Download presentation
Presentation is loading. Please wait.
Published byGloria Holland Modified over 8 years ago
1
Bay Ridge Security Consulting (BRSC)
2
Importance in Securing System If don’t keep up with security issues or fixes Exploitation of root access Installation of back doors Installation of trojan horses Mail worm propagation Mail relay exploitation
3
Key steps to securing host system Install operating system updates Protect passwords Protect files and directories Encryption Monitoring security of system Log files
4
Physical Security Hardware locks Keyed entry locks, privacy locks, patio locks, passage locks, standard keyed entry lock, deadbolt lock, cipher locks Proximity Readers Access List Mantraps Video Surveillance Fencing
5
Hardware Security Cable lock Place in a safe Locking cabinets Mobile Device Security Remote wipe/sanitation GPS tracking Voice encryption
6
Secure Operating System Software Develop the security policy Perform host software baselining Configure operating system security and settings Deploy the settings Implement patch management
7
Anti-Malware Software Anti-Virus Examine computer for infections Monitors PC recent activities Scan new documents Performed when files opened, created, or closed
8
Anti-Virus Software cont. If virus found Cleaning file of virus Quarantining infected file Deleting file
9
Anti-Malware Software cont. Anti-Spam Filtering software ○ Works with e-mail server Technique called Bayesian filtering ○ Divides email messages into spam and not- spam piles ○ Analyzes each word in each email ○ Traps higher percentage of spam then other techniques
10
Anti-Spam cont. Filtering Spam Black list ○ List of senders not to receive e-mails from White list ○ List to receive e-mails from Block e-mails from entire countries or regions
11
Anti-Malware Software cont. Pop-up blockers Pop-up: small browser appears when other web sites being viewed. ○ Created by advertisements Separate program or included feature Stops pop-up advertisements from showing Anti-spyware Helps prevents computers from becoming infected by different spyware
12
Pop-up blockers & Anti-Spyware Cont. Pop-up blockers part of package known as anti-spyware Similarities Regularly update Continuous, real-time monitoring Perform complete scan of entire computer at one time Trap variety of malware
13
Anti-Malware Software cont. Firewalls Help stop malicious packets from entering/leaving system Software or hardware based Filters incoming/outgoing traffic Inclusive or exclusive Improve services running
14
Sources “Securing the Host”. Etutorials. 2008-2012. Web. 30 Oct. 2012. http://etutorials.org/Linux+systems/red+hat+linux+9+professi onal+secrets/Part+IV+Managing+Red+Hat+Linux/Chapter+2 2+System+and+Network+Security/Securing+the+Host/ Ciampa, Mark. Ph.D. Security+ Guide to Network Security Fundamentals. 4th ed. United States of America: Course Technology, Cengage Learning, 2012. Print. 30 Oct. 2012
15
Sources cont “Securing Your Host”. Department of Computer Science. The University of Texas at Austin. 2012. Web. 30 Oct. 2012. https://www.cs.utexas.edu/facilities/documentation/secure- hosts Barbish, J. Joseph “Firewall Concepts”. Free BSD Handbook. Web. 30 Oct. 2012. http://www.freebsd.org/doc/en_US.ISO8859- 1/books/handbook/firewalls-concepts.html
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.