Download presentation
Presentation is loading. Please wait.
Published byAdrian Parker Modified over 9 years ago
1
OV 11 - 1 Copyright © 2011 Element K Content LLC. All rights reserved. System Security Computer Security Basics System Security Tools Authentication Methods Encryption Methods
2
OV 11 - 2 Copyright © 2011 Element K Content LLC. All rights reserved. Security Factors Authorization AccountabilityAuditing Access control
3
OV 11 - 3 Copyright © 2011 Element K Content LLC. All rights reserved. Least Privilege User 1 User 4 User 2User 3 Data Entry Clerks Financial Coordinators Perform their job with more access privileges Perform their job with more access privileges Perform their job with fewer access privileges Perform their job with fewer access privileges
4
OV 11 - 4 Copyright © 2011 Element K Content LLC. All rights reserved. Non-Repudiation With non-repudiation: Owner or sender of data remains associated with the data Independent verification of sender’s identity Sender is responsible for message and data
5
OV 11 - 5 Copyright © 2011 Element K Content LLC. All rights reserved. Threats Information Security Threats Changes to Information Interruption of Services Interruption of Access Damage to Hardware Damage to Facilities Unintentional or intentional Unintentional or intentional
6
OV 11 - 6 Copyright © 2011 Element K Content LLC. All rights reserved. Vulnerabilities Vulnerabilities include: Improperly configured or installed hardware or software Bugs in software or operating systems Misuse of software or communication protocols Poorly designed networks Poor physical security Insecure passwords Unchecked user input Design flaws in software or operating systems AttackerUnsecured routerInformation system
7
OV 11 - 7 Copyright © 2011 Element K Content LLC. All rights reserved. Attacks Physical Security AttacksSoftware-Based Attacks Social Engineering AttacksWeb Application-Based Attacks Network-Based Attacks
8
OV 11 - 8 Copyright © 2011 Element K Content LLC. All rights reserved. Risks Risks include: System loss Power outage Network failure Physical losses
9
OV 11 - 9 Copyright © 2011 Element K Content LLC. All rights reserved. Unauthorized Access Attacker Intentional or unintentional misuse Intentional or unintentional misuse Deliberate attack by outsider Deliberate attack by outsider
10
OV 11 - 10 Copyright © 2011 Element K Content LLC. All rights reserved. Data Theft Attacker Data in transit Files on server
11
OV 11 - 11 Copyright © 2011 Element K Content LLC. All rights reserved. Hackers and Attackers Possess skills to gain access to computers Always malicious intent HackerAttacker
12
OV 11 - 12 Copyright © 2011 Element K Content LLC. All rights reserved. Permissions Administrators: Full access User01: Read-only access Contractors: No access Marketing documents
13
OV 11 - 13 Copyright © 2011 Element K Content LLC. All rights reserved. NTFS Permissions Supports file-level security on Windows operating systems Permissions can be applied either to folders or to individual files. When applied on a folder, these permissions, are applied to the files and subfolders within it. There are several levels of NTFS permissions, which specify whether users can: Read files or run applications Write to existing files and Modify, create, or delete files.
14
OV 11 - 14 Copyright © 2011 Element K Content LLC. All rights reserved. Group Policy Group policy controls workstation, and security features
15
OV 11 - 15 Copyright © 2011 Element K Content LLC. All rights reserved. Authentication Validates an individual’s credentials to access resources
16
OV 11 - 16 Copyright © 2011 Element K Content LLC. All rights reserved. User Name/Password Authentication Compares user’s credentials against stored credentials
17
OV 11 - 17 Copyright © 2011 Element K Content LLC. All rights reserved. Strong Passwords ! P a s s 1 2 3 4 Minimum length Special characters Uppercase letters Lowercase letters Numbers
18
OV 11 - 18 Copyright © 2011 Element K Content LLC. All rights reserved. Tokens PIN Unique value User information Password
19
OV 11 - 19 Copyright © 2011 Element K Content LLC. All rights reserved. Biometrics Fingerprint scanner Retinal scanner Hand geometry scanner Voice-recognition software Facial-recognition software Fingerprint Scanner
20
OV 11 - 20 Copyright © 2011 Element K Content LLC. All rights reserved. Multi-Factor Authentication Password Requires validation of two authentication factors
21
OV 11 - 21 Copyright © 2011 Element K Content LLC. All rights reserved. Mutual Authentication Each party verifies another’s identity
22
OV 11 - 22 Copyright © 2011 Element K Content LLC. All rights reserved. SSO Email Instant Messaging
23
OV 11 - 23 Copyright © 2011 Element K Content LLC. All rights reserved. EAP EAP: Hardware-based identifiers for authentication: Fingerprint scanners Smart Card readers Different EAP type for each authentication scheme Might need password in addition to physical authentication Fingerprint scanner
24
OV 11 - 24 Copyright © 2011 Element K Content LLC. All rights reserved. Kerberos Kerberos server Ticket User passes credentials to an authentication server
25
OV 11 - 25 Copyright © 2011 Element K Content LLC. All rights reserved. Wireless Authentication Methods There are three wireless authentication methods: Open system Shared-key 802.1x and EAP
26
OV 11 - 26 Copyright © 2011 Element K Content LLC. All rights reserved. Wireless Authentication Methods (Cont.)
