Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.

Similar presentations


Presentation on theme: "By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective."— Presentation transcript:

1 By Kyle Bickel

2  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective measures  Operating system  Firewalls  Antivirus protection  Setting Secure passwords

3  Some operating systems are more secure like Linux and Unix compared to other operating systems like Windows which is the most attack operating system  Operating system can help you secure your computer through the use of several built in methods  They allow you to set up passwords to help secure your user accounts and is important to set strong passwords

4  Also the operating system allows a user to be an administrator which can access all the other accounts  The administrator account gives the user security options that will help better secure the computer  The administrator also allows the user to access other accounts and add or remove privileges to certain user accounts to prevent them from weakening the computer’s overall security  It is also very important to disable any guest accounts that are not being used to prevent them from being compromised

5  Also important to check your operating systems build in local security and verify that your security options are set appropriately to help better secure your computer  Also important to keep your operating system up to date by installing all new patches to prevent your system from being compromised  It is important to go into your operating system and shut down any unused or unwanted processes  Lastly it is important to have the operating system’s firewalls on and preferences set to ensure protection

6  A firewall is a software or hardware based network security that controls the network traffic  It is important that when connected to a network to keep your firewall on at all times  Firewalls are very important to someone who always leaves their computer on and connected to their network which leaves the user vulnerable to an attack at any time whether they are sitting behind the computer or not

7  There are several different types of firewalls few of them are  Packet filtering firewalls  Stateful packet filtering firewalls  Application firewalls  Circuit level firewalls  Dynamic packet filters  Each play different roles in protecting your network from outside attackers

8  The two big types of firewalls are software and hardware  Hardware is typically known as network firewalls  Hardware firewalls are a defense between your network and your router  Some routers also have built in firewalls which can effectively protect several computers that are attached to that router or can strongly protect one computer

9  The advantage to hardware firewalls is that they are separate devices and run on their own operating systems which give an added security  But their major flaw is that they cost  Software is normally a built in firewall in your operating system which gives added protection to your hardware firewall  Most operating systems offer firewalls and it should always be turned on

10  Firewalls do offer a decent amount of protection against attackers but doesn’t guarantee that your computer wont be attacked  Also firewalls offer very little protection against viruses that require you to run the software on your computer before they infect your computer  But the biggest disadvantage is that since the firewall is on your computer that it is the last line of defense and may not catch all malicious traffic that enters your system  But to ensure best protection against all types of attacks it is best to have a antivirus program along with your firewall

11  Antivirus is the protection software that is designed to protect your computer from any malicious software  For antivirus protection to be fully effective it is important that the program is always running in the background of your computer so that it can prevent and eliminate malicious software that also runs in the background of your computer and usually goes undetected by the user

12  It is very important that your antivirus has the latest update to help it protect against new types of malicious software  Also important to purchase a new copy of antivirus protection when your version runs out because your virus protection will continue to work but will not receive updates so it wont be able to defend against newer types of malicious software  It may also be a bad thing to run more than one antivirus program on the same system because the programs would conflict with each other making the programs less effective

13  Antivirus programs work by scanning through segments of code and look for code that can be linked to code forms of known malicious software or look for similarities in code that might be variations of known malicious software  It also takes unknown programs and predicts what they will do by running the program in a sandbox which is a set up security space that allows the file to operate and see if the file performs any malicious actions

14  Some side effects of antivirus programs is that they tend to slow down your system because they are required to always run on your system  Also the prompts may be a little more confusing for people who are computer illiterate and can cause them to choose a wrong option which could leave them vulnerable to an attack  People may turn off their antivirus protection because their antivirus gives a false positive detection to a program or file that they are trying to access and wont allow them to run it. So they turn their antivirus off. Then later they could forget to turn their antivirus back on when they are done with the file or program that was blocked leaving them vulnerable to an attack because they have no antivirus protection running

15  Another big problem is a false negative in which is when a program either tricks the antivirus to think its not a threat or the antivirus judges the program to be safe and allows the program to run on the computer  Also the antivirus is located in the kernel level of the operating system and which creates a potential avenue of attack which if the antivirus is targeted specifically it could be detrimental to the computer

16  A password is a string of characters used to authenticate a user  Very important not to use common words as passwords like names, all numbers or all the same letter, anything someone could easily find out about you like birth dates or house number, or the same password for everything  What makes a strong password is its length, complexity, and how unpredictable it is  Passwords should be created from random characters consisting of capital and lower case letters, numbers and extra characters and punctuation and should be kept secret  It is also important that your password is easy to remember so you don’t have to write it down and also easy to type and don’t have to look at the keyboard to type it  Also to make sure they are secure passwords should be changed frequently

17  Weaknesses to passwords is that they are very unsecure  Attackers could use blacklisting which is purposely entering the wrong password in a required number of times which locks the users account  Passwords are susceptible to dictionary attacks which will crack any password that is a lower case word no matter how long the word is

18  Another attack is login spoofing where you are redirected to what looks like another login page where you type your username and password to reconnect to your session. Normally it will tell you your password was invalid so that you would retype it so that they can be sure that they have the correct password  Lastly the easiest way to obtain the users password is by emailing or calling them and pretending to be a network security officer and would ask the person for verification purposes or that their system has been breached and that they should change their password

19  There is no best way to protect your computer 100 percent but the use of safe computing coupled with your operating system, firewalls, anti-virus, and secure passwords will provide you the best chance of protecting your computer

20  Host Based Security Best Practices." Department of Computer Science Computing Guide. Princeton University Computer Science Department, 2013. Web. 11 Nov. 2013. https://csguide.cs.princeton.edu/security/host?destination=node/182 https://csguide.cs.princeton.edu/security/host?destination=node/182  "The University of Texas at Austin." Securing Your Host. The University of Texas at Austin, 2013. Web. 11 Nov. 2013. https://www.cs.utexas.edu/facilities/documentation/secure-hosts https://www.cs.utexas.edu/facilities/documentation/secure-hosts  "Security Tip." Understanding Firewalls. Department of Homeland Security, 06 Feb. 2013. Web. 11 Nov. 2013. http://www.us- cert.gov/ncas/tips/ST04-004http://www.us- cert.gov/ncas/tips/ST04-004  "Antivirus Software." Wikipedia. Wikimedia Foundation, 25 Oct. 2013. Web. 11 Nov. 2013. http://en.wikipedia.org/wiki/Antivirus_softwarehttp://en.wikipedia.org/wiki/Antivirus_software  Kessler, Gary C. "Passwords — Strengths and Weaknesses." Passwords — Strengths and Weaknesses. Auerbach, Jan. 1996. Web. 11 Nov. 2013. http://www.garykessler.net/library/password.html http://www.garykessler.net/library/password.html  http://www.vicomsoft.com/images/learning- center/firewalls/firewalldiagram1.gif http://www.vicomsoft.com/images/learning- center/firewalls/firewalldiagram1.gif  http://res1.windows.microsoft.com/resbox/en/windows%207/main/0a 8efee3-a2ca-4efe-a56e-9316f0edd084_0.jpg http://res1.windows.microsoft.com/resbox/en/windows%207/main/0a 8efee3-a2ca-4efe-a56e-9316f0edd084_0.jpg  http://cdn3.techlila.com/wp-content/uploads/2012/11/virus-scan.jpg http://cdn3.techlila.com/wp-content/uploads/2012/11/virus-scan.jpg  http://www.passcape.com/images/dictionary_attack.png http://www.passcape.com/images/dictionary_attack.png


Download ppt "By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective."

Similar presentations


Ads by Google