Bethesda Cybersecurity Club

Slides:



Advertisements
Similar presentations
Hardware Lesson 3 Inside your computer.
Advertisements

Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Chapter 5 Operating Systems. 5 The Operating System When working with multimedia, the operating system is perhaps the most important, the most complex,
Spring 2007Introduction to OS1 IT 3423: Operating System Concepts and Administration Instructor: Wayne (Weizheng) Zhou
CP1610: Introduction to Computer Components Basic PC Components.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
1 MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Avin Chen Borokhovich Michael Goldfeld Arik.
To run the program: To run the program: You need the OS: You need the OS:
Linux Basics CS 302. Outline  What is Unix?  What is Linux?  Virtual Machine.
Week 6 Operating Systems.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Ms. Tracy. Directions: Answer bell ringer, login, navigate to Edmodo -> Small Group (Module 1 – Lesson 8) Question: A graphic that is saved as a.PNG is.
Virtualization Week 20. This week Virtualization – What is it? – Software on different operating systems? Group Presentations – minutes per group.
Chapter 4 System Software.
POS/420 Introduction to Unix Philip Robbins – March 12, 2013 (Week 1)
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 1 Introduction to Operating Systems.
Parts of the Computer System
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Capt Froberg. Outline What is a computer? What components does a computer need? Physical “Cloud” What is a virtual computer?
Operating Systems & Applications Software Lesson 8.
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Course 03 Basic Concepts assist. eng. Jánó Rajmond, PhD
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
GNU and Linux.
Chapter 5 Operating Systems.
VMware ESX and ESXi Module 3.
Computer Basics Recap and Virtual Machines
Operating System & Application Software
CSC227: Operating Systems
An Overview of the Computer System
© 2015 Air Force Association
Virtualization and Hosting
Operating System.
Introduction to Operating Systems
Operating Systems Overview
Introduction to Operating System (OS)
BTEC NCF Dip in Comp - Unit 02 Fundamentals of Computer Systems Lesson 03 – Computer Software Mr C Johnston.
TexPREP Summer Camp Computer Science
What is an Operating System?
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Operating System Review
Looking Inside the machine (Types of hardware, CPU, Memory)
Chapter 2. Malware Analysis in VMs
An Overview of the Computer System
Jeopardy Security Risks Hardware & Software Computer Types Networking
Software and Programming
Chapter 6 System and Application Software
Operating System Review
Introduction to Computer Software
Types of Software.
Software and Programming
Bethesda Cybersecurity Club
Bethesda Cybersecurity Club
IST346: Virtualization and Containerization
Chapter 6 System and Application Software
Materials prepared by Dhimas Ruswanto, BMm
Chapter 6 System and Application Software
Chapter-1 Computer is an advanced electronic device that takes raw data as an input from the user and processes it under the control of a set of instructions.
Introduction to Operating Systems
Chapter 6 System and Application Software
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Bethesda Cybersecurity Club
Presentation transcript:

Bethesda Cybersecurity Club Lesson 3 Computing Basics

Agenda News Hands on Passwords (19 worst passwords) Computing basics 10 min – meet your teammates 5 min – News – NotPetya Virus 10 min – Nova labs experience 5 min – Review last week 10 min – PII and Internet Safety 10 min – CIA Triad 10 min - Malware 40 min – hands on stuff 20 min – review/closeout/cleanup

Passwords Any of the top 10000 passwords can be broken immediately Brute force attacks can run 4 billion calculations per second Passwords of 8 characters consisting of: Only numbers - <1 second +Lower case - <11 minutes +Upper case - <15 hours +symbols - <3 weeks Always use at least 3 of the above Always use at least 8 characters 9 characters – 5 years 10 characters – 526 years Any of the top 10000 passwords can be broken immediately 91% of people have one of the 1000 most popular passwords Almost half of all people use one of the 100 most popular Use different passwords for each site Change passwords quarterly Do not use words or userids BAD: Patriot [Instantly] GOOD: Cy63rp@tr10+ [34000 years] Keyboard patterns can be useful when physical security it high https://howsecureismypassword.net/

Computing basics BIOS – Basic Input-Output System Services Connects CPU with Operating System (OS) Allows the Operating System to connect with input, output and storage devices Manages basic system settings like date, time, power Permanent, Embedded on the motherboard Operating systems Manages hardware and software resources Graphic user interface Mac, Windows, Unix, Linux (Ubunitu, Debian, Mint, Fedora) Services Applications

Virtual machines (VM) VM Security Computer within a computer Host [OS] – OS of the physical device Guest [OS] – OS of the VM Image – another term for VM Hypervisor – software that can create VMs (VMware, KVM) Benefits – scalability, flexibility, portability, cost Disadvantages Performance depends on host machine’s resources Single point of failure VM Security Benefits VMs can isolate damage Snapshots can allow for rollbacks Concerns Hypervisors can be attacked Updates for VMs and Software on VMs Communications between VMs must be monitored like physical machines

Hands on… Create user accounts Firewall WiFi Anti virus File permissions Malware 

What’s next? Homework: Lesson 4 – MS Windows and MS Developer Network (MSDN)