Magic Bullets, Free Lunch, and other myths Ben Staab COSC5010 Computer Security.

Slides:



Advertisements
Similar presentations
Description Competency standards Duration Learning Learning methods Show visual Learning Managemen System on Moodle Offline Show visual Learning Managemen.
Advertisements

Professor J. JOHNSON, MSMIS.  History of Computers  Operating Systems  Microsoft Windows  Networking Concepts  Internet vs. WWW  Browsers 4/29/2015Prof.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Not Surviving with a Windows Desktop Gilbert Detillieux September 12, 2006 MUUG Meeting.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
CS301 Discussion Topic. Asmt. 1: Hacking to improve security A Dutch hacker, who said he worked in computer security, sent to Microsoft warning.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Server Operating Systems Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
BY : Khader Al-Rasheed  An operating system assembled under the model of free and open source software development and distributions.  it’s.
Comparing functions and features of operating systems.
HWINTRO1 OPERATING INSTALLING AN OPERATING SYSTEM.
27-1 Operating Systems What is impact does the operating system have? So Operating Systems provide: Communications with the user Loading and executing.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
Linux System. What is Linux?  Linux is considered one of the most dangerous existing systems nowadays and is currently working in an environment of X-
Windows Domain Hardening
Operating Systems. The foundation for operating system software and application software. Source:
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Module 1 Introduction to UNIX/Linux
1 Title goes on this line Firstname Lastname Job title line July 28, 2008 Firstname Lastname Job title line July.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
INTRODUCTION TO SERVERS & INSTALLATION OF WINDOWS SERVER 2008 R2 Network Administration and Maintenance.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
Mozilla Firefox By: Hassan Aslam Angela Brown Allen Lewis Brain Molczyk Megan Propts.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
4/5/20071 The LAW (Linux Applications on Windows) Project Sudhamsh Reddy University of Texas at Arlington.
What do you know about your network Or maybe you don’t know who’s really there.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
1 Operating Systems Who’s in charge here? 2 What is an Operating System  Basically the boss of the computer  Facilitate communication  Maximize throughput.
By Mohammad Alsawwaf. To apply the theory part from my last presentation into the application part (The lab)
High Availability Technologies for Tier2 Services June 16 th 2006 Tim Bell CERN IT/FIO/TSI.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
“Build that Virtual Lab you always wanted” Information Assurance Group 2011.
Thobani Shaba COSC 101.  What is an Operating System  What is iOS?  History  Features  iOS Jailbreaking  Conclusion.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
The Future With Windows XP Microsoft announced that after April 16, 2014 it will not longer support Windows XP. No statement on continued inclusion of.
CNKI 知识网络发现平台. 我们有许多需求 …… 检索结果不满意 找不到产品入口 很多功能我没 有发现 非专业读者没有 专业使用技巧 我想可视化 查看图表 要在线 浏览! 求分享 ! CNKI 都有什么 要更专业的分析!
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
ITC 4 ESO 3rd TERM Operating Systems YEAR
Three steps to prevent Malware infection
Seminar On Ethical Hacking Submitted To: Submitted By:
CSCE 548 Student Presentation By Manasa Suthram
Operating System & Application Software
DDC 1013 – Micro Computer Application
5.0 : Windows Operating System
Paul Piatek & Chris Gilliland COSC 316 Fall 2011
Microsoft Office Tech Support Officecom-Setups is an Independent technical support service provider for a large variety of THIRD PARTY PRODUCTS, brands.
Computer Technology Notes 5
Malwarebytes Configuration Support Number
Nessus Vulnerability Scanning
Internet Security Submitted to Professor Mort Anvari
The LINUX Operating System
Belkin routers offers good performance and robust hardware B E L K I NR O U T E R SB E L K I NR O U T E R S.
Analyzing OS Sample Windows 7 image provided by different class
Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Оқытушысы: Жармагамбетова Г.О.
PC Operating Systems in Review
O.S. Security.
CS101 Computer Software.
Presentation transcript:

Magic Bullets, Free Lunch, and other myths Ben Staab COSC5010 Computer Security

In November 2004, Brittish security firm MI2G released a report entitled: “Deep Study: The world's safest computing environment” The study focused on 235,907 break ins of computers connected permanently to the internet. The Results?

Out of 235,907 break ins: 1.BSD based systems (Including Mac OS X) % 2.Microsoft Windows % 3.Linux %

But wait a minute... ● If there are more linux machines, wouldn't you expect there be more linux break-ins? ● The report only counted targeted, manual attacks. What about automated attacks? (virii, worms, etc) ● £29.38 just to read the report? Could this just be manufactured contoversy to sell copies? ● What about all the other OS's? True UNIX variants, Solaris, etc.. Ok, this study might have been a little flawed. So what's the point?

now as far the security issue goes: Linux is Unix based.... INPENITRABLE!!! you cannot hack into that!!! From

There is no magic bullet: Every OS has vulnerabilities One conclusion MI2G drew from their investigation was that far too many administrators were installing Linux, and then not doing anything else to secure the system. Every OS has security holes. Linux, MS Windows, even my personal favorite, BSD.

There is no free lunch: You have to work at it to get security Security really is a process Keep your systems up to date and patched Don't rely on “out of the box” configurations for security