180 likes | 308 Views
System Defense. Defending Home Networks. Introduction. Computer Security What it’s not Person, Place or Thing What it is Independent Of Network OS Of Host OS Of Application Process Achievable. Why Computer Security?. Data Integrity Confidentiality Availability Non Repudiation
E N D
System Defense Defending Home Networks
Introduction • Computer Security • What it’s not • Person, Place or Thing • What it is • Independent • Of Network OS • Of Host OS • Of Application • Process • Achievable
Why Computer Security? • Data Integrity • Confidentiality • Availability • Non Repudiation • Identification • Authentication
Identify Risk • Physical Access • Humans • Application Runtime • Browser • Email • IM • Network Access
Defend Yourself • Know your system • What it is • What’s on it • What Changes on it • Who is using it • Who can use it • Patch vulnerabilities
File System Physical Protection BIOS Password File Integrity Anti Virus Scanner File System Encryption
Host Defenses Host based Firewall Host based IDS Configuration Management Auditing Patch Maintenance IP Restrictions Backup
Application Defenses Configuration Patch Encrypt Auditing Access Control
LAN Defenses LAN Based IDS Ensure Hosts Authenticate Router Based ACL
WAN Defenses Firewall Implement NAT Router Based ACL Filter Both Directions
Resources • Firewalls • Linux • Back it up with an IDS • Tiny Firewall – www.tinysoftware.com • Zonelabs – www.zonelabs.com • Netscreen - www.netscreen.com
Resources • IDS • Port Sentry - www.psionic.com • Snort – www.snort.org • AracNIDS - http://www.whitehat.org
Resources • Configuration advice • Microsoft – www.microsoft.com/technet/treeview/default.asp?url=/technet/security/tools/tools.asp • Linux –www.cert.org/security-improvement/index.html • Benchmark – www.cisecurity.org
Resources • Vulnerability Awareness. • www.securityfocus.com - Bugtrak. • www.nessus.org – Nessus Scanner. • www.sans.org/top20.htm- SANS/FBI Top 20 Vulnerabilities. • www.cert.org - Carnegie Mellon CERT. • www.nipc.gov/warnings/computertips.htm - The National Infrastructure Protection Center. • Best Newsletter - http://www.neohapsis.com/. • http://www.cio.com/research/security.
Resources • Encryption • OpenPGP – www.openpgp.org • File integrity • MD5 • Tripwire - www.tripwire.com/products/linux/ • www.tripwire.org • Port Scanner - NMAP – www.nmap.org • AV Software - McAfee • Pest Patrol