Unit 2 Personal Cyber Security and Social Engineering Part 2.

Slides:



Advertisements
Similar presentations
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
FIREWALLS Chapter 11.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security+ Guide to Network Security Fundamentals
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
SECURITY BASELINES -Sangita Prabhu.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security fundamentals Topic 10 Securing the network perimeter.
Cryptography and Network Security Sixth Edition by William Stallings.
Computer Security Firewalls and Intrusion Prevention Systems.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Installing TMG & Choosing a Client Type
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
Secure Software Confidentiality Integrity Data Security Authentication
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
Information Security Session October 24, 2005
* Essential Network Security Book Slides.
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Protection Mechanisms in Security Management
Presentation transcript:

Unit 2 Personal Cyber Security and Social Engineering Part 2

PROTECTION TIP #7 Physical Authentication Devices Hardware Devices that make computer systems unusable by unauthorized users.  _________ ______  Biometric devices

Physical Authentication Devices

PROTECTIONB TIP #8 Monitor Event Logging and Auditing The auditing systems available with most operating systems consists of two major components: A _________ policy (or audit rules ), which defines the types of events that will be monitored and added to the system’s security logs Audit entries (or audit records), which consist of the individual entries added to the security log when an audited event occurs

Event Logging and Auditing

Data Encryption _______________ scrambling plain text to prevent unauthorized users. It is a method for developing a code (algorithm) for altering the message so that unauthorized people cannot read it ___________ process of converting text to a key code Encryption key that defines how the original (plaintext) version of the data has been manipulated.

Disk Level Encryption Data encryption in a digital device or network can occur at many levels As file system level (file and folder level) encryption As disk level encryption As transport level encryptions :

Hardware Level Disk Encryption ___________ Platform Module ( TPM ) a built-in microchip that stores cryptographic information (encryption key/ start up key ). Information stored on the TPM is more secure from external software attacks and physical theft.

File and Folder Level Encryption File and folder level ___________ tools enable users to encrypt files stored on their drives using keys only the designated user ( recovery agent ) can decode. This prevents theft of data by those who do not possess the password or a decoding tool.

Remote Access Protection 8 eight basic steps for protecting local computing devices from Internet-based threats: Use a secure connection. Establish and configure a firewall to control the flow of information between the computing device and the Internet. Install and use anti-malware software on the local computer. Remove unnecessary software from the computer. Disable any nonessential services running on the computer. Disable unnecessary OS default features. Secure the Web browser. Apply operating system and application software updates and patches.

Local Protection Tools 5 common tools used at the local level to protect computing devices from exploitation through the Internet world: 1. Local Firewalls 2. Host-Based Intrusion Detection Systems 3. Browser Security Options 4. Anti-Virus/Anti-Malware Tools 5. Software Updates and Patches

PROTECTION TIP # 9 Protection tools Software-Based Local Firewalls Local ___________ is a device that protects computers connected directly to the Internet from outsider attacks..

Software-Based Local Firewalls  The firewall inspects all ___________ going to and coming from the outside connection and can be configured to control traffic flow between the Internet and the local device based on desirable properties.  Firewalls are configured so they will only pass data to and from designated IP addresses and TCP/UDP ports.

Software-Based Local Firewalls Firewall filters are configured around services recognized by the TCP and UDP networking protocols. These protocols use ______ numbers to identify specific processes such as HTTP or FTP and are used to refer incoming packets to a software application that will process them. Many of the port numbers are standardized, and are referred to as well-known ports. Similarly, their associated applications are called well-known services.

Firewall Functionality When the firewall examines the incoming __________, unit of data, it can read the source and destination IP addresses of the packet and any TCP/UDP port numbers. It will use the IP address and port information in the packet headers to determine if an incoming packet should be routed into the internal network.

PROTECTION TIP #10 Local Intrusion Detection System Intrusion ________________ Systems (IDS) notifying proper authorities of an intrusion (IDS) can be implemented in two ways 1. as network based IDS ( NBIDS ) 2. host based IDS ( HBIDS ). In both cases, the system is designed primarily to monitor the system (local computer or network environment), log key events and policy violations, and report them as directed.

User Selectable Security Options _______ Browsers- are also designed to appeal to users who by and large are non- technical Web browsers routinely offer a variety of user-selectable security options that can be established to compensate for the added vulnerability Internet browsing and searching brings to the system. These options include: Configuring Security Levels Configuring Scripting Configuring Proxies Controlling Cookies

Malicious Software Protection Increased connectivity through networks and the Internet have made personal computers vulnerable to an array of different types of malware and grayware. ____________ is the term used to describe programs designed to be malicious in nature. Grayware describes programs that have behavior that is undisclosed or that is undesirable.

Hardening Operating Systems The second level of ___________ local computer systems against attacks is to secure their operating systems. This involves updating vulnerable code segments of the OS as they become known. OS hardening occurs through the application of new programming in the form of: Service Packs Patches Updates

Social Engineering  Psychologically _______________ people into sharing confidential information or performing  It is the biggest threat organization can encounter today.

References  Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIo4Kz9e-PyAIVRPM- Ch3nrAA5&biw=1600&bih=907#imgrc=lk-sylJipU_MqM%3A Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIo4Kz9e-PyAIVRPM- Ch3nrAA5&biw=1600&bih=907#imgrc=lk-sylJipU_MqM%3A  Address&source=lnms&tbm=isch&sa=X&ved=0CAkQ_AUoAmoVChMIgPuG7_WPyAIVgSs- Ch3_ogBS&biw=1600&bih=907#imgrc=wdCKFaJNWP-wdM%3A Address&source=lnms&tbm=isch&sa=X&ved=0CAkQ_AUoAmoVChMIgPuG7_WPyAIVgSs- Ch3_ogBS&biw=1600&bih=907#imgrc=wdCKFaJNWP-wdM%3A  Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMI6v_gzf2PyAIVBj4- Ch2MfAW5&biw=1366&bih=652#imgrc=KeYqIbgCDnK0tM%3A Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMI6v_gzf2PyAIVBj4- Ch2MfAW5&biw=1366&bih=652#imgrc=KeYqIbgCDnK0tM%3A  SearchBox&biw=1366&bih=652&source=lnms&tbm=isch&sa=X&sqi=2&ved=0CAgQ_AUoA2oVChMI28SqvoiQyAIVSaCA Ch1mSwYn#imgrc=Ibji2SZ9FoLynM%3A SearchBox&biw=1366&bih=652&source=lnms&tbm=isch&sa=X&sqi=2&ved=0CAgQ_AUoA2oVChMI28SqvoiQyAIVSaCA Ch1mSwYn#imgrc=Ibji2SZ9FoLynM%3A  SearchBox&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMI7KzKypmQyAIVRI0NCh2TWgUP&biw=1366&bih =652#imgrc=qV3qgGnpg32oSM%3A SearchBox&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMI7KzKypmQyAIVRI0NCh2TWgUP&biw=1366&bih =652#imgrc=qV3qgGnpg32oSM%3A  Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIuMflq52QyAIVSM- ACh3GQgXN&biw=1366&bih=652 Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIuMflq52QyAIVSM- ACh3GQgXN&biw=1366&bih=652  Address&oe=&safe=active&gws_rd=ssl&um=1&ie=UTF- 8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=hywFVvXmCIvx- AGbgbWQAQ#gws_rd=ssl&imgrc=G8VbnVxqjFaRZM%3A Address&oe=&safe=active&gws_rd=ssl&um=1&ie=UTF- 8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=hywFVvXmCIvx- AGbgbWQAQ#gws_rd=ssl&imgrc=G8VbnVxqjFaRZM%3A