How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Mr C Johnston ICT Teacher
System Security Scanning and Discovery Chapter 14.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
IT:Network:Microsoft Applications
Internet safety By Lydia Snowden.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
eScan Total Security Suite with Cloud Security
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Module 14: Configuring Server Security Compliance
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
NetTech Solutions Protecting the Computer Lesson 10.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Security By Duncan Hall.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Securing Network Servers
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Instructor Materials Chapter 7 Network Security
IBM Software Group | Tivoli Brand Software
Information Security Awareness
Operating System Security
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

How to Mitigate Stay Safe

Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure Viruses and worms usually attack known vulnerabilities Hackers can easily attack systems that have not been patched

Patching For Windows systems and Microsoft applications Can be automatically downloaded and installed For Windows, configure Automatic Updates program Click Start -> Settings -> Control Panel -> Automatic Updates Use Windows Update to find latest patches Click Start -> All Programs -> Windows Update Install manually from For specific applications, visit vendor websites to check for updates Utilize websites showing the latest patches Monitor websites with vulnerability alerts

Patching Linux Patches are also known as “packages” Package Managers GUI used to keep OS and applications up to date Used to install, uninstall, search for, or update packages Command Line interface (CLI) Download the source for every out of date program, then compile and install If a program had any dependencies, you have to hunt down the dependency Use the “apt-get” command or “yum” depending on distro Unix Solaris Command line (pkgadd, pkgrm, pkginfo) HP-UX Software Package Builder (SPB) – provides both GUI and CLI

Patching Keep in mind when patching in high availability environments Make sure patch is relevant Keep patch level consistent on all servers Test patches before applying to avoid the ‘fix’ breaking another business critical function Have a backup plan in place Back up your system prior to patching so you can restore if necessary

Anti-virus Software Anti-virus Software that can detect and block malware before it infects your computer Looks for patterns based on the signatures, or definitions, of known viruses Must be kept up to date New viruses appear daily therefore signature database must be updated on a regular basis Use to scan your system either manually or automatically Scan file system of the computer Scan attachments, downloaded documents, cds, usb drives, etc. before opening or using them Anti-virus software packages are discussed in the ‘Threats and Vulnerabilities’ module

Spyware Malware installed on a system that collects information about users without their knowledge Tracks users’ Internet activity for marketing purposes May use cookies in your Internet browser to track May cause added CPU activity, disk usage and network traffic on a system Detect and remove Anti-spyware programs Stand alone or additions to anti-virus software Provide real time protection or detect and remove existing spyware Scans the windows registry and files and removes those that match signature files Keep signature database up to date

Auditing Audit regularly Setting up audit policies is critical to the security of an organization’s assets (Remember policies set up in Windows and Unix Modules) Helps you measure the adequacy and effectiveness of controls in place Auditable items Users Permissions, activities Files and Objects Accessibility Manipulation Integrity Logs Captures defined events and activity

Monitoring Monitor Systems can be monitored for all kinds of things provided logs are stored and accessible Logs will show activities in regards to the following (**Logs capture events based on the policies set up in Windows and Unix Modules) Users Violating security policies, attempting unauthorized access Files and Objects Monitor access by unauthorized users Monitoring on a regular basis ensures confidentiality, integrity, availability and authenticity

Vulnerability Assessment Vulnerability “A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy. “ - National Institute of Standards and Technology Vulnerability Assessment Identify potential vulnerabilities and evaluate the effectiveness of various security controls implemented within the infrastructure Regularly run a network scan to identify infrastructure gap and non hardened devices Run a vulnerability scanner on a regular basis

Tools Vulnerability Scanners A tool that scans devices for vulnerabilities such as allowing unauthorized access to sensitive data, misconfigurations, default passwords not changed, etc. Types Host based Tool scans an individual computer for vulnerabilities Network based Tool scans network for vulnerabilities Database Scans for vulnerabilities in the database server(s)

Tools Vulnerability Scanners Netstat This tool is used on the local host to identify its open ports Command within Unix and Windows Superscan (Port Scanner) A freeware tool for Windows which will perform a UDP and TCP port scan Nessus Free for personal use in a limited “home” license Internet Security Scanner (ISS) A network security scanner that can be used for Windows

Tools Vulnerability Scanners (more) Microsoft Baseline Security Analyzer (MBSA) Evaluates a system’s configuration and provides a report with specific recommendations to improve security. Also recommends missing hotfixes and configuration changes. This should be run regularly to check for new vulnerabilities. RPCDump (rpcdump.exe) This tool helps determine which RPC services have which ports open Fport A great tool from used to scan the system to see what is openwww.foundstone.com Security Auditor's Research Assistant (SARA) A tool derived from the infamous (at least in 1995) SATAN scanner Last release date was May 2009 (

Perform a Scan First, be certain you have permission to scan network or hosts Choose a tool Discover your network devices (servers, firewalls, applications, etc.) Know the IP address range you want to scan Prioritize your assets Critical to non-critical Identify vulnerabilities Run a scan using the tool Analyze threats You may choose to accept the risk rather than remediate a vulnerability due to a valid business reason Remediate Apply patches, turn off services, etc. Eliminate your vulnerabilities Run your scan again to make sure your vulnerabilities no longer exist

Perform a Scan Examples and ‘how to’ Scans in Nessus: Scan using Fport: Simple scan using Kaspersky:

Protective Measures Examples of Protective Security Measures per SANS Access controls User IDs and passwords, appropriate password and security policies, separation of duties User authentication, with appropriate use of controls, where possible (e.g.,smart cards), biometrics, etc. Workstation lock screens Encryption Proper registry permissions Proper directory and file permissions Properly defined user rights Social engineering prevention Applying patches/updates Firewalls VPN tunneling Screening routers

Protective Measures More examples of Protective Security Measures per SANS Anti-virus software Prompt removal of terminated/transferred employee accounts, default passwords, and unnecessary services running on the system Implementing and enforcing change control policy to limit activity to authorized users only Review and management signoffs of user authorizations Use of checksums with attendant software to report file modifications Enable audit logging and perform log reviews Review of open ports and services Properly configured routers Searching for and disconnecting unauthorized or poorly configured modem services

List of References bility-assessment_421 can.htm ml