1 / 15

Securing your system

Bay Ridge Security Consulting (BRSC). Securing your system. Importance in Securing System. If don’t keep up with security issues or fixes Exploitation of root access Installation of back doors Installation of trojan horses Mail worm propagation Mail relay exploitation.

sawyer
Télécharger la présentation

Securing your system

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Bay Ridge Security Consulting (BRSC) Securing your system

  2. Importance in Securing System • If don’t keep up with security issues or fixes • Exploitation of root access • Installation of back doors • Installation of trojan horses • Mail worm propagation • Mail relay exploitation

  3. Key steps to securing host system • Install operating system updates • Protect passwords • Protect files and directories • Encryption • Monitoring security of system • Log files

  4. Physical Security • Hardware locks • Keyed entry locks, privacy locks, patio locks, passage locks, standard keyed entry lock, deadbolt lock, cipher locks • Proximity Readers • Access List • Mantraps • Video Surveillance • Fencing

  5. Hardware Security • Cable lock • Place in a safe • Locking cabinets Mobile Device Security • Remote wipe/sanitation • GPS tracking • Voice encryption

  6. Secure Operating System Software • Develop the security policy • Perform host software baselining • Configure operating system security and settings • Deploy the settings • Implement patch management

  7. Anti-Malware Software • Anti-Virus • Examine computer for infections • Monitors PC recent activities • Scan new documents • Performed when files • opened, created, or closed

  8. Anti-Virus Software cont. • If virus found • Cleaning file of virus • Quarantining infected file • Deleting file

  9. Anti-Malware Software cont. • Anti-Spam • Filtering software • Works with e-mail server • Technique called Bayesian filtering • Divides email messages into spam and not-spam piles • Analyzes each word in each email • Traps higher percentage of spam then other techniques

  10. Anti-Spam cont. • Filtering Spam • Black list • List of senders not to receive e-mails from • White list • List to receive e-mails from • Block e-mails from entire countries or regions

  11. Anti-Malware Software cont. • Pop-up blockers • Pop-up: small browser appears when other web sites being viewed. • Created by advertisements • Separate program or included feature • Stops pop-up advertisements from showing • Anti-spyware • Helps prevents computers from becoming infected by different spyware

  12. Pop-up blockers & Anti-SpywareCont. • Pop-up blockers part of package known as anti-spyware • Similarities • Regularly update • Continuous, real-time monitoring • Perform complete scan of entire computer at one time • Trap variety of malware

  13. Anti-Malware Software cont. • Firewalls • Help stop malicious packets from entering/leaving system • Software or hardware based • Filters incoming/outgoing traffic • Inclusive or exclusive • Improve services running

  14. Sources • “Securing the Host”. Etutorials. 2008-2012. Web. 30 Oct. 2012. http://etutorials.org/Linux+systems/red+hat+linux+9+professional+secrets/Part+IV+Managing+Red+Hat+Linux/Chapter+22+System+and+Network+Security/Securing+the+Host/ • Ciampa, Mark. Ph.D. Security+ Guide to Network Security Fundamentals. 4th ed. United States of America: Course Technology, Cengage Learning, 2012. Print. 30 Oct. 2012

  15. Sources cont • “Securing Your Host”. Department of Computer Science. The University of Texas at Austin. 2012. Web. 30 Oct. 2012. https://www.cs.utexas.edu/facilities/documentation/secure-hosts • Barbish, J. Joseph “Firewall Concepts”. Free BSD Handbook. Web. 30 Oct. 2012. http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls-concepts.html

More Related