27
OV 11 - 27 Copyright © 2011 Element K Content LLC. All rights reserved. Wireless Authentication Methods (Cont.) Shared WEP key
28
OV 11 - 28 Copyright © 2011 Element K Content LLC. All rights reserved. Wireless Authentication Methods (Cont.) Access point RADIUS serverActive directory Request Response
29
OV 11 - 29 Copyright © 2011 Element K Content LLC. All rights reserved. Encryption Converts data from cleartext to ciphertext
30
OV 11 - 30 Copyright © 2011 Element K Content LLC. All rights reserved. Encryption and Security Goals Encryption supports: Confidentiality Integrity Non-repudiation
31
OV 11 - 31 Copyright © 2011 Element K Content LLC. All rights reserved. Key-Based Encryption Systems Shared-Key Encryption Encrypts data Decrypts data Same key on both sides
32
OV 11 - 32 Copyright © 2011 Element K Content LLC. All rights reserved. Key-Based Encryption Systems (Cont.) Key-Pair Encryption Computer AComputer B Computer A Computer B Public key B Computer AComputer B Public key A Exchange public keys Data encrypted using public key B Data decrypted using private key B 3 3 2 2 1 1
33
OV 11 - 33 Copyright © 2011 Element K Content LLC. All rights reserved. WEP Same security as on a wired network without encryption
34
OV 11 - 34 Copyright © 2011 Element K Content LLC. All rights reserved. WPA/WPA2 TKIP EAP TKIP provides improved data encryption. EAP provides stronger user authentication. TKIP provides improved data encryption. EAP provides stronger user authentication.
35
OV 11 - 35 Copyright © 2011 Element K Content LLC. All rights reserved. Digital Certificates User with CertificateDevice with Certificate
36
OV 11 - 36 Copyright © 2011 Element K Content LLC. All rights reserved. Certificate Encryption 1 1 2 2 4 4 3 3 1. User obtains certificate and keys 2. User shares public key 3. Data encrypted with public key 4. Data decrypted with private key
37
OV 11 - 37 Copyright © 2011 Element K Content LLC. All rights reserved. PKI CA CertificatesSoftwareServicesOther Cryptographic Components CA CA issuing user certificates
38
OV 11 - 38 Copyright © 2011 Element K Content LLC. All rights reserved. Certificate Authentication 1 1 2 2 4 4 3 3 1. Presents certificate 2. Validates and accepts certificate 3. Issues certificate 4. Certificate authentication is successful Certificate holderResource CA
39
OV 11 - 39 Copyright © 2011 Element K Content LLC. All rights reserved. DES 3 DES keys Shared DES key 56 bits8 parity bits Triple encoding
40
OV 11 - 40 Copyright © 2011 Element K Content LLC. All rights reserved. Encryption Devices Encryption device (HSM) Restricts execution of external programs
41
OV 11 - 41 Copyright © 2011 Element K Content LLC. All rights reserved. SSL SSL combines: Digital certificates RSA public-key encryption SSL
42
OV 11 - 42 Copyright © 2011 Element K Content LLC. All rights reserved. Encryption Using SSL Request secure connection 1 1 Send certificate and public key 2 2 Negotiate encryption 3 3 Generates and encrypts a session key 4 4 Uses session key for data encryption 5 5
43
OV 11 - 43 Copyright © 2011 Element K Content LLC. All rights reserved. TLS TCP/IP
44
OV 11 - 44 Copyright © 2011 Element K Content LLC. All rights reserved. Reflective Questions 1. Which of the basic security concepts in this lesson were familiar to you, and which were new? 2. Can you describe some situations in which you have used basic security techniques such as authentication, access control, and encryption, or made use of a security policy?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.