Chapter 6 Application Hardening

Slides:



Advertisements
Similar presentations
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 7 HARDENING SERVERS.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Module 11: Remote Access Fundamentals
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Small Business Security Keith Slagle April 24, 2007.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
Windows Administration How to protect your computer.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Network Security.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
.
Joseph J. Malone Security for Seniors Joseph J. Malone
Chapter 5 Electronic Commerce | Security Threats - Solution
Chapter 7: Identifying Advanced Attacks
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Chapter 5 : Designing Windows Server-Level Security Processes
CompTIA Server+ Certification (Exam SK0-004)
Secure Software Confidentiality Integrity Data Security Authentication
HARDENING CLIENT COMPUTERS
Chapter 4: Security Baselines
Malware aka- malicious software By: Ken Fogel
Chapter 5 Electronic Commerce | Security Threats - Solution
Home Computer Security
Information Security Session November 11, 2004
Cybersecurity Strategy
Information Security Session October 24, 2005
Introduction to Systems Security
Connecting Remotely Winter 2014.
Operating System Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Unit 4 IT Security Kerris Davies.
Designing IIS Security (IIS – Internet Information Service)
Bethesda Cybersecurity Club
Windows 10 An Operating System
Presentation transcript:

Chapter 6 Application Hardening Visit for more Learning Resources

Application Hardening Make your computer hard to break Providing protection to your computer system Protection is provided in various layers like at the host level, the application level, the operating system level, the user level, the physical level and all the sublevels in between. Each level requires a unique method of security.

Hardening activities for a computer system can include: Keeping security patches and hot fixes updated Monitoring security bulletins that are applicable to a system’s operating system and applications Installing a firewall Closing certain ports such as server ports Not allowing file sharing among programs Installing virus and spyware protection, including an anti-adware tool so that malicious software cannot gain access to the computer on which it is installed Keeping a backup, such as a hard drive, of the computer system

Disabling cookies Creating strong passwords Never opening emails or attachments from unknown senders Removing unnecessary programs and user accounts from the computer Using encryption where possible Hardening security policies, such as local policies relating to how often a password should be changed and how long and in what format a password must be in

Windows hardening Use NTFS on all the partitions Disabling simple file sharing Disable guest account Installing antivirus software on computer Encrypt temp folder Install latest service packs Implementing IPSec

Linux Hardening Create firewall Use secure alternatives Copy your logs Enable password aging Keep an eye on open files

Hot fix Address specific issues e.g buffer overflow Smallest size files Many 3rd part s/w programs provides this functionality Produced quickly

Patches Fix the general problems Supplied from vendors Large size files as compare to hot fix

Updates New version of s/w and h/w product design to replace a older version of same product .

Service packs It is collection of updates, fixes to a software program delivered in form of single installable packet Easy installation Less error prone It is incremental

Web Server Sends static pages to large no of users Provides web pages to client e.g Apache Server Microsoft Internet Information Server(IIS)

Active Directory Manages the computer groups ,users who access computer network Used by network administrators. For more detail contact us