Welcome to all Participants

Slides:



Advertisements
Similar presentations
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Security+ Guide to Network Security Fundamentals
Chapter 7 HARDENING SERVERS.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Potions of Protection Server Security. What does that do again? Familiarity Differing levels of protection –Low, does not exist –Medium, No private data.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Microsoft Technology Associate
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Understanding Security Layers
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Module 14: Configuring Server Security Compliance
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Note1 (Admi1) Overview of administering security.
Operating System Security Fundamentals Dr. Gabriel.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
Chapter 2 Securing Network Server and User Workstations.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
CyberPatriot: Operating System Security Overview 9/31/10 Joshua White Director of CyOON R&D Adam Pilbeam Lead Network Engineer
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Module 5: Designing Physical Security for Network Resources
Securing Network Servers
CSCE 548 Student Presentation By Manasa Suthram
Risk management.
Operating System Security
Working at a Small-to-Medium Business or ISP – Chapter 8
Configuring Windows Firewall with Advanced Security
Security and Encryption
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understanding Security Layers
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Vulnerability Scanning With 'lynis'
Security in Networking
I have many checklists: how do I get started with cyber security?
Level 2 Diploma Unit 11 IT Security
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Chapter 27: System Security
BCS ISSG Linux Day Securing Linux
IS4680 Security Auditing for Compliance
Lesson 16-Windows NT Security Issues
County HIPAA Review All Rights Reserved 2002.
12 STEPS TO A GDPR AWARE NETWORK
Operating System Security
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Managing the IT Function
Designing IIS Security (IIS – Internet Information Service)
Convergence IT Services Pvt. Ltd
Presentation transcript:

Welcome to all Participants Workshop on Server Hardening

Today Highlights Redhat Linux 7 Installation (Dual Booting) Server Hardening - Security overview - Vulnerability Assessment - Linux Server Hardening Security Tips - Compliance and Frameworks 

Computer security also known as cyber security or IT security, is the protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.

Computer security Confidentiality Integrity Availability

Security Controls Physical Technical Administrative Computer security is often divided into three distinct master categories, commonly referred to as controls: Physical Technical Administrative

Physical Controls Closed-circuit surveillance cameras Motion or thermal alarm systems Security guards Picture IDs Locked and dead-bolted steel doors Biometrics (includes fingerprint, voice, face, iris, handwriting, etc)

Technical Controls Encryption Smart cards Network authentication Access control lists (ACLs) Tips and Tricks

Administrative controls Training and awareness Disaster preparedness and recovery plans Personnel recruitment and separation strategies Personnel registration and accounting

Vulnerability Assessment Assessment and Testing - Outside Looking - Inside Looking

Vulnerability Assessment Tools - Nmap - Nessus - OpenVAS - Nikito - Lynis

Linux Server Hardening Security Tips Encrypt Data Communication scp, ssh, sftp, rsync. SSL for apache etc Avoid Using FTP, Telnet

Linux Server Hardening Security Tips Minimize Software to Minimize Vulnerability Disable Unwanted Services Find Listening Network Ports Delete X Windows

Linux Server Hardening Security Tips One Network Service Per System or VM Instance

Linux Server Hardening Security Tips Keep Linux Kernel and Software Up to Date Selinux Configure Iptables and TCPWrappers Linux Kernel /etc/sysctl.conf Hardening

Linux Server Hardening Security Tips User Accounts and Strong Password Policy Password aging  Locking User Accounts After Login Failures

Linux Server Hardening Security Tips Securing SSH Login Disable remote root login Use of PAM Change default port Port Knocking

Linux Server Hardening Security Tips Separate Disk Partitions Disk Quotas

Linux Server Hardening Security Tips Use A Centralized Authentication Service Kerberos

Linux Server Hardening Security Tips Logging and Auditing Monitor Suspicious Log Messages With Logwatch / Logcheck System Accounting with auditd

Linux Server Hardening Security Tips Install And Use Intrusion Detection System Disable USB/firewire/thunderbolt devices Use fail2ban/denyhost as IDS (Install an Intrusion Detection System)

Linux Server Hardening Security Tips Use A Centralized Authentication Service Kerberos

Linux Server Hardening Security Tips Backup Log Server Physical server security

Compliance and Framework

Thank You