Abstract: Acknowledgments I thank the instructor of this course, Prof. Crowley for his help with the project, post design and lab instruction. Conclusions.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

The Penguin Sleuth Kit By Ernest Baca
Support for Windows 7 Chapter 2 Securing and Troubleshooting Windows 7.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
System Software Chapter 5 McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
System Software Chapter Describe the differences between system software and application software Discuss the four types of system software Discuss.
55 CHAPTER SYSTEM SOFTWARE. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 5-2 Competencies Describe the differences between system software.
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 System Software.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Post install; Live CD Chapter II / Part 1I. Post install After install completes, take out the install CD/DVD Reboot Check if boot loader is working properly.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Client Server Security. Introduction Although client/server architecture is the most popular and widely used computing environment, it the most vulnerable.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
ITEC 5321 Information Systems Security Spring ‘07 Slax KillBill Edition v Deepanwita Bagchi
Chapter 8 Operating Systems and Utility Programs By: James Granahan.
Client Server Security DeSiaMorePowered by DeSiaMore1.
Using BioSlax and the BioSlax Server Tin Wee Tan National University of Singapore.
A First Course in Information Security
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Linux GUI Chapter 5. Graphical User Interface GUI vs. CLI Easier and more intuitive More popular and advanced Needed for graphics, web browsing Linux.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Computer Concepts – Illustrated 8 th edition Unit C: Computer Software.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Tutorial 11 Installing, Updating, and Configuring Software
James Falkofske Director of Online Learning - St. Cloud Technical College TechnologyBites.blogspot.comTechnologyBites.blogspot.com.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
1.1 System Performance Security Module 1 Version 5.
Computing Essentials 2014 System Software © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized.
Explain the purpose of an operating system
Chapter 6 of the Executive Guide manual Technology.
Software Writer:-Rashedul Hasan Editor:- Jasim Uddin.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 System Software.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Using BackTrack to Discover Cisco Vulnerabilities Brian Compton College of Technology – University of Houston Using BackTrack to Discover Cisco Vulnerabilities.
Module 6: Designing Security for Network Hosts
OFFICE OF SUPERINTENDENT OF PUBLIC INSTRUCTION Division of Assessment and Student Information Online MSP Testing Orientation November 15, 2013.
Application Software System Software.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Data recovery in 15 minutes or less UsingKnoppix.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Damn Small Linux ITEC 5321 Dr Edward Crowley Pranitha Koya Pranitha Koya.
A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and Applications software. Systems.
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 01 Introduction.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
CHAPTER 2 COMPUTER SOFTWARE. LEARNING OUTCOMES At the end of this class, students should be able to:  Explain the significance of software  Define and.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Jan Hrach, ➔ just another operating system such as MacOS X, Windows or FreeBSD.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
Macintosh & Linux Used to fill in pg 5 & 6 of “Operating Systems” Packet.
Frequently Asked Questions Thin Clients, Linux, and LTSP
Discovering Computers 2012: Chapter 8
Guide to Linux Installation and Administration, 2e
Chapter 6 Application Hardening
Selected topic in computer science (1)
UNIX & LINUX Operating Systems
The University of Adelaide, School of Computer Science
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
5 SYSTEM SOFTWARE CHAPTER
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
5 SYSTEM SOFTWARE CHAPTER
5 SYSTEM SOFTWARE CHAPTER
Implementing Client Security on Windows 2000 and Windows XP Level 150
Information Assurance & Network Security Certificate
Digital Literacy 1.00 Computer Basics
Presentation transcript:

Abstract: Acknowledgments I thank the instructor of this course, Prof. Crowley for his help with the project, post design and lab instruction. Conclusions Ming Chen Department of Information & Logistics Technology, College of Technology, University of Houston For information: Please contact More information on this and related projects can be obtained at my website / ITEC 5321 Process of Information Systems Security and Application of LiveCD PCLinuxOSSLAXKnoppix FocusDesktop, OS replacement Desktop, Education, Security and Network management AudienceBrand new Linux users who want to test Live CD and Linux. Desktop & Server Users, especially who would like cute desktop and small-size USB flash memory stick to boot on systems. Wide users including blind people with few computer skills. Software & Tools PCLinuxOS uses the Advanced Packaging Tool (or APT), a package management system (originally from the Debian distribution), together with Synaptic Package Manager, a GUI frontend to APT, in order to add, remove or update packages. Advanced Packaging Tool package management system Debian Synaptic Package ManagerGUIpackages Slax has a suite of modules with different functions: graphics, multimedia, games, office, education, network, security, drivers and so on. X multimedia system: MPEvideo,MP3,Og Vorbis Audio player and xine. Utilities for data recovery and system repairs, even for other operating systems. Network and security analysis tools for network admini- strators. OpenOffice for office using. Last Update PCLOS Gnome December, 2007 SLAX 6 Feb., 2008 Knoppix Aug., 2007 Windows Manager OpenOffice, Mozilla Firefox KDE/FLUXBOXKDE Window Manager Available Support The National Institute of Standards and Technology (NIST) provides technical leadership for the nation’s measurement and standards infrastructure. The Special Publication (SP ) of NIST is a “Risk Management Guide for Information Technology Systems“, Table 1: Comparing and Contrasting of Some LiveCDs A LiveCD is a computer operating system executed upon boot, without installation to a hard drive. Knoppix STD is a security tools version of the popular Knoppix Live Linux CD. Some liveCDs have security tools (eg. Authentication; Authentication; Cracker; Encryption; Forensics; Firewall; Honeypots; IDS; Network Utilities; Passwords Tools; Servers; Packet Sniffers; tcp tools; tunnels; Vulnerability Assessment; Wireless tools,etc.) which facilitate risks assessment, migrations and controls and the principles and practices for Securing Information Technology Systems. Figure 2: Technical Security Control in the Information System The NIST special publication explains the generally accepted principles and practices for securing information technology systems, which need technical methods to implement. NIST and Information Technology Security System Figure 1: The Process View of Risk Analysis and Risk Management Areas LiveCD and Information Technology Security System Live CD will not infect the computer with virus and malicious software; Live CD operation systems can also pretend the data from accessing by hackers when using the public computers. References: Schou and Shoemaker, Information Assurance for the Enterprise: A Roadmap to Information Security,, McGraw- Hill Irwin, The course ITEC 5321 Introduction to Information Systems Security introduces the principle of enterprise information systems security. These principles are examined within operational, technical, and administrative contexts. The National Institute of Standards and Technology (NIST) provides technical measurement and standards infrastructure for securing information technology systems and risk management guide. LiveCD and Open Source Tools are the based security toolkits used for the course. The LiveCD Project applies security principles and practices. The essentials of risk assessment and analysis and risk management process defined by the NIST SP and the eight principles and fourteen practices of NIST SP are the instruction to set up the processes for securing information technology system in an organization. LiveCDs with security tools are effective in applying the security principles and practices and risk management in information technology system. There are many distributions of LiveCDs. Those LiveCDs have common functions and their own specific contributions to the information technology security system. An appropriate protection system which can ensure the security of all information of value, account for likely risks and address them with countermeasures is needed by an organization.