Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
LittleOrange Internet Security an Endpoint Security Appliance.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Enterprise Network Security Accessing the WAN Lecture week 4.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hacker Zombie Computer Reflectors Target.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Chapter 9: Novell NetWare
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Small Business Security Keith Slagle April 24, 2007.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Two Types of Software.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Windows Administration How to protect your computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
What they are and how to protect against them
Lecture 1-Part 2: Operating-System Structures
Discovering Computers 2012: Chapter 8
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 6 Application Hardening
CompTIA Server+ Certification (Exam SK0-004)
Security in Networking
Lesson 16-Windows NT Security Issues
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Presentation transcript:

Securing a Host Computer BY STEPHEN GOSNER

Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include  Servers  Clients(including mobile phones)  Routers(including home access routers)  Firewalls  Securing a Host  Numerous protective measures

Securing a Host  Host Hardening -The process of protecting a host against attacks.  Not consisted of a single protection  Consists of a number of protections that often have little in common with each other.  Protections include:  Back up the host regularly **(High Priority)  Restrict physical access to the host.  Encrypt data if appropriate.

Securing a Host  Host Protections cont. :  Install the operating system with secure configuration options.  Replace all default passwords with strong passwords.  Install and configure a host firewall.  Install and maintain patches for known operating system vulnerabilities.  Manage users and groups along with their access permissions.  Install and maintain an antivirus protection software.

Operating Systems  With built-in security features, operating systems play a key role in Host Security.  Operating systems allow you to create and set passwords for user accounts.  The operating system has a system administrator account that a user/owner can use to manage access permissions, passwords, and security features to help secure the computer system.  Different operating systems provide different tools and interfaces, each with their own pros and cons.

Operating Systems  Microsoft’s server operating system  Windows Server  Early versions, such as Windows Server NT had poor security.  Later versions, such as Windows Server 2008, are much more secure.  Pros:  Makes the installation of patches very simple, as they are usually automatic.  Includes server software firewalls, the ability to encrypt data, and much more.  Minimizes the number of running applications and utilities.

Operating Systems Windows Server:  Cons:  Windows systems are the most attacked systems on the internet.  It is important that system and application updates are done regularly before connecting to the internet.  It is also important to configure a current antivirus protection software with all Windows systems due to its high attack rate.

Operating Systems  Unix Servers:  Unix is a popular operating system for the largest servers.  Broad functionality  High reliability  Unix is not a single operating system, but contains many different versions.  Generally run the same applications.  Compatible with other versions in the kernel(core part) of the operating system.

Operating Systems Linux: ◦The most popular version of Unix, for PC’s. ◦Desirable because it’s free. ◦A single copy of Linux may be installable on multiple servers. ◦Linux contains only the kernel of Unix, and packaged with many other programs. Cons: ◦May require more labor to administer. ◦The many different versions make this operating system difficult to harden.

Operating Systems  Key Procedures when configuring Windows and LINUX Server’s  Disable the guest account.  Configure an update method to install and update patches regularly.  Disable any unused or unwanted services.  Verify appropriate local security settings.  Ensure that the Windows Firewall is on and the settings are configured.  Choose strong passwords for any and all accounts associated with Administrator privileges.

Vulnerabilities and Patches  Vulnerabilities:  Security weaknesses that open a program to attack.  Vulnerability finders search for these weaknesses in order to create fixes.  Occasionally vulnerability information is leaked and exploit programs are created to take advantage of it.  Testing  Attempts to find any weaknesses in a firm’s protection suite befor hackers do.  Fixes  Work-Arounds  Series of manual steps the systems administrator must take to fix the problem.

Vulnerabilities and Patches  Patches  Small program that fixes a particular vulnerability  Service Packs  Vulnerability fixes and sometimes functionality improvements combined into a single large update.  Version Upgrades  Software upgrade to newer version  Often fixes vulnerabilities and contains improved security features.

Firewalls  Firewall  Provides protection against outside attackers by controlling the network traffic.  Two major forms of firewalls  Hardware- aka network firewalls  Software- typically built within OS  Hardware firewalls are separate devices that run on their own operating system  Software firewalls are built within your OS which give added security, but not as effective as hardware firewalls.  Hardware firewalls are more costly.

Antivirus  Antivirus and Spyware Software  Computer software used to prevent, detect, and remove malicious software.  Originally developed to detect and remove computer viruses.  Modern antivirus software is able to protect your computer from Browser Helper Objects, browser hijackers, ransomware, keyloggers, backdoors, rootkits, Trojan horses, worms, and much more.  Should be turned on at all times, especially when connected to the Internet.  Should be updated and ran daily for best overall performance.  Subscription should also be renewed yearly for new virus, spyware, and malware protections.

Conclusion In conclusion, there are many different strategies to securing a host computer. There is no one-answer, and all necessary precautions should be taken to ensure overall protection. While there is no guarantee to prevent your computer from being attacked, these strategies can and should be taken to ensure the security of a host computer.