1 / 18

A Basic Introduction to Computer Security

A Basic Introduction to Computer Security. John H. Porter University of Virginia Department of Environmental Sciences. Achieving Absolute Computer Security. There is only one method that can assure absolute security for the data and programs on your computer

shauna
Télécharger la présentation

A Basic Introduction to Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Basic Introduction to Computer Security John H. Porter University of Virginia Department of Environmental Sciences

  2. Achieving Absolute Computer Security • There is only one method that can assure absolute security for the data and programs on your computer • Unplug it from the power outlet!!!

  3. The Bad Guys • Trojan Horses • Software that does other things than it says it does – often malicious • Worms • Attempt to circumvent controls on network access • Viruses • Attempt to modify programs on your computer to add malicious code

  4. The Bad Guys • Sniffers • Tap network lines to capture data and passwords • Thieves • Stolen computers • Bad Luck • Floods, fire, lightning, power surges

  5. Achieving Relative Security • Backups • Boundary Defense • Defense on the homefront

  6. Backups • All computers will, at some point, experience a security breach • Backups let you recover lost data • Off-site backups protects you against data loss due to violations of physical security • Try getting your data back off a stolen or burned hard drive!

  7. Boundary Defense • Boundary defenses focus on keeping malicious users or programs from having access to files on your computer • Passwords • Control of Internet Ports • Restricting ways files may be stored on your computer

  8. Passwords • Not all passwords are created equal – some are easier to crack • Ones based on publically available information about you (e.g., your name) • Passwords based on dictionary rules • Passwords that are too short or use repeating characters

  9. Strong Passwords • One easy way to create strong passwords is to take the first letter off each word in a sentence and add some punctuation • E.g., Iwtbot, - “It was the best of times,” • 2b,ON2b – “To Be, or Not to be” • Also, varying capitalization can help • JHwaPDM!

  10. Protecting Passwords • Even the most “secure” password is vulnerable if communication lines are compromised • E.g., “sniffers” • Use of encrypted connections (ssl, https) can eliminate or greatly reduce this risk

  11. Know What You are Sharing • Your computer provides a number of Internet Ports • You want to eliminate access to ports that are not serving a legitimate purpose • You can test at sites like ShieldsUp: https://grc.com/x/ne.dll?bh0bkyd2 Not all access is bad, but you want to KNOW what is exposed!

  12. Limit the Places that can Access your Computer • Most SQL databases support restricting access to particular network domains, or even individual machines • If your web and database servers are on the same host, you may be able to eliminate ALL network access to the database, since all interactions are mediated by your web server

  13. Keep your Eyes Open! • Just as you would not walk down a darkened alley without paying attention to your surroundings, you need to be alert to strange computer behaviors that may indicate a security problem • Check your software support pages frequently for news about vulnerabilities and fixes

  14. Defense on the Homefront • Limit access of your computer to trusted individuals • Usually not too much trouble at field stations • Is especially an issue for web pages that contain DBMS login information in free text • Get a good virus checker and update it frequently (daily if possible, at least weekly)

  15. Defense on the Homefront • Keep updates to Windows current • As security holes are detected, fixes will become available • Windows provides for automatic updates • Recent worms (e.g., Blaster) utilized a flaw in the RPC module of Windows to infect large numbers of otherwise protected computers before a fix was available

  16. Protecting the Homefront • Monitor your logs to detect attempts to attack your system • Window’s Events logs • Web server logs • Exercise good judgment on downloading files • Every file downloaded is a potential security intrusion

  17. Security is Relative • Security is always relative, but it is possible to create a reasonable level of security • The more obscure a resource is, either because it uses “unusual” software or is inconspicuous on the web, the less likely someone is to try to break into it

  18. Useful Places to Look • http://www.cert.org/ - Computer Emergency Response Team • http://grc.com/default.htm - home of ShieldsUp and others • http://www.sarc.com/ - Symantec anti-virus site • http://guide.vsnl.net.in/tcpip/columns/security_internet/index.html - a general guide to Internet Security issues

More Related