190 likes | 420 Views
A Basic Introduction to Computer Security. John H. Porter University of Virginia Department of Environmental Sciences. Achieving Absolute Computer Security. There is only one method that can assure absolute security for the data and programs on your computer
E N D
A Basic Introduction to Computer Security John H. Porter University of Virginia Department of Environmental Sciences
Achieving Absolute Computer Security • There is only one method that can assure absolute security for the data and programs on your computer • Unplug it from the power outlet!!!
The Bad Guys • Trojan Horses • Software that does other things than it says it does – often malicious • Worms • Attempt to circumvent controls on network access • Viruses • Attempt to modify programs on your computer to add malicious code
The Bad Guys • Sniffers • Tap network lines to capture data and passwords • Thieves • Stolen computers • Bad Luck • Floods, fire, lightning, power surges
Achieving Relative Security • Backups • Boundary Defense • Defense on the homefront
Backups • All computers will, at some point, experience a security breach • Backups let you recover lost data • Off-site backups protects you against data loss due to violations of physical security • Try getting your data back off a stolen or burned hard drive!
Boundary Defense • Boundary defenses focus on keeping malicious users or programs from having access to files on your computer • Passwords • Control of Internet Ports • Restricting ways files may be stored on your computer
Passwords • Not all passwords are created equal – some are easier to crack • Ones based on publically available information about you (e.g., your name) • Passwords based on dictionary rules • Passwords that are too short or use repeating characters
Strong Passwords • One easy way to create strong passwords is to take the first letter off each word in a sentence and add some punctuation • E.g., Iwtbot, - “It was the best of times,” • 2b,ON2b – “To Be, or Not to be” • Also, varying capitalization can help • JHwaPDM!
Protecting Passwords • Even the most “secure” password is vulnerable if communication lines are compromised • E.g., “sniffers” • Use of encrypted connections (ssl, https) can eliminate or greatly reduce this risk
Know What You are Sharing • Your computer provides a number of Internet Ports • You want to eliminate access to ports that are not serving a legitimate purpose • You can test at sites like ShieldsUp: https://grc.com/x/ne.dll?bh0bkyd2 Not all access is bad, but you want to KNOW what is exposed!
Limit the Places that can Access your Computer • Most SQL databases support restricting access to particular network domains, or even individual machines • If your web and database servers are on the same host, you may be able to eliminate ALL network access to the database, since all interactions are mediated by your web server
Keep your Eyes Open! • Just as you would not walk down a darkened alley without paying attention to your surroundings, you need to be alert to strange computer behaviors that may indicate a security problem • Check your software support pages frequently for news about vulnerabilities and fixes
Defense on the Homefront • Limit access of your computer to trusted individuals • Usually not too much trouble at field stations • Is especially an issue for web pages that contain DBMS login information in free text • Get a good virus checker and update it frequently (daily if possible, at least weekly)
Defense on the Homefront • Keep updates to Windows current • As security holes are detected, fixes will become available • Windows provides for automatic updates • Recent worms (e.g., Blaster) utilized a flaw in the RPC module of Windows to infect large numbers of otherwise protected computers before a fix was available
Protecting the Homefront • Monitor your logs to detect attempts to attack your system • Window’s Events logs • Web server logs • Exercise good judgment on downloading files • Every file downloaded is a potential security intrusion
Security is Relative • Security is always relative, but it is possible to create a reasonable level of security • The more obscure a resource is, either because it uses “unusual” software or is inconspicuous on the web, the less likely someone is to try to break into it
Useful Places to Look • http://www.cert.org/ - Computer Emergency Response Team • http://grc.com/default.htm - home of ShieldsUp and others • http://www.sarc.com/ - Symantec anti-virus site • http://guide.vsnl.net.in/tcpip/columns/security_internet/index.html - a general guide to Internet Security issues