." Passwords — Strengths and Weaknesses. Auerbach, Jan Web. 11 Nov  center/firewalls/firewalldiagram1.gif center/firewalls/firewalldiagram1.gif  8efee3-a2ca-4efe-a56e-9316f0edd084_0.jpg 8efee3-a2ca-4efe-a56e-9316f0edd084_0.jpg  