Chapter 9 Hardware and software controls. Overview 2  Password Management  Access control lists (ACLs)  Firewalls and their capabilities  Intrusion.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
System and Network Security Practices COEN 351 E-Commerce Security.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 Network Security.
Intrusion Detection Systems and Practices
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Department Of Computer Engineering
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Security Guidelines and Management
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Information Systems Security
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Role Of Network IDS in Network Perimeter Defense.
CSCE 201 Identification and Authentication Fall 2015.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Network security Vlasov Illia
Securing Network Servers
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Firewalls.
Security in Networking
Intrusion Prevention Systems
6. Application Software Security
Presentation transcript:

Chapter 9 Hardware and software controls

Overview 2  Password Management  Access control lists (ACLs)  Firewalls and their capabilities  Intrusion Detection/Prevention Systems  Patching operating systems and Applications  End Point Protection  Information security control best practices

Background 3  Best known controls  Used in almost every computer  Not comprehensive list of controls  In career  Many other controls  E.g. Application-specific controls  Introduce basics underlying information security controls  Help evaluate merits of other controls

Passwords 4  Definitions  Identification  Presentation of a user identity for the system  Typically by a username  Authentication  Establishing confidence in the validity of a claimed identity  Typically using a password  Secret series of characters known only to owner  Design goals of passwords  Simple enough for average users  Secure enough for most applications

Password types 5  Personal identification number (PIN)  Short (4-6 digits), numerical password  Useful when  Small keypads are necessary, e.g. ATM machines, or  Regular passwords could potentially create human safety problems  E.g. airport fire suppression systems  Relatively insecure  Short and can be easily guessed  Only provide limited security  Generally assumes existence of other security mechanisms  E.g. daily withdrawal limits and security cameras in ATMs  Physical security at airports

Password types – contd. 6  Passphrase  Sequence of words that serves as a password  E.g. - Wow!!!thisis#1clasatschooL  Motivation  Human brain can only retain up to about 7 chunks of information in short term memory  But each chunk can be fairly large  So, passphrases can be longer than passwords  But easier to remember than an arbitrary sequence of characters  However, long passphrase not necessarily safer  Simple passphrases such as “thisisthe#1classatschool” can be predictable and easily guessed by attackers  Compared to passwords such as “TiT#`CaS.”

Password management 7  So far, you have been a user of passwords  In profession, you are on the other side  Making it all work  In particular  Information security of passwords in your custody  Accomplished through password management  Process of defining, implementing, and maintaining password policies throughout an enterprise  Reduce likelihood that systems using passwords will be compromised  NIST Special publication  Guide to enterprise password management

Password management – contd. 8  Information security concerns  CIA triad re-introduced  Organizations need to protect the confidentiality, integrity, and availability of passwords  Asset management terminology  Passwords are restricted and essential information assets  Loss of confidentiality or integrity can give intruders improper access to information  Hence, passwords are restricted assets  Non-availability of a password can make underlying protected resource unavailable  Hence, passwords are essential

Password management – contd. 9  National Institute for Standards and Technology (NIST)  Guidelines for minimum recommendations regarding password management  Basis for discussion here  Specific organizations may have more stringent password management requirements  E.g. Banks, hospitals  May impose additional requirements  Including  Requiring mechanisms other than passwords for authentication

Password management – contd. 10  For optimal (minimal) investment  Begin with recognition of threats which can compromise passwords  Take actions to minimize likelihood of these compromises  NIST recognizes 4 threats to passwords  Password capturing  Password guessing and cracking  Password replacing  Using compromised passwords

Password threats Password capturing  Ability of an attacker to acquire a password from storage, transmission, or user knowledge and behavior  Improper storage  Unencrypted transmission 2. Password guessing  An intruder makes repeated attempts to authenticate using possible passwords such as default passwords and dictionary words  Password cracking  Process of generating a character string that matches any existing password string on the targeted system  Requires unrestricted access to encrypted versions of saved passwords

Password threats – contd Password replacing  Substitution of the user’s existing password with a password known to the attacker  Generally happens using various social engineering techniques  Exploiting weaknesses in the system’s password reset policies 4. Using compromised passwords  Passwords on the system known to unauthorized users  May be exploited to launch other social engineering attacks, change file permissions on sensitive files  If the compromised password is of a privileged user  E.g. an IT administrator  Attacker may even be able to modify applications and systems for later exploitation  E.g. create a privileged account for himself (most attackers are indeed men!)

