Information Security Session October 24, 2005

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Thank you to IT Training at Indiana University Computer Malware.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
1 Computer Security: Protect your PC and Protect Yourself.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
Windows 7 Firewall.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Security at NCAR David Mitchell February 20th, 2007.
Return to the PC Security web page Lesson 5: Dealing with Malware.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
Introduction to Firewalls
NetTech Solutions Protecting the Computer Lesson 10.
Internet safety By Suman Nazir
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Vista Configuration MCTS : Network Security.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
bitdefender virus protection
Windows Tutorial 5 Protecting Your Computer
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Three steps to prevent Malware infection
Top 5 Open Source Firewall Software for Linux User
Critical Security Controls
FIREWALL configuration in linux
Chapter 6 Application Hardening
Instructor Materials Chapter 7 Network Security
Implementing a Secure ISA Server
Firewalls.
Computer Worms & Viruses
How to Fix Windows 10 Update Error 0x ?.
Welcome To : Group 1 VC Presentation
Information Security Session November 11, 2004
Risk of the Internet At Home
Information Security Session October 23, 2006
Information Security Awareness
Computer Security.
Fire-wall.
Lecture 3: Secure Network Architecture
Firewalls Chapter 8.
Implementing Firewalls
Using Software Restriction Policies
Presentation transcript:

Information Security Session October 24, 2005 11/13/2018 Information Security Session October 24, 2005 Bill Eaheart Network Security Coordinator DePaul University NIDS with Snort

Top Ten List Install Operating system Updates and Patches Install Anti-Virus and Spyware Protection Use a Host Based Firewall Create a strong password Use caution when opening email attachments Never share personal information Do not respond to Spam Back up Files Do not Share Folders Use a Spyware program 11/13/2018 Information Security

Securing Windows Step One: Enable a personal firewall Basic Steps to Secure your Machine: Step One: Enable a personal firewall Step Two: Download & Install AntiVirus Step Three: Run Windows Update Step Four: Configure Windows for Automatic Updates Step Five: Secure Your Accounts and Passwords Step Six: Run a Weekly Virus Scans of your Entire Computer Step Seven: Run and Update a Spyware Removal Program Step Eight: Disable or Set password for File Shares Step Nine: Run Microsoft Baseline Security Analyzer 11/13/2018 Information Security

Personal Firewalls A personal firewall is a software-based filter between your computer and the outside world that is installed on your computer to protect it from unauthorized access by other external users. Personal firewalls are configurable to specify which incoming and outgoing programs, ports, and IP addresses can be accessed. Windows XP Internet Connection Firewall (ICF) http://www.microsoft.com/windowsxp/using/security/internet/sp2_wfintro.mspx Inspects only incoming traffic Commercial/Free Products Sygate Personal Firewall ZoneAlarm Tiny Personal Firewall Norton Personal Firewall BlackIce PC Protection 11/13/2018 Information Security

How does a firewall work? Each machine on the Internet is assigned a unique address called an IP address. Computers have addresses referred to as IP addresses Allows computers to talk to each other Tells your computer where you want to send traffic Example: 140.192.65.25 Ports – A server machine makes its services available to the Internet using numbered ports Tells your computer what service you want Web Server: Port 80 Internet Communication Similar to postal envelopes Instead of postal address and zip codes  IP addresses and Port number Connecting to a web server Where do I want to go  www.cnn.com (DNS – easy for people to remember) What is the IP Address  64.236.16.20 What service do I want  Port 80 (web server) What your computer sees Source: 140.192.79.91:4628  Destination: 64.236.16.20:80 11/13/2018 Information Security

How does a firewall work? Computers have services running – even your work or home PC A firewall inspects all traffic coming or leaving your computer Use a set of rules to determine if it should allow the traffic to pass In many cases you just need to install or enable the firewall application 11/13/2018 Information Security

Why is a firewall important? Scanning logs Wed Mar 19 00:15:23 CST 2005 Number of scans: 523,264 Destination Ports Total     Port ======    ====== 198602      445 Windows 112389      139 Windows 88258     1433 MS-SQL - slammer worm 82404       80 Web Server 18390      135 Windows 11/13/2018 Information Security

What a Firewall Can Do A firewall can be selective about what it lets through and what it blocks. The firewall inspects all incoming traffic – and on some firewall applications it can inspect outgoing traffic as well Based on the setup and rules the firewall determines if the packet should be blocked or transmitted Some applications send notifications to the user with options Denying the program or traffic Allowing it just this one time. You will be asked again the next time it wants to use the network. Allowing it forever more. You will not be asked again the next time it wants to use the network. What do you do if you received a notification that traffic has been blocked Firewall has blocked the harmful traffic 11/13/2018 Information Security

What a Firewall Cannot Do Be aware of a false sense of security Firewalls are limited in protecting your computer Do Firewalls Prevent Viruses, Worms or Malware? NO!! Some firewalls can prevent malware from accessing the internet if your computer is infected your Majority of all malware is received through e-mail, file sharing (like Kazaa or Gnutella) or through direct download of a malicious program Firewalls can't prevent this Common Sense and Caution Operating System patches and security fixes Anti-Virus software Spyware software 11/13/2018 Information Security

Windows Update Microsoft provides security patches and updates Check for updates at least once per month Security fixes released on the second Tuesday of each month Manual Update Open Internet Explorer  http://windowsupdate.microsoft.com Windows Automatic Updates makes this easy Start  Control Panel  Automatic Updates DePaul makes it even easier Software Update Services (SUS) server 11/13/2018 Information Security

Automatic Windows Update 11/13/2018 Information Security

Microsoft Security Analyzer Microsoft Baseline Security Analyzer http://www.microsoft.com/technet/security/tools/mbsahome.mspx Free, vulnerability assessment tool for the Microsoft platform Download Software Installation Wizard Scan your computer 11/13/2018 Information Security

The End! Thank you Any questions weaheart@depaul.edu 11/13/2018 Information Security