Operating Systems Security

Slides:



Advertisements
Similar presentations
1 Identification Who are you? How do I know you are who you say you are?
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Free Wi-Fi Zone. Detail Process of Free Wi-Fi Access Switch on Wi-Fi setup on your Wi-Fi enabled Device like Cell Phone, Tablet PC, Laptop & search for.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
BUSINESS B1 Information Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
A secure internet site that allows posts access to their Legion and SAL membership.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Online Parking System.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Welcome Topic : Security.
Lesson 20. E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002.
Networking Network Classification, by there: 3 Security And Communications software.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Step 1 Remove the wifi Network which is already connected.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
CPT 123 Internet Skills Class Notes Internet Security Session B.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
LO2 Understand the key components used in networking.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Assignment 3 Jacob Seiz. Hub A hub provides a central access point for a network. Through multiple I/O ports a hub can connect multiple Ethernet devices.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Security Methods and Practice CET4884
What this activity will show you
Transfer of data in ICT systems
What is a Firewall?.
 Xfinity is an American based company  Xfinity is basically a telecommunication company  They provide network services to the people of America  Xfinity.
Computer Data Security & Privacy
Authentication.
Using a Computer Network
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Network Security Unit-VI
NORTON.COM/MYACCOUNT – LOGIN | MANAGE OR SETUP NORTON ACCOUNT norton.com/setup - Norton Setup is a process to install and activate norton antivirus on.
NORTON.COM/MYACCOUNT – LOGIN | MANAGE OR SETUP NORTON ACCOUNT norton.com/setup - Norton Setup is a process to install and activate norton antivirus on.
NORTON.COM/MYACCOUNT – LOGIN | MANAGE OR SETUP NORTON ACCOUNT norton.com/setup - Norton Setup is a process to install and activate norton antivirus on.
NORTON.COM/MYACCOUNT – LOGIN | MANAGE OR SETUP NORTON ACCOUNT norton.com/setup - Norton Setup is a process to install and activate norton antivirus on.
Taewan kang, Kevin huangfu
Registering on the SITE is a MULTI-STEP process:
Firewalls Jiang Long Spring 2002.
What you will need to Register
ECA – Endpoint Context Agent
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
I will… only people I know or my teacher has approved of.
FIREWALL.
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Computer Security (Summary)
Protection Mechanisms in Security Management
Computer Security Damian Gordon.
Presentation transcript:

Operating Systems Security DMM Physical Authentication Types DMM

Protection systems for computer operating systems Authentication One Time passwords Firewalls Operating Systems Security DMM

Authentication Operating System generally identifies/authenticates users in the following ways: Username / Password User card / key User attribute Fingerprint eye retina pattern signature Physical Authentication Types DMM

One Time passwords A One Time unique password is required every time user tries to login into the system. Physical Authentication Types DMM

Implementing One time passwords. Random numbers Users are provided cards having numbers printed along with corresponding alphabets. Secret key User are provided a hardware device which can create a secret id mapped with user id. System asks for such secret id which is to be generated every time prior to login. Network password Some commercial applications send one time password to user on registered mobile/ email which is required to be entered prior to login. Operating Systems Security DMM

Firewalls Firewalls are software programs or hardware devices that filter the traffic that flows into you PC or your network through a internet connection. Firewalls can also be tuned to follow "rules“ Rules that decide who can connect to the internet, what kind of connections can be made, which or what kind of files can be transmitted in or out Operating Systems Security DMM

Operating Systems Security DMM PCPro October 2012 Operating Systems Security DMM

Operating Systems Security DMM