Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.

Slides:



Advertisements
Similar presentations
Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA.
Advertisements

Cyber Security Quiz By: Alex Alberg. Q. A good password is: A. 8 characters or more B. Contains upper and lower case letters C. Contains special characters.
Mr C Johnston ICT Teacher
And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.
Security+ Guide to Network Security Fundamentals
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
The Internet and Security Steven Shedd. The Internet How it began How it began.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Potions of Protection Server Security. What does that do again? Familiarity Differing levels of protection –Low, does not exist –Medium, No private data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Video Following is a video of what can happen if you don’t update your security settings! security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Protecting People and Information: Threats and Safeguards
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
19 Jun 2001New Jersey Infragard1 Basic Linux/System Security Bill Stearns, Senior Research Engineer Institute for Security Technology Studies, Investigative.
1 Guide to Network Defense and Countermeasures Chapter 2.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Unit 19 INTERNET SECURITY
Hacking Linux Systems.  Text Editors  vi, ex, pico, jove, GNU emacs  Shells  chs (C Shell), sh (Bourne Shell)  File navigation  cd, ls, cp, mv,
Beginning PGP 2600 JAN09. What? OpenPGP is the proposed standard. – (RFC 2440, 3156, 4880, 5081, etc) OpenPGP is not a program. PGP and GnuPG are computer.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Security MGMT Summer 2012 Night #4, Lecture Part 2.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Small Business Security Keith Slagle April 24, 2007.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Chapter 8 File System Security. File Protection Schemes Password-Based Protection Encryption-Based Protection Protection-Based on Access Permission.
INTERNET & ONLINE COMMUNITY Week 14. RECAP Remember “Analysing the Social Web”? Why would we want to do that? Propagation – what is it and how.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Jozef Goetz, expanded by Jozef Goetz, 2008 Credits: Parts of the slides are based on slides created by UNIX textbook authors, Syed M. Sarwar, Robert.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
1 OS Security. 2 Introduction Network/OS security represents a hot topic in the IT world. Security: warranty/steps that must be taken to protect a computer.
Chapter 40 Internet Security.
Top 5 Open Source Firewall Software for Linux User
Chapter 8 File Security.
Protect Your Computer Against Harmful Attacks!
Information Security CIS 9002 Kannan Mohan Department of CIS
OPS235 Lab4: Investigations 5 – 9
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Security

File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right

Password protection Login and password Login names are public /etc/passwd passwd yppasswd, nispasswd

Encryption Covert (encrypt) a file to a different form Use gpg gpg --gen-key generates private & public keys ~/.gnupg encrypt & sign s and files

System security Everyone is under threat Specially when using Internet Local threats also Common sense, good practice Err on the side of caution

Some threats Denial of Service (Dos) Intrusion Snooping Viruses, Worms & Trojans Rootkits

Initial steps to security shut down unwanted daemons netstat -an /etc/services kill unwanted daemons remove from init changing access permissions to needed services

Best Practices Complex passwords Skip the root account Don’t trust random binaries strace, ltrace Log files /var/log/syslog etc. Software update Physical security

Firewall Packet filtering Stateless / stateful filtering netfilter / iptables Firewall products Firestarter, Smoothwall Express, IPCop, Shoreline