Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.

Similar presentations


Presentation on theme: "Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation."— Presentation transcript:

1 Bay Ridge Security Consulting (BRSC)

2 Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation of back doors Installation of trojan horses Mail worm propagation Mail relay exploitation

3 Key steps to securing host system  Install operating system updates  Protect passwords  Protect files and directories  Encryption  Monitoring security of system Log files

4 Physical Security  Hardware locks Keyed entry locks, privacy locks, patio locks, passage locks, standard keyed entry lock, deadbolt lock, cipher locks  Proximity Readers  Access List  Mantraps  Video Surveillance  Fencing

5 Hardware Security  Cable lock  Place in a safe  Locking cabinets Mobile Device Security  Remote wipe/sanitation  GPS tracking  Voice encryption

6 Secure Operating System Software  Develop the security policy  Perform host software baselining  Configure operating system security and settings  Deploy the settings  Implement patch management

7 Anti-Malware Software  Anti-Virus Examine computer for infections Monitors PC recent activities Scan new documents  Performed when files opened, created, or closed

8 Anti-Virus Software cont.  If virus found Cleaning file of virus Quarantining infected file Deleting file

9 Anti-Malware Software cont.  Anti-Spam Filtering software ○ Works with e-mail server Technique called Bayesian filtering ○ Divides email messages into spam and not- spam piles ○ Analyzes each word in each email ○ Traps higher percentage of spam then other techniques

10 Anti-Spam cont.  Filtering Spam Black list ○ List of senders not to receive e-mails from White list ○ List to receive e-mails from Block e-mails from entire countries or regions

11 Anti-Malware Software cont.  Pop-up blockers Pop-up: small browser appears when other web sites being viewed. ○ Created by advertisements Separate program or included feature Stops pop-up advertisements from showing  Anti-spyware Helps prevents computers from becoming infected by different spyware

12 Pop-up blockers & Anti-Spyware Cont.  Pop-up blockers part of package known as anti-spyware  Similarities Regularly update Continuous, real-time monitoring Perform complete scan of entire computer at one time Trap variety of malware

13 Anti-Malware Software cont.  Firewalls Help stop malicious packets from entering/leaving system Software or hardware based Filters incoming/outgoing traffic Inclusive or exclusive Improve services running

14 Sources  “Securing the Host”. Etutorials. 2008-2012. Web. 30 Oct. 2012. http://etutorials.org/Linux+systems/red+hat+linux+9+professi onal+secrets/Part+IV+Managing+Red+Hat+Linux/Chapter+2 2+System+and+Network+Security/Securing+the+Host/  Ciampa, Mark. Ph.D. Security+ Guide to Network Security Fundamentals. 4th ed. United States of America: Course Technology, Cengage Learning, 2012. Print. 30 Oct. 2012

15 Sources cont  “Securing Your Host”. Department of Computer Science. The University of Texas at Austin. 2012. Web. 30 Oct. 2012. https://www.cs.utexas.edu/facilities/documentation/secure- hosts  Barbish, J. Joseph “Firewall Concepts”. Free BSD Handbook. Web. 30 Oct. 2012. http://www.freebsd.org/doc/en_US.ISO8859- 1/books/handbook/firewalls-concepts.html


Download ppt "Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation."

Similar presentations


Ads by Google