Password management recommendations 13  Implemented as a password policy  Set of rules for using passwords  For users  What kinds of passwords are allowed  E.g. length and complexity rules for passwords  For administrators  How passwords may be stored, transmitted issued to new users and reset as necessary  E.g. account for any industry-specific regulations

Password management – contd. 14  Dealing with password guessing and cracking  Pay attention to password storage  Access to files and databases used to store passwords should be tightly restricted  Save password hashes, not passwords  Encrypt all password exchange  Strictly verify identity of all users who attempt to recover forgotten passwords or reset passwords  Educate all users of password stealing attempts through phishing attacks, shoulder surfing, and other methods  Passwords must be made sufficiently complex  Accounts must be locked after many successive failed login attempts  Minimizes opportunities for hackers to guess a password

Password management – contd. 15  Password expiration  Duration for which password may be used without change  Reduces likelihood that compromised password can be used productively  Often, passwords collection and password usage are separate operations  Creates delay before compromised password is used  Password compromise may not be very damaging  If password is changed before the attacker attempts to use it  Problems  Particularly in absence of password synchronization or SSO  Users forget passwords  Costly IT support to recover forgotten passwords  Hence  Use judiciously  Longest possible durations

Password limitations and alternatives 16  Users often forget passwords  Help desks to respond to user requests  Expensive  Password reset mechanisms  Challenge questions may not be strong enough  Relatively simple social engineering attacks such as phishing can exploit reset mechanisms  Hence, considerable interest in developing alternatives  Not trivial  Users know how to use passwords  Limited data available on actual losses suffered by organizations due to password theft  Why fix what is not broken  Proposals for alternatives  Passfaces  User pre-selects a set of human faces and the user selects a face from this set among those presented during a login attempt  Draw-a-secret  Users draw a continuous line across a grid of squares

Access control 17  Limiting access to information system resources only to authorized users, programs, processes, or other systems  E.g. Locks  Access control models  Descriptions of the availability of resources in a system  Representation of access control in computer security  Properties of access control models  Represent protection needs of any resource at varying levels of granularity  Without unreasonable computational burden on operating system  Popular access control models  Access control lists (ACLs)  Role-based access control (RBAC)

Access control lists (ACLs) 18  List of permissions attached to specified objects  Use simple syntax to specify  Subjects  Objects  Allowed operations  E.g.  Network connection  ACL: ( , ANY, block)  Subject: Host  Object: ANY resource on the network  Operation: Block from passing through the network connection  Operating system checks all incoming resource requests  Any ACL entry may prohibit access to the resource

Access control lists (ACLs) – contd. 19  Common use 1. Files  Specify rights for users or groups to files and executables  E.g. chmod command  System Administration chapter 2. Network connections  Specify port numbers and network addresses that may be accessed  Common way to implement firewalls  Default ACLs  Present in most modern operating systems  Provide reasonable levels of security for the average user  Properties  Some of the simplest controls to implement  Basis for many other security controls  E.g. prevent over-writing of passwords

Access matrix 20  Simple representation of ACLs  Subjects attempt operations on objects  Operations permitted if allowed by ACL  Cells show permissions for subject on object  ACL for user on corresponding object  E.g. File 1  Subject John is owner  Has read and write permissions on file  Can assign any permission to any user on file  Subject Bob  Given read permission  Subject Alice  Given execute permission Objects Host 1File 1File 2 Subjects JohnBlock Own Read Write Read BobBlockRead AliceAllowExecuteOwn Read Write Execute

ACL limitations 21  Limited scalability  To modify permissions for a specific user  Permissions for that user must be modified individually on all objects to which the user has access  Not possible to assign permissions based on user responsibilities  When user changes roles  Role-appropriate permissions for the user must be modified individually on all applicable objects

Role based access control (RBAC) 22  Assign permissions to user roles rather than to individual users  Roles are created for job functions  Users are assigned roles based on responsibilities  Access permissions defined for roles  Separation between users and access controls  As users evolve within the organization  Roles can be assigned  Access permissions are automatically updated  RBAC reduces cost and administrative effort, compared to ACLs  But tool support evolving

Firewalls 23  Hardware or software that prevent the dangers originating on one network from spreading to another network  Allow one network to connect to another network while maintaining some amount of protection  E.g. door to a home or office  Allow residents to get out of the house  Block rain and sleet from entering the home  Maintain some degree of confidentiality  Serve multiple purposes  Restricting entry and exit from the network to carefully specified locations  Limiting incoming Internet traffic to specific application running on specific devices  Blocking outgoing traffic from hosts suspected to have been compromised

Firewalls – contd. 24  Constraints  Not generally intended to defend against specialized attacks  E.g. Doors of a retail store are not designed to detect shoppers with explosives, or shoplifters  Where necessary (e.g. at airports)  Left to more specialized controls, e.g.  Human inspectors  Anti-theft technologies  Benefits  Very effective and relatively inexpensive first line of defense  Defend against large number of common nuisances

Firewall arrangement 25  Figure shows typical arrangement  Intercept all traffic between the Internet and the organization’s network  Implement organization’s traffic rules

