Download presentation
Presentation is loading. Please wait.
Published byAlyson Parker Modified over 9 years ago
1
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015
2
2 Learning Objectives Discuss state of security threats in the U.S. Discuss how to manage info security Plan-Protect-Respond cycle People-Technology-Policy approach
3
3 Preventing Security Threats What can you do, as a user of computer connected to the Internet or as a business having a network that is connected to the Internet, to prevent security threats/attacks from occurring?
4
4 Preventing Security Threats Use anti-virus software Use software firewall Use hardware/appliance firewall Use Intrusion Defense Systems Use Intrusion Prevention Systems Install OS updates Install applications’ updates Not open file attachments from unknown sources Not click URL in emails from unknown sources Social engineering tests/Mock phishing schemes Awareness training Acceptable computer use policy Password policy Etc.
5
5 Countermeasures Tools used to thwart attacks Also called safeguards, protections, and controls Types of countermeasures Preventative Detective Corrective Question: Match each of the countermeasures from the previous slide with its type.
6
6 Dominates security management thinking The Plan-Protect-Respond cycle Figure 2-6 6
7
How is the book organized? 7
8
8 2010/2011 CSI Security Report Survey conducted by the Computer Security Institute (http://www.gocsi.com).http://www.gocsi.com Copy of Survey report on course web site Survey Summary online
9
9
10
10 Types of attacks: by % of respondents
11
11 2011 CSI Report (cont.)
12
12 CSI Survey (cont.)
13
13
14
14 Satisfaction with Security Technology (cont.)
15
15
16
16 Types of Technology Used (cont.)
17
17 2011 Sophos Security Threat Report Malware* hosted on websites * Mal icious soft ware
18
18 2011 Sophos Security Threat Report Malware hosting countries
19
19 2011 Sophos Security Threat Report Web server’s software affected As of March 2011 Apache served 58% of all web servers Apache available for Microsoft Windows, Novell NetWare and Unix-like OS Web server software ApacheIISSunONE Operating System Computer hardware HD RAM chip Processor Web server computer
20
20 Summary Questions 1. What is Plan-Protect-Respond? How important is it for information security? 2. What is PTP? 3. What does malware refer to? 4. Systems running Microsoft operating systems are more likely to be attacked than others.TF 5. With Windows OS, you can use IIS or another web server software like Apache.TF 6. What web server software is most affected by web threats today?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.