Download presentation
Presentation is loading. Please wait.
Published byPauline Marsh Modified over 9 years ago
1
Unit 8: Security Risks & Data Protection Kaplan University 1
2
Unit 8: Computer Security Risks & Data Protection Unit 9: Distributing Computing and Networking Unit 10: Final Project ◦ Due Tuesday, October 11 at 11:59 pm Eastern Time Kaplan University2
3
Readings Discussion Questions Review Unit 8 Assignment Lecture on RAID, Security Continue Final Project Kaplan University3
4
Textbook Reading ◦ Chapter 11 – RAID (section 11.6 only – pp. 514-523) ◦ Chapter 14 – Computer Security Threats ◦ Chapter 15 – Computer Security Authentication Web Articles Reading 2 Discussion Questions 3 page essay based on Home Computer Network & Security (due Tuesday) Kaplan University4
5
DQ1: Security Pick three of the questions below and address them. Respond to two students who had at least one different topic from yours and comment on that topic.How do you recognize a secure site? 1.How do you recognize a secure site? 2.What is data mining, and can your information be mined even in secure sites? 3.Explain what viruses, worms, and bots are. 4.What is a DOS attack? 5.What are ways a hacker can get into a system? 6.What are buffer overflow attacks? Kaplan University5
6
DQ2: Working Policies Securing a computer network and resources is very important. We all have (or should have!) programs to protect against viruses and spyware. Many companies have strict policies regarding use of company computers and Internet access. Those restrictions are in place for legitimate reasons: security, protection against viruses, network bandwidth, employee protection, and productivity. If you were a security manager, what security policies would you implement? What software would you install to secure a network? Finally, what are your thoughts on the right to privacy at work? Kaplan University6
7
For this project, describe your home computer and computer network security plan. ◦ How often are software updates installed? ◦ What are you protected against? ◦ What are some vulnerabilities of your home network? ◦ Your network security plan should include information on (but not limited to) passwords, firewalls, anti-virus, anti-spyware, and software updates. ◦ Write 2 pages on this description Kaplan University7
8
Test your home security settings. ◦ Internet Vulnerability Profiling – ShieldsUp! https://www.grc.com/x/ne.dll?bh0bkyd2 https://www.grc.com/x/ne.dll?bh0bkyd2 Take a few minutes and run the file sharing, common ports, and all service ports tests. ◦ Write a summary of your findings. ◦ Was your computer network as secure as you thought? ◦ Were there areas where security could be improved? ◦ Write 1 page on this topic Kaplan University8
9
Your paper should include at least 3 pages of content (including required content, intro & conclusion) Note that your paper will be longer than 3 pages as it will have a title page and a reference page in addition to the actual content pages required. Be to include an introduction and conclusion (5 pts each) Use APA format Kaplan University9
10
10
11
Kaplan University11
12
Redundant Array of Independent Disks (RAID) Consists of 7 layers (0 through 6) Each level designates a different design architecture All layers share these 3 characteristics: ◦ Set of physical disk drives viewed by the OS as a single logical drive ◦ Data is distributed across physical drives of an array in a scheme known as striping. ◦ Redundant disk capacity is used to store parity information, which guarantees data recoverability in case of a disk failure Kaplan University12
13
Term coined by researchers at University of California at Berkeley RAID Strategy ◦ Employs multiple disk drives ◦ Distributes data to enable simultaneous access to data from multiple drive ◦ Improves I/O Performance ◦ Allows easier incremental increases in capacity Kaplan University13
14
Table 11.4 (p. 516) shows 7 RAID Levels What is the advantage of using RAID? Cite an example where RAID is used. Section 11.6 (pp. 514 -523) Kaplan University14
15
Striping ◦ Level 0 – Nonredundant Mirroring ◦ Level 1 – Mirrored Parallel Access ◦ Level 2 – Redundant via Hamming code ◦ Level 3 – Bit-interleaved parity Independent Access ◦ Level 4 – Block-interleaved parity ◦ Level 5 – Block-interleaved distributed parity ◦ Level 6 – Block-interleaved dual distribution parity Kaplan University15
16
Stripe set or volume Splits data evenly across two or more disks Used to increase performance Does NOT provide redundancy of data Kaplan University16 Source: Standard RAID Levels, http://en.wikipedia.org/wiki/Standard_RAID_levels
17
Mirroring Creates an exact copy (or mirror) across two or more disks Used to increase reliability or read access Focus is not on data storage capacity Kaplan University17 Source: Standard RAID Levels, http://en.wikipedia.org/wiki/Standard_RAID_levels
18
Parallel Access Stripes data at bit level Uses Hammering code for error correction Focus is on high data transfer rates Not currently used Kaplan University18 Source: Standard RAID Levels, http://en.wikipedia.org/wiki/Standard_RAID_levels
19
Uses byte level striping with dedicated parity disk Can not service multiple requests simultaneously Rarely used Kaplan University19 Source: Standard RAID Levels, http://en.wikipedia.org/wiki/Standard_RAID_levels
20
