Chapter 28: User Security

Slides:



Advertisements
Similar presentations
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #25-1 Chapter 25: User Security Policy Access Files, devices Processes Electronic.
Advertisements

HIPAA Security.
File Server Organization and Best Practices IT Partners June, 02, 2010.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #28-1 Chapter 28: User Security Policy Access Files, devices Processes Electronic.
The Internet. Telnet Telnet means using your computer as a terminal. All commands you type are sent to the host computer you are connected to and executed.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential Document.
CPSC203 Introduction to Computers Lab 69 By Jie Gao.
Week #7 Objectives: Secure Windows 7 Desktop
Controlling Files Richard Newman based on Smith “Elementary Information Security”
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G L03 - Design, Implement, and Manage FactoryTalk Security.
Module 7 Planning and Deploying Messaging Compliance.
Chapter 2 Securing Network Server and User Workstations.
ONE® Pages Training Presentation North York General Hospital.
Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Chapter 8 File System Security. File Protection Schemes Password-Based Protection Encryption-Based Protection Protection-Based on Access Permission.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Chapter 15: Access Control Mechanisms Dr. Wayne Summers Department of Computer Science Columbus State University
Binghamton University Dual Diploma Shipping Steps 1.Student requests materials that need to be shipped 2.Dual Diploma will create a user id so that Student.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 24: Auditing Dr. Wayne Summers Department of Computer Science Columbus State University
CLINIC-LAB COMMUNICATION Configuring 3Shape Communicate™
8 – Protecting Data and Security
Setting up FTP for CAST Click on Manage Sites
Training Objectives About D2F Download Installation Configuration
Chapter One: Mastering the Basics of Security
Chapter 28: User Security
Configuring Windows Firewall with Advanced Security
Chapter 5 : Designing Windows Server-Level Security Processes
Chapter 11: Managing Users
Chapter 2: System Structures
Chapter 8 File Security.
Module 8: Securing Network Traffic by Using IPSec and Certificates
IS3440 Linux Security Unit 3 User Account Management
Advanced System Security
Chapter 14: Representing Identity
Design Principles. Design Principles Simplicity is important.
ONE® Pages Training Presentation
Chapter 26: Network Security
Chapter 27: System Security
Ch. 11 – Cipher Techniques Dr. Wayne Summers
Chapter 19: Building Systems with Assurance
Chapter 17: Confinement Problem
Chapt. 10 – Key Management Dr. Wayne Summers
Setting up and using secure and document transfer
CSCI The UNIX System Shell Startup and Variables
Chapter 28: User Security
Lesson 2: Epic Security Considerations
Administering Your Network
Security and File Permission
Installation & User Guide
Chapter 22: Malicious Logic
Lesson 2: Epic Security Considerations
Module 8: Securing Network Traffic by Using IPSec and Certificates
Chapter 29: Program Security
Advanced System Security
Chapter 9: Managing Groups, Folders, Files, and Object Security
Access Permission and Protection mode
Lecture 4: File-System Interface
Presentation transcript:

Chapter 28: User Security Dr. Wayne Summers Department of Computer Science Columbus State University Summers_wayne@colstate.edu http://csc.colstate.edu/summers

Policy U1 - Only users have access to their accounts U2 - No other user can read / change a file without the owner’s permission U3 - Users shall protect the integrity, confidentiality, and availability of their files U4 - Users shall be aware of all commands that they enter, or that are entered on their behalf

Access Passwords Generate random passwords where possible Keep passwords secure Use proactive password checking program Login Procedure Trusted hosts Leaving System Screen locking program

Files and Devices Files File Permissions on Creation (use templates) Group Access (default deny) File Deletion (aliases, persistence) Devices Writeable Devices Smart Terminals Monitors and Window Systems

Processes Copying & Moving Files (different permissions) Accidentally Overwriting Files (confirmation) Encryption, Cryptographic Keys, and Passwords .netrc file for ftp Start-up Settings (trust start-up info) Limited Privileges Malicious Logic search path: should include only trusted directories

Electronic Communications Automated Electronic Mail Processing Execution of attachments Failure to Check Certificates Sending unexpected content Attachments to email