CS/IS 196 Final Exam Review

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Security+ Guide to Network Security Fundamentals, Third Edition
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security+ Guide to Network Security Fundamentals, Third Edition
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Chapter Nine Maintaining a Computer Part III: Malware.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Our Digital World Second Edition
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
SEC835 Practical aspects of security implementation Part 1.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Information Systems Security Operations Security Domain #9.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Module 6: Designing Security for Network Hosts
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
CS/IS 196 Final Exam Review Final Exam: Wednesday, December 16.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
MIS323 – Business Telecommunications Chapter 10 Security.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Securing Information Systems
Information Systems Security
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter 6 Application Hardening
TECHNOLOGY GUIDE THREE
Intro to Information Assurance & Security
Securing Information Systems
Operationalizing MITS: How do we make this happen?
CompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501)
Chapter 10 Security and Control.
Malicious Software Network security Master:Mr jangjou
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 8
CHAPTER FOUR OVERVIEW SECTION ETHICS
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

CS/IS 196 Final Exam Review Final Exam: Wednesday, December 12

Final Exam Overview Chapters 13 through 25 Multiple Choice Similar to questions in the homework assignments. 50 questions You will have the full class time to complete

Chapter 13 Intrusion Detection Systems and Network Security IDS Components: Traffic collector Signature database User interface Host Based (active vs. passive) Advantages Disadvantages Network Based

Chapter 14 System Hardening & Baselines Baselining Sandboxing Antispam Egress Filtering Updates: Hotfix Patch Service pack

Chapter 15 Types of Attacks and Malicious Software Malware Spoofing War dialing War driving Trojan Logic Bomb Worm Buffer overflow

Chapter 16 E-mail and Instant Messaging Spam Email encryption PGP SMIME

Chapter 17 Web Components SSL Stripping Attack http and https FTP and SFTP SSL/TLS Cross-site scripting attack

Chapter 18 Secure Software Development Secure Development Lifecycle Phases Minimizing the attack surface (Design Phase) Database attacks SQL injection Spiral method Fuzz testing

Chapter 19 Disaster Recovery, Business Continuity, and Organizational Policies Alternate sites Hot Warm Cold RAID 1 (disk mirroring) 5 ( data spreading with parity ) Backups Full Differential Incremental Delta

Chapter 20 Risk Management Vulnerabilities Threat Vectors Qualitative risk assessment SLE, ARO, ALE Compute ALE given SLE and ARO ALE = SLE * ARO

Chapter 21 Change Management Least privilege Separation of duties Change management primary objective

Chapter 22 Incident Response Information Criticality Scanning Threats Remote Administration Trojan (Tool) (RAT) Data Minimization Quarantine

Chapter 23 Computer Forensics Software Bomb Disk/Drive Partition Free space Volatility of data CPU RAM Hard drive Kernel tables

Chapter 24 Legal Issues and Ethics Law Statutory Common Administrative Computer trespass CAN-SPAM Act Sarbanes-Oxley Act

Chapter 25 Privacy Freedom of Information Act (FOIA) Cookie cutter Country with poor privacy practices Family Education Records and Privacy Act of 1974 Data Destruction Shredding Degaussing Burning Wiping

The Final Exam Bring a #2 pencil and an eraser. Mr. Hodges will supply the scantron forms. Closed book, closed note, closed computer.

Questions Any Questions?