CIT 1100. In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Chapter Five Users, Groups, Profiles, and Policies.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Understand Database Security Concepts
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Issues and Challenges in Cloud Computing
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Maintaining and Updating Windows Server 2008
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Threats to I.T Internet security By Cameron Mundy.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Computer Security. Through your PC, a malicious person can gain valuable information About you and your habits Can steal your files Run programs that.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Troubleshooting Windows Vista Security Chapter 4.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3: Configuring File Access and Printers on Windows 7 Clients
CHAPTER 9 HARDENING SERVERS. C REATING A BASELINE POLICY Security parameters used to create a baseline installation can be configured using a Group Policy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Topic 5: Basic Security.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
CONTROLLING INFORMATION SYSTEMS
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Computer threats, Attacks and Assets upasana pandit T.E comp.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Information Systems Security
DATA SECURITY FOR MEDICAL RESEARCH
Unit 4 IT Security.
Lesson Objectives Aims You should be able to:
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Lesson 16-Windows NT Security Issues
Computer Security.
Bethesda Cybersecurity Club
Securing Windows 7 Lesson 10.
Designing IIS Security (IIS – Internet Information Service)
G061 - Network Security.
Presentation transcript:

CIT 1100

In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies

Threats to your data and PC come from two directions: accidents and malicious people  Accidents happen, and even well-meaning people can make mistakes  This chapter examines the following issues: ◦ Unauthorized access ◦ Social engineering ◦ Data destruction - accidental or deliberate ◦ Administrative access ◦ Catastrophic hardware failures ◦ Theft ◦ Viruses/spyware

Unauthorized access occurs when a person accesses resources without permission  Not all unauthorized access is malicious- this problem arises when users randomly poking around in a computer discover that they can access resources they shouldn’t  Unauthorized access becomes malicious when outsiders knowingly take advantage of weaknesses in your se­curity to gain information, use resources, or destroy data!  One way to gain unauthorized access is through intrusion  You might imag­ine someone kicking in a door and hacking into a computer, more often than not it's someone sitting at a home computer, trying various passwords over the Internet

Dumpster diving is the generic term for anytime a hacker goes through your refuse, looking for information which is also a form of intrusion  The amount of sensitive information that makes it into any organization's trash bin boggles the mind!  When it comes to getting information, the trash is the place to look!

Most of attacks that result in a loss of data come under the heading of social engineering, using people inside the networking environ­ment to gain access  Unauthorized information may be a network login, credit card numbers, company customer data­, social security numbers  It's common for social engineering attacks to be used together, if you discover one of them being used against your organization, it's a good idea to look for others

Hackers can physically enter your building under the guise of someone who might have a legitimate reason for being there  Dressing the part of a legitimate user with fake badge enables malicious people to gain access to locations and thus potentially your data  Following someone through the door is a very common method referred to as Tailgating

The telephone scam is a very common social engineering attack, the attacker makes a phone call to someone in the organization to gain information  Calling the help desk to acquire “forgotten” password information  Similar to telephone scams is a technique called Phishing, trying to acquire user names password or other secure information using

Data destruction means more than just intentionally or accidentally erasing or corrupting data  Authorized us­ers with access to certain data then uses that data beyond what they are authorized to do "If I wasn't allowed to change it, the system wouldn't let me do it!" is too often the response  Every operating system enables you to create user accounts and grant those accounts a certain level of access to files and folders in that computer  Administrator, supervi­sor, or root user, have full control over just about every aspect of the computer, be certain the people with this access are capable

You need to create redundancy in areas prone to failure (such as installing backup power in case of electrical failure) and perform those all- important data backups  Keep track of where you store the discs or hard drives used to back up your computer  Loss of backup materials can be truly catastrophic

 Once you've assessed the threats to your computers and networks, you need to take steps to protect those valuable resources  If you can control access to the data, programs, and other computing resources, you've secured your systems  Access control is composed of four interlinked areas: ◦ Physical security ◦ Authenti­cation ◦ Users and groups ◦ Security policies

The first order of security is to block access to physical hardware from people who shouldn't have access  Don't leave a PC unat­tended when logged in  If you see a user's computer logged in and unattended, lock the computer  To lock a computer press the WINDOWS LOGO KEY-L combination on the keyboard to lock the system the user must login to re- enter

Security starts with authentication, which is how the computer determines who can access it and what that user can do  There are two methods of authenticating, software and hardware  Software authentication requires the use of a Strong password  8 characters including numbers, letters and punctuation  Hardware Authentication Smart cards and biometric devices enable modern systems to authenticate users

The file system on a hard drive matters a lot when it comes to security  On a Windows machine with multiple users, you should use NTFS rather than Fat32 or you have no security at all  NTFS enables you to encrypt files and folders to better protect them from potential hackers  Primary drives and any secondary drives in computers in your care should be formatted as NTFS

Windows uses user accounts and groups as the basis of access control  A user ac­count is assigned to a group, such as Users, Power Users, or Administrators, and by as­sociation gets proper permissions on the computer  Using NTFS enables the highest level of control over data resources  Assigning users to groups is a great first step in controlling a local machine

Access to user accounts should be restricted to the assigned individuals, and those who configure the permissions to those accounts  Accounts should have permission to access only the resources they need and no more  Tight control of user accounts is critical to preventing unauthorized access  Dis­abling unused accounts is an important part of this strategy

Setting up Groups to Simplify Administration  Define the new Groups: ◦ Sales ◦ Management  Default Groups: ◦ Everyone ◦ Users ◦ Guests Too generic for our example Members of the Sales Group are able to view Customer account information and prices. Members of the Management group can modify Customer account information and pricing

Parental Controls allows you to monitor and limit the activities of any standard user in Windows 7/ Vista  Giving parents and managers a level of control over the content their children and employees can access  Activity Re­porting logs show: ◦ Applications run or attempted to run ◦ Web sites visited or attempted to visit ◦ Files downloaded and more  Block various Web sites by type or URL  Allow only certain Web sites, a far more powerful option  Limit the time users can log in

To report any security issues so a network administrator or technician can address them, there are two tools within Windows so that the OS reports problems to you-  Event Viewer: to view application or system errors for troubleshooting  Auditing: create an entry in a Security Log when certain events happen

The most common use for Event Viewer is to view application or system errors for troubleshooting From the Control Panel select System and security Select Administrative Tools Select Event Viewer

Errors will be show as Event Types Event Viewer also allows you to click a error link to take you to the online Help and Support Center at Microsoft.com which gives a detailed explanation of the error and suggests fixes Event Viewer also allows you to click a error link to take you to the online Help and Support Center at Microsoft.com which gives a detailed explanation of the error and suggests fixes

Incidence reporting after gathering data about a particular system or network problem, you may need to follow up with an incident report  Incidence Reports are useful in a couple of ways:  First it provides a record of work completed  Second it provides information when combined with other information may reveal a pattern  The Event Viewer is a useful tool for creating incident reports