50 likes | 133 Views
Computer Security Workshops. Summary – Workshop 1. Review. We have examined the following: How attackers and defenders can gain information for their own purposes Names and IP addresses Users / Passwords Ports / Services
E N D
Computer Security Workshops Summary – Workshop 1
Review • We have examined the following: • How attackers and defenders can gain information for their own purposes • Names and IP addresses • Users / Passwords • Ports / Services • How attackers and defenders can identify vulnerabilities on computer systems
Defensive Use of This Material • Identify weaknesses in computer systems • Exposed ports / services • Bad passwords • Unused accounts • Remove those weaknesses • Remove unneeded services (more later) • Ensure active services are secure (more later) • Prevent bad passwords from being used • Remove unused accounts
More To Be Done… • How do we apply this in a systematic way to harden a computer system and ensure system security? • If an attacker does get in, how can we detect that intrusion? • How can we respond to attacks? • How do we attempt to ensure a successful attacker can’t get in again using the same exploit? • Workshop Part 2
Evaluation • Sheets to be distributed for workshop evaluation