150 likes | 262 Views
Bay Ridge Security Consulting (BRSC). Securing your system. Importance in Securing System. If don’t keep up with security issues or fixes Exploitation of root access Installation of back doors Installation of trojan horses Mail worm propagation Mail relay exploitation.
E N D
Bay Ridge Security Consulting (BRSC) Securing your system
Importance in Securing System • If don’t keep up with security issues or fixes • Exploitation of root access • Installation of back doors • Installation of trojan horses • Mail worm propagation • Mail relay exploitation
Key steps to securing host system • Install operating system updates • Protect passwords • Protect files and directories • Encryption • Monitoring security of system • Log files
Physical Security • Hardware locks • Keyed entry locks, privacy locks, patio locks, passage locks, standard keyed entry lock, deadbolt lock, cipher locks • Proximity Readers • Access List • Mantraps • Video Surveillance • Fencing
Hardware Security • Cable lock • Place in a safe • Locking cabinets Mobile Device Security • Remote wipe/sanitation • GPS tracking • Voice encryption
Secure Operating System Software • Develop the security policy • Perform host software baselining • Configure operating system security and settings • Deploy the settings • Implement patch management
Anti-Malware Software • Anti-Virus • Examine computer for infections • Monitors PC recent activities • Scan new documents • Performed when files • opened, created, or closed
Anti-Virus Software cont. • If virus found • Cleaning file of virus • Quarantining infected file • Deleting file
Anti-Malware Software cont. • Anti-Spam • Filtering software • Works with e-mail server • Technique called Bayesian filtering • Divides email messages into spam and not-spam piles • Analyzes each word in each email • Traps higher percentage of spam then other techniques
Anti-Spam cont. • Filtering Spam • Black list • List of senders not to receive e-mails from • White list • List to receive e-mails from • Block e-mails from entire countries or regions
Anti-Malware Software cont. • Pop-up blockers • Pop-up: small browser appears when other web sites being viewed. • Created by advertisements • Separate program or included feature • Stops pop-up advertisements from showing • Anti-spyware • Helps prevents computers from becoming infected by different spyware
Pop-up blockers & Anti-SpywareCont. • Pop-up blockers part of package known as anti-spyware • Similarities • Regularly update • Continuous, real-time monitoring • Perform complete scan of entire computer at one time • Trap variety of malware
Anti-Malware Software cont. • Firewalls • Help stop malicious packets from entering/leaving system • Software or hardware based • Filters incoming/outgoing traffic • Inclusive or exclusive • Improve services running
Sources • “Securing the Host”. Etutorials. 2008-2012. Web. 30 Oct. 2012. http://etutorials.org/Linux+systems/red+hat+linux+9+professional+secrets/Part+IV+Managing+Red+Hat+Linux/Chapter+22+System+and+Network+Security/Securing+the+Host/ • Ciampa, Mark. Ph.D. Security+ Guide to Network Security Fundamentals. 4th ed. United States of America: Course Technology, Cengage Learning, 2012. Print. 30 Oct. 2012
Sources cont • “Securing Your Host”. Department of Computer Science. The University of Texas at Austin. 2012. Web. 30 Oct. 2012. https://www.cs.utexas.edu/facilities/documentation/secure-hosts • Barbish, J. Joseph “Firewall Concepts”. Free BSD Handbook. Web. 30 Oct. 2012. http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls-concepts.html