Week 12 - Friday CS363.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Chief Technology Officer (CTO) Council
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Saving Your Business from a Data Loss Randy Clark.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Identify a few method to dispose of the hard drive of computers.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
New Data Regulation Law 201 CMR TJX Video.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Week 11 - Friday.  What did we talk about last time?  Security planning  Risk analysis  Security policies.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Information Systems Security Operations Security Domain #9.
1 Hardware Security AbdelRahman abu_absah Teacher: Dr. Sanaa al_sayegh.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Disaster Recovery and Business Continuity Planning.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Organizational Security Policies  Who can access which resources in what manner?  Security policy - high-level management document that informs all.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
The Problem YOU are responsible for confidential, mission- critical data... but.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Informational Safety Дилбарян Г. Л.. Protecting data from electronic invaders is one thing - but how to protect your data in the organization? The usual.
For more course tutorials visit
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Chapter 6 Protecting Your Files
Lesson 3 Computer Protection
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Chapter 8 – Administering Security
Lesson Objectives Aims You should be able to:
Safety Curriculum Project ChildSafe Putting A Lock On Safety!
Outline Properties of keys Key management Key servers Certificates.
Chapter 1 Getting Started
How to build a good reputation online
Data Management Solutions for a Modernized HIS
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Introduction to Computers
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Backup your Data © EIT, Author Gay Robertson, 2017.
Lesson 3 Computer Protection
Top 5 Hardware Issues And Troubleshoot By I FIX PC
LO2: Understand Computer Software
Lesson 3 Computer Protection
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Lesson 5 Computer-Related Issues
Part 3.
Guarding against loss of data
1.00 Examine the role of hardware and software.
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Week 12 - Friday CS363

Last time What did we talk about last time? Security planning Risk analysis Security policies

Questions?

Project 3

Bradley Levine Presents

Physical Security

Natural disasters Flood Fire Everything else Water is problematic, but usually there is some warning Hardware and software is replaceable Data often is not Backups should be made Critical hard drives should be marked so that they can be removed first Fire Fire is worse There is usually less time to react and the threat to humans is bigger Fire suppression systems for computing facilities should not use water Using CO2 or similar is good for computers but can kill humans Everything else Have contingency plans Insure physical assets Maintain off-site backups of critical data

Power issues Power loss Uninterruptible power supplies (UPS) Causes vary In some countries, multiple power losses per day are routine Uninterruptible power supplies (UPS) Stores energy when there is power so that you can keep your systems running when there isn't Consumer UPSs are usually batteries Not a good solution for a large data center Large scale solutions are kinetic storage systems or generators UPSs generally only give you enough time to save data and do a safe shutdown Surge suppressor Power is not constant and can have drops, spikes, and surges Surge suppressors are inexpensive and should be used for all computer power supplies If possible, computers should be disconnected from power (and from phone and other outside lines) during a thunderstorm

Human vandals Unauthorized access Theft Preventing access With networked systems everywhere, people eavesdropping on connections is easier Normal employees are also using computing resources for personal use Theft PCs, laptops, phones, PDAs, and portable media are easy to steal Preventing access Use a guard, a lock (traditional or swipe card) Preventing portability PCs can be locked to the desk Motion sensors to see when someone is where they shouldn't be Detecting theft RFID tags

Disposing of sensitive information Shredding paper documents Some kinds of tape can also be shredded High sensitivity data should be burned after shredding Overwriting magnetic data Deleting files does not stop digital forensics experts Data on disks should be overwritten many times with random patterns of 1s and 0s (burning) Degaussing Passing a disk through a magnetic field so intense that all data is lost Van Eck phreaking safeguards Many computer components emanate electromagnetic radiation that can be reconstructed Tempest is a government certification standard for blocking these emissions (meeting the standard can be expensive) An entire building (such as the NSA headquarters near DC) can be shielded in copper to protect emissions

Backups Everything should be backed up, always A complete backup covers the current state of all data Revolving backups keep the last few complete backups A selective (or incremental) backup stores only the files that have changed since the last backup Ideally, you should have an offsite backup of all your data in case of fire or flood Burning your critical data to a few DVDs and keeping them at home or school or vice versa is a good idea for you guys

Recovery Networked storage can allow for continuous offsite backups and make recovery easier If a computing center is destroyed or unusable, a cold site or shell is a facility with power and cooling where you can quickly rebuild a data center You have to supply the hardware A hot site has ready to run computer systems of the kind you might need You can pay a monthly fee to be ready to move into such a site at a moment's notice A kind of data availability insurance

Lockpicking

Locks Locks have been in use since ancient times and probably developed independently in the great ancient civilizations Locks you are likely to run into are: Warded locks Wafer tumbler locks Pin tumbler locks Combination locks

Warded locks Warded locks have existed since antiquity The shape of the key must be able to pass through and around wards, shapes that could block poorly made keys Warded locks provide poor security but are still used for sheds, cabinets, and other low security applications

Skeleton keys All warded locks have the problem that they can be defeated by a skeleton key, a key stripped down to only the part needed to turn the mechanism In popular culture, the term skeleton key is often misused to mean old style keys for warded locks in general

Wafer tumbler locks Wafer tumbler locks have better security than warded locks A series of wafers blocks the rotation of a plug When a key pushes each wafer up to an appropriate height, the plug is free to turn They are picked in the same way as a pin tumbler lock, but they are easier because you can't push them up too far and you can generally pick each wafer in sequence

Pin tumbler locks Most house locks, office locks, and many car locks are pin tumbler locks Pin tumbler locks are similar to wafer tumbler locks A series of two part pins blocks the rotation of the plug A key that pushes all the pins up to their shear lines will allow the plug to turn Pins that are too high or too low will block the plug Pin tumbler locks can offer relatively high security at a reasonable cost

Picking locks Picking a pin tumbler (or wafer tumbler) lock is done by manipulating each pin (or wafer) into the correct position It is impossible to machine a lock perfectly, thus, if you try to turn the plug, one pin will be holding more pressure than the others If you can push that pin up to the shear line, it will snap in place, and another pin will now be holding more pressure If you can move through all the pins without letting any drop, the plug will turn

Tools of the trade You must apply a constant steady turning pressure while picking a lock This pressure is supplied by a tension wrench The wrench is usually just an L-shaped piece of spring steel Picks are also pieces of spring steel with a tip that is good for manipulating pins Popular picks include hook, ball, half diamond, and other types A pick set with a tension wrench and broken key extractor can be bought for around $20 on the Internet

Combination locks Removing combination locks without knowing the combination is called bypassing the lock Some techniques rely on hearing or feeling clicks made when turning the cams, particularly when pressure is applied to the shank Multiple dial combination locks are vulnerable to this attack All combination locks can be bypassed by brute force (if you have the time) Many of the methods rely on the fact that low-security locks are engineered with several digits of play This play can be exploited for drastically reduced brute force times (usually still hours)

Quiz

Upcoming

Next time… Intellectual property Information law

Reminders Read Sections 11.1 and 11.2 Keep working on Project 3 Phase 1 Due next Friday