Independent Access Uses block-level striping with dedicated parity disk Poor performance Rarely used Kaplan University20 Source: Standard RAID Levels, http://en.wikipedia.org/wiki/Standard_RAID_levels
21
Independent access Uses Block-level striping with parity data distributed across all disks Poor performance in large multi-user database Parity data has to be written across all disks Requires min of 3 disks Kaplan University21 Source: Standard RAID Levels, http://en.wikipedia.org/wiki/Standard_RAID_levels
22
Uses Block-level striping with two parity blocks distributed across all disks Fast read operation, but slower to write Kaplan University22 Source: Standard RAID Levels, http://en.wikipedia.org/wiki/Standard_RAID_levels
23
Kaplan University23
24
NIST Computer Security Handbook definition ◦ The protection afforded to an automated information system in order to attain objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) 3 key objectives of computer security ◦ Confidentiality (data & privacy) ◦ Integrity (data and system) ◦ Availability Kaplan University24
25
Name as many threats to computer security that you can identify…. Kaplan University25
26
Unauthorized disclosure entity gains access to information ◦ Exposure ◦ Interception ◦ Interference ◦ Intrusion Deception entity receives false info and believes it to be true ◦ Masquerade ◦ Falsification ◦ Repudiation Disruption event interrupts correct operation of system ◦ Incapacitation ◦ Corruption ◦ Obstruction Usurpation Control of system by unauthorized entity ◦ Misappropriation ◦ Misuse Kaplan University26
27
Individual accesses system they are not authorized to access Can you name examples of activities for each of the following behaviors? ◦ Hacker ◦ Criminal Enterprise ◦ Internal Threat Kaplan University27
28
Malware ◦ Exploits vulnerabilities in the system ◦ Software designed to cause damage to or use up the resources of the target computer May or may not need a host program May or may not need trigger to activate Kaplan University28
29
Backdoor ◦ Secret entry point into a program that allows someone to gain access without going through security procedure Logic Bomb ◦ Code embedded in some legitimate program that is set to “explode” when certain conditions are met. Trojan Horse ◦ Program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function Kaplan University29
30
Viruses ◦ Piece of software that can “infect” other programs by modifying them ◦ Types include Boot sector virus File infector Macro virus Email virus Kaplan University30
31
Worms ◦ A program that can replicate itself and send copies from computer to computer across network connections Bots ◦ A bot (aka zombie, drone) is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to bot’s creator. Distributed denial-of-service attacks (DDoS) Spam Packet sniffer Keylogging Kaplan University31
32
32
33
Authentication Access Control Intrusion Detection Malware Defense Dealing with Buffer Overflow Attacks Kaplan University33
34
Authentication two-step process ◦ Identification Something you know (password) Something you possess (token, biometric, key) ◦ Verification Kaplan University34
35
An access control policy dictates ◦ What types of access are permitted ◦ Who has that access ◦ Under what circumstances Can you name an example of access control policy at a current or former company? Kaplan University35
36
Intrusion Detection ◦ A security system that monitors and analyzes system events for the purpose of finding, and providing real-time (or near real-time) warning of attempts to access system resources in an unauthorized manner Intrustion Detection Systems (IDSs) include ◦ Sensors – collect data ◦ Analyzers – receive input from sensors ◦ User Interface – view output Kaplan University36
37
Antivirus programs ◦ What are the best antivirus programs on the market? Techniques include: ◦ Generic Decryption Enables antivirus program to easily detect even the most polymorphoic viruses while maintaining fast scanning speeds ◦ Digital Immune System Captures viruses, analyzes it, add detection and shielding for it, and passes information back to antivirus software company Kaplan University37
38
38
39
Due Tuesday, October 11 No late assignments accepted!!! Final Project is worth 200 points Write a 5 page (minimum) essay explaining how a mainstream modern (Linux or Windows) Operating System is designed to integrate all components of the operating system. At least 3 outside references Include topics on the next page Kaplan University
40
Which operating system are you planning to use for the paper? Kaplan University40
41
The following list of topics is the MINIMUM starting point for your essay. You may include other topics if you feel they are important. ◦ Processes and threads ◦ Memory management ◦ Scheduling (Including deadlock prevention) ◦ File Management ◦ Input and Output devices ◦ Security Threats ◦ Security Techniques and Defenses ◦ Data protection (RAID & Clusters) Kaplan University
42
Paper Length (5 pages), APA Style10 pts Content of paper shows understanding20 pts Introduction & Conclusion included10 pts Processes & Threads20 pts Deadlock (avoidance, prevention, detection)20 pts I/O for chosen OS20 pts Scheduling20 pts Data Protection (RAID, backups)20 pts File Management20 pts Security Techniques & Defenses20 pts Security Threats20 pts Kaplan University
43
pvanhook@kaplan.edu pvanhook@kaplan.edu pvanhook@gmail.com pvanhook@gmail.com Kaplan University
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.