Firewall rules 26  Specified using ACL syntax  e.g. pass in quick from /24 to pass out quick from to /24 pass in log quick from any to any port = 22 pass out log quick from any port = 22 to any block in all block out all

Firewall limitations 27  Defenseless against insiders and unregulated traffic  Protect against attacks originating outside the network  Traffic inside the organization does not cross firewall  Compromised computer can steal data from other computers  Defenseless against user practices  Flash storage devices  Defenseless against encrypted traffic  Cannot be inspected  E.g. SSL traffic  Configuration  Poorly configured firewall  Only provides illusion of security

Firewall types Packet filtering firewalls  Examine protocol header fields to determine entry, e.g.  Source and destination IP addresses  Destination port address  TCP flags  Example usage  Block incoming packets from ISP with history of sending spam  Host or ISP identified by the source IP address field 2. Deep packet inspection firewalls  Examine packet data, in addition to protocol headers  Compare against database of known malicious payloads  Identify payloads that attempt to launch buffer overflow or other attacks

Typical firewall organization 29  Typical deployment involves  Perimeter firewall  Lies between the external network and the organization  Allows hosts outside the organization to access public-facing services  E.g. web, and DNS.  De-militarized zone  Network between external network and organization’s internal network  Hosts external services such as http, smtp and DNS  Interior firewall  Limits access to organization’s internal network  Specific applications for requests originating from specific hosts  E.g. Student learning system and records database  Militarized zone  Location of all the organization’s information assets

Typical firewall organization – contd. 30

Basic firewall recommendations 31  Allow users to access to the following services on the Internet  Web (port 80, 443) to specified hosts running web servers  (ports 25, 465, 585, 993, 995) to specified hosts running  DNS (port 53) to specified hosts running the DNS service  Remote desktop connections (port 3389)  SSH (port 22) to specific UNIX hosts  General rules of thumb  Allow “secure” services  Encrypt transactions  In popular use, hence regularly updated  SSH (for UNIX connections) and Remote Desktop (for Windows clients)  Allow access to “safe” services on designated hosts  E.g. and the web  Block legacy, unmaintained services  Telnet and FTP

Intrusion detection/ prevention systems 32  Intrusion detection systems (IDS)  Monitor IT systems for malicious activity or violations of usage policies  Two types  Network-based  Monitor network traffic and application protocol activity to identify suspicious connections  Usually included in routers and firewalls  Host-based  Software applications on individual hosts  Monitor local activity such as file access and system calls for suspicious behavior  Most enterprises employ multiple IDSs, each with its own set of rules  Maximize probability of detecting intrusion attempts  Can raise alarms about impending attacks  Watching for reconnaissance activity (host and port scans)  Often precede large-scale attacks  Intrusion prevention systems  Build on IDS and attempt to stop potential intrusions

Detection methods 33  How do IDS/ IPS detect intrusions?  Three methods  Signatures  Sequence of bytes that is known to be a part of malicious software  Anomalies  Deviations between observed events and defined activity patterns  Protocol states  Compare observed events against defined activities for each protocol state  Most commercial implementations use combination of all three  Maximize effectiveness

Detection methods comparison 34  Signature-based  Very effective against simple well-known threats  Also computationally very efficient  Uses simple string comparison operations  Not effective against previously unknown threats, disguised threats and complex threats  I LOVE YOU virus with subject line read “job offer for you”  Cannot detect attacks composed of multiple events  If individual events are potentially legitimate  E.g. Cannot detect port scans  Every individual probe packet is a well-formed and legitimate packet

Detection methods comparison – contd. 35  Anomaly-based  Very effective at detecting previously unknown threats, e.g.  Malware that sends out large volumes of spam  Malware that uses computer to break passwords  Computer's behavior significantly different from established profile  Concerns  Building profiles can be very challenging, e.g.  Computer may perform full backups on last day of the month  Large volumes of network data transfer  If not included as part of baseline profile, will be flagged

Detection methods comparison – contd. 36  Protocol-state-based  Aware of allowed operations for a given protocol state, e.g.  Knows that a user in an unauthenticated state should only attempt a limited number of login attempts, or  User in unauthenticated state should only attempt a small set of commands  Able to identify unexpected sequences of commands  E.g. issuing same command repeatedly can indicate a brute-force attack  Can keep track of the user id used for each session  Helpful when investigating an incident.  Can include checks for individual commands  E.g. monitoring lengths of arguments  Username with a length of 1000 characters can be considered suspicious  Username with non-text data is even more unusual and merits flagging  Limitation  Tracking many simultaneous sessions can be extremely resource-intensive

