Week 11 - Friday.  What did we talk about last time?  Security planning  Risk analysis  Security policies.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Electricity.
GCSE ICT Networks & Security..
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Safety Curriculum Project ChildSafe Putting A Lock On Safety! A nationwide program of the National Shooting Sports Foundation and its community partners.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Mark Heggli Consultant to the World Bank Expert Real-time Hydrology Information Systems Workshop Module 4: Data Management Solutions for a Modernized HIS.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Everything your business needs to know but probably doesn’t.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
Lecture 11 Reliability and Security in IT infrastructure.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
= Home Button. This is a portable memory device. It can hold from around 32Mb up to 256GB. These are sometimes called ‘Flash Drives’ and they are universal,
Database Key Management CSCI 5857: Encoding and Encryption.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Physical Security.
New Data Regulation Law 201 CMR TJX Video.
David white. List objectives for the chapter identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that.
The Impact of Physical Security on Network Security
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Lesson 20. Fault Tolerance and Disaster Recovery.
Elizabeth Wilmoth Period 2.  Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed.
Computer Care.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Task 18 Describe the need to create backup copies, and to file them in a separate and safe location also filing and storing hard copies for use in production.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
1 Hardware Security AbdelRahman abu_absah Teacher: Dr. Sanaa al_sayegh.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Disaster Recovery and Business Continuity Planning.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
Physical Security and Contingency Planning CS432 - Security in Computing Copyright © 2008 by Scott Orr and the Trustees of Indiana University.
Computer security By Isabelle Cooper.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
The Problem YOU are responsible for confidential, mission- critical data... but.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Informational Safety Дилбарян Г. Л.. Protecting data from electronic invaders is one thing - but how to protect your data in the organization? The usual.
Chapter 6 Protecting Your Files
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Week 12 - Friday CS363.
Chapter 8 – Administering Security
Presentation transcript:

Week 11 - Friday

 What did we talk about last time?  Security planning  Risk analysis  Security policies

Andrew Sandridge

 Flood  Water is problematic, but usually there is some warning  Hardware and software is replaceable  Data often is not ▪ Backups should be made ▪ Critical hard drives should be marked so that they can be removed first  Fire  Fire is worse  There is usually less time to react and the threat to humans is bigger  Fire suppression systems for computing facilities should not use water ▪ Using CO 2 or similar is good for computers but can kill humans  Everything else  Have contingency plans  Insure physical assets  Maintain off-site backups of critical data

 Power loss  Causes vary  In some countries, multiple power losses per day are routine  Uninterruptible power supplies (UPS)  Stores energy when there is power so that you can keep your systems running when there isn't  Consumer UPSs are usually batteries ▪ Not a good solution for a large data center  Large scale solutions are kinetic storage systems or generators  UPSs generally only give you enough time to save data and do a safe shutdown  Surge suppressor  Power is not constant and can have drops, spikes, and surges  Surge suppressors are inexpensive and should be used for all computer power supplies  If possible, computers should be disconnected from power (and from phone and other outside lines) during a thunderstorm

 Unauthorized access  With networked systems everywhere, people eavesdropping on connections is easier  Normal employees are also using computing resources for personal use  Theft  PCs, laptops, phones, PDAs, and portable media are easy to steal  Preventing access  Use a guard, a lock (traditional or swipe card)  Preventing portability  PCs can be locked to the desk  Motion sensors to see when someone is where they shouldn't be  Detecting theft  RFID tags

 Shredding paper documents  Some kinds of tape can also be shredded  High sensitivity data should be burned after shredding  Overwriting magnetic data  Deleting files does not stop digital forensics experts  Data on disks should be overwritten many times with random patterns of 1s and 0s (burning)  Degaussing  Passing a disk through a magnetic field so intense that all data is lost  Van Eck phreaking safeguards  Many computer components emanate electromagnetic radiation that can be reconstructed  Tempest is a government certification standard for blocking these emissions (meeting the standard can be expensive)  An entire building (such as the NSA headquarters near DC) can be shielded in copper to protect emissions

 Everything should be backed up, always  A complete backup covers the current state of all data  Revolving backups keep the last few complete backups  A selective (or incremental) backup stores only the files that have changed since the last backup  Ideally, you should have an offsite backup of all your data in case of fire or flood  Burning your critical data to a few DVDs and keeping them at home or school or vice versa is a good idea for you guys

 Networked storage can allow for continuous offsite backups and make recovery easier  If a computing center is destroyed or unusable, a cold site or shell is a facility with power and cooling where you can quickly rebuild a data center  You have to supply the hardware  A hot site has ready to run computer systems of the kind you might need  You can pay a monthly fee to be ready to move into such a site at a moment's notice  A kind of data availability insurance

 Locks have been in use since ancient times and probably developed independently in the great ancient civilizations  Locks you are likely to run into are:  Warded locks  Wafer tumbler locks  Pin tumbler locks  Combination locks

 Warded locks have existed since antiquity  The shape of the key must be able to pass through and around wards, shapes that could block poorly made keys  Warded locks provide poor security but are still used for sheds, cabinets, and other low security applications

 All warded locks have the problem that they can be defeated by a skeleton key, a key stripped down to only the part needed to turn the mechanism  In popular culture, the term skeleton key is often misused to mean old style keys for warded locks in general

 Wafer tumbler locks have better security than warded locks  A series of wafers blocks the rotation of a plug  When a key pushes each wafer up to an appropriate height, the plug is free to turn  They are picked in the same way as a pin tumbler lock, but they are easier because you can't push them up too far and you can generally pick each wafer in sequence

 Most house locks, office locks, and many car locks are pin tumbler locks  Pin tumbler locks are similar to wafer tumbler locks  A series of two part pins blocks the rotation of the plug  A key that pushes all the pins up to their shear lines will allow the plug to turn  Pins that are too high or too low will block the plug  Pin tumbler locks can offer relatively high security at a reasonable cost

 Picking a pin tumbler (or wafer tumbler) lock is done by manipulating each pin (or wafer) into the correct position  It is impossible to machine a lock perfectly, thus, if you try to turn the plug, one pin will be holding more pressure than the others  If you can push that pin up to the shear line, it will snap in place, and another pin will now be holding more pressure  If you can move through all the pins without letting any drop, the plug will turn

 You must apply a constant steady turning pressure while picking a lock  This pressure is supplied by a tension wrench  The wrench is usually just an L- shaped piece of spring steel  Picks are also pieces of spring steel with a tip that is good for manipulating pins  Popular picks include hook, ball, half diamond, and other types  A pick set with a tension wrench and broken key extractor can be bought for around $20 on the Internet

 Removing combination locks without knowing the combination is called bypassing the lock  Some techniques rely on hearing or feeling clicks made when turning the cams, particularly when pressure is applied to the shank  Multiple dial combination locks are vulnerable to this attack  All combination locks can be bypassed by brute force (if you have the time)  Many of the methods rely on the fact that low- security locks are engineered with several digits of play  This play can be exploited for drastically reduced brute force times (usually still hours)

 Making a business case  Quantifying security

 Read Chapter 9  Keep working on Project 3 Phase 1