The Top Ten of Security. Ten best practices for securing your network. Ten best security web sites. Eight certifications.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Security and Personnel
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Online Safety Florida Department of Law Enforcement Computer Crime Center Mary McLaughlin Cyber Security Analyst.
Chapter 7 HARDENING SERVERS.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Payment Card Industry (PCI) Data Security Standard
Security Certification
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Computer Security Dylan, Robert, Matanel, Jordan.
1 Computer Security: Protect your PC and Protect Yourself.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Certification and Training Presented by Sam Jeyandran.
Course 201 – Administration, Content Inspection and SSL VPN
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
By Cindy Garrett.  Section A – Netiquette  Section B- Copyright and Fair Use  Section C- Plagiarism  Section D- Safety on the Web  Section E- Safety.
Yvan Cartwright, Web Security Introduction Correct encryption use Guide to passwords Dictionary hacking Brute-force hacking.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.
Learning In A Techno World How Safe is Your Cyberspace?
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
CS470, A.SelcukThe Big Picture1 The Big Picture Practical, Economic, Legal Considerations CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Security Training USAID Information Security.
FLOOR CANDY.
Hosted by Staffing Security Positions How To Choose The Right Personnel Jeffrey Posluns, CISA, CISSP, SSCP, CCNP, GSEC SecuritySage Inc.
INTERNET SAFETY FOR KIDS
Small Business Security Keith Slagle April 24, 2007.
Introduction to Information Security
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
NetTech Solutions Protecting the Computer Lesson 10.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Windows Administration How to protect your computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Computer & Info Security Instructor: David Wilkeson, CISSP Class Website: Grades.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Payment Card Industry (PCI) Rules and Standards
«My future profession»
Securing the Academy: Better Cybersecurity for Instructors and Administrators
Setting-Up and Securing a Server
Information Security Session November 11, 2004
REDCap and Data Governance
Security week 1 Introductions Class website Syllabus review
WTF… About the unsecurity of IoT
Presentation transcript:

The Top Ten of Security

Ten best practices for securing your network. Ten best security web sites. Eight certifications.

“Best Practices” ‘Best Practices’ are recognized measures you can take to secure your computers. If you don’t use these ‘Best Practices’ and your systems are used against someone else as in a DDOS attack, you could be liable. Using industry Best Practices can protect you from lawsuits.

Best Practices 1.Educate users and use strong passwords –Users need to know the rules and the reasons for them 2.Use anti-virus software – it works (update at least once a week) 3.Never accept default installations – default settings are always the weakest – change default password. 4.Don’t run unnecessary services – web server, ftp, telnet, SMTP

Best Practices (con’t) 5.Install security patches immediately. 6.Back up your data and protect against power surges 7.Limit who you trust – give each user only the level of access they need to accomplish their tasks and no more. 8.Enable logging and review the logs regularly

Best Practices (con’t) 9.Expect protection to fail. Firewalls, routers, IDS, access control mechanisms often fail without warning. Have layers of protection. Have a plan B and C. 10.Manage user accounts. Disable or delete unneeded accounts immediately. They are fertile ground for crackers.

Ten Best Security Web Sites 1. –Computer Emergency Response Team at Carnegie Mellon –Current vulnerabilities,background info 2. –Like a library of information 3. –The “reading room” for SANS, a large computer security training organization.

Web Sites 4. –“Hackers know the weaknesses in your system, shouldn’t you?” 5. –Computer Incident Advisory Capability –U.S. Dept of Energy 6. –Good for getting a different viewpoint

Web Sites 7. –Portal to many other good web sites 8. –Online magazine 9. –Network Security Library 10. –Computer security resource center of the national institute of standards and technology

Top (8) Security Certifications 1.CISSP – Certified information systems security professional – general security knowledge – 2.SSCP – Systems security certified practitioner – more technical than cissp 3.CISA – Certified information systems auditor – 4.CPP – Certified Protection Professional – security management –

5.GIAC – Global information assurance certification – multilevel certification by SANS – 6.Security Certified Network Architect/ Network Professional – 7.Cisco certifications – proficiency with Cisco products – 8.Microsoft certifications – proficiency with Microsoft products –