IDS/ IPS limitations 37  Two well-known limitations 1. Detection errors  Many alarms do not represent real threats  Called false positives  Many real threats are missed  Called false negatives  Reducing one generally increases the other, e.g.  Very sensitive IDS will detect more real attacks, but also flag many benign transactions as malicious  Less sensitive IDS will not raise too many false alarms, but will also miss many real attacks  Real attacks are very expensive  So organizations generally prefer false positives over false negatives  Increases cost of sifting through all alarms raised 2. Evasion  Act of conducting malicious activity so that it looks safe, e.g.  Conduct port scans extremely slowly (over many days) and from many different sources  Malware can be sent as parts of file attachments, and appear legitimate  IDS/ IPS therefore cannot be trusted to detect all malicious activity  However, like firewalls, very effective as part of overall security deployment

Patch management 38  Patch  Software that corrects security and functionality problems in software and firmware  Also called updates  Usually the most effective way to mitigate software vulnerabilities  Patch management  Process of identifying, acquiring, installing, and verifying patches  Many information security frameworks impose patch management requirements  E.g. Payment Card Industry (PCI) Data Security Standard (DSS) requires that critical patches must be installed within one month of the release of the patch (PCI DSS 2.0 requirement 6.1.b)  Concerns  Patches can break existing software  Particularly in-house software developed using older technologies

Patch management challenges 39  NIST 1. Timing, prioritization and testing  Usually necessary to prioritize which patches should be installed first  E.g. web servers need to be prioritized over desktops in militarized zone  Operational system might fail from patching, causing business disruptions  Timing, prioritization and testing are often in conflict  Patch bundle solution to conflict  Release aggregates of many patches as patch bundles at quarterly or other periodic schedules  Issue patches instantly for exploits known to be getting exploited  Reduces patch testing effort at organizations and facilitates deployment

Patch management challenges – contd Configuration  Often multiple mechanisms for applying patches  Automatic updates, manual updates, vulnerability scanners  Competing patch installation procedures can cause conflicts  May try to overwrite patches  May try to remove previously installed patches  May try to install patches that fails organization’s internal tests  Therefore identify all ways in which patches could be applied  Resolve any conflicts among competing patch application methods  Users, particularly power users may override or circumvent patch management processes, e.g.  Disabling patch management software  Installing old and unsupported versions of software  Uninstalling patches

Patch management challenges – contd Alternative hosts  Diversity in the computing environment  May include unsupported hardware  Appliances are a particularly interesting case  Often manufacturers are not very familiar with the importance of patch management  May not support automated procedures for testing and deploying patches  Patch management can easily become time consuming and labor intensive 4. Software inventory  Organization should maintain current and complete inventory of all patchable software installed on each host in the organization  Inventory should also include correct version and patch status

Patch management challenges – contd Resource overload  Patch deployment needs to be managed to prevent overload  Download speeds can become significantly slow  If many hosts start downloading the same large patch at the same time  Hard drives hunt for different blocks for each individual host  Network bandwidth can also become a constraint  Large organizations  Particularly if patches are transmitted across continents on WAN networks  Common strategies  Sizing patch infrastructure to handle expected request volumes  Staggering delivery of patches  Only deliver patches to a limited number of hosts at any given time

Patch management challenges – contd Implementation verification  Forcing required changes on target host so that patch takes effect  May require restarting a patched application or service  Or, rebooting the entire operating system  Or making other changes to the state of the host  Can be very difficult to determine if a particular patch has taken effect at a particular host  One mechanism  Use other methods of confirming installation  E.g., using a vulnerability scanner that is independent from the patch management system

End-point protection 44  Security implemented at the end user device  Desktops, laptops, and mobile devices used directly by consumers of the IT system  Typically implemented using specialized software applications  Provide services such as  Anti-virus protection  Anti-malware protection  Intrusion detection  Defense of last resort  Attempts to pick up security problems missed by network controls such as firewalls and intrusion detection systems  Can offer security that organization-wide systems cannot provide  E.g. confirm that versions of the operating system, browser etc. on the device are up- to-date  Alert user if necessary to initiate an update  Also provides protection against other compromised devices internal to the network  Compromised desktop within the network may scan ports as a zombie  End-point security software on targeted hosts can detect scans and block requests

Detection mechanisms Signatures  Traditional method of detecting malicious software  Similar to signature-based IDS 2. Reputation  Safety of file based on reputation score calculated using file’s observable attributes  Over time, reputation scores calculated and updated for every known executable file  About 10 billion in number  Identified by file hash  Eliminates need to scan every byte of every file for known malware signatures  Greatly speeds virus and malware scanning, freeing up computer resources for productive tasks  Computationally efficient at detecting previously unknown threats  Previously unknown files naturally receive a low reputation score  Like how new borrowers like teenagers begin with a low credit score  File used by more users for longer periods of time with no observed malicious effects  Reputation score of the file keeps improving  Like how borrowers improve credit ratings through responsible borrowing

Overview 46  Password Management  Access control lists (ACLs)  Firewalls and their capabilities  Intrusion Detection/Prevention Systems  Patching operating systems and Applications  End Point Protection  Information security control best practices