Security: Fundamentals of IT
Security: Fundamentals of IT
Fundamentals of IT
|
Introduction
7/15/2016 Security | 2
Security Attacks and Threats
7/15/2016 Security | 3
Security Threats - Malware
7/15/2016 Security | 4
Security Threats - Malware
• Worm
• However since it’s a program on its own, it does not require the
user to run the program for it to work
7/15/2016 Security | 5
Security Threats - Malware
• Trojan horse
7/15/2016 Security | 6
Security Threats - Malware
7/15/2016 Security | 7
Denial of Service
7/15/2016 Security | 8
Exercise
7/15/2016 Security | 9
Social Engineering
7/15/2016 Security | 10
Web Security Threats
• Tools that are used to make web pages more powerful and versatile can
also make computers more vulnerable to attacks.
• They include:
– ActiveX - Technology created by Microsoft to control interactivity on web
pages.
• If ActiveX is enabled on a web page, an applet or small program must be
downloaded to gain access to the full functionality.
– Java - Programming language that allows applets to run within a web
browser. Examples of Java applets include a calculator or a page-hit
counter.
– Adobe Flash - Multimedia tool used to create interactive media for the
web. Flash is used for creating animation, video, and games on web pages.
7/15/2016 Security | 11
Web Security Threats
7/15/2016 Security | 12
Access to Data and Equipment
• Deleting files from a hard drive does not remove them completely from
the computer.
• The operating system removes the reference to the file in the file
allocation table, but the data remains.
• This data is not completely removed until the hard drive stores other
data in the same location, overwriting the previous data.
• Hard drives should be fully erased (data wiped) to prevent the
possibility of recovery using specialized software.
• After the data on the hard drive has been completely erased, the hard
drive can be destroyed or recycled.
7/15/2016 Security | 13
Access to Data and Equipment
7/15/2016 Security | 14
Access to Data and Equipment
• Degaussing
• It disrupts or eliminates the magnetic field on a hard drive that allow for the
storage of data.
• An electromagnet is a magnet, that when a current is applied, its magnetic
field becomes very strong.
• A degaussing tool takes about 10 seconds to degauss a hard drive, so it can
save a lot of time and money if a large number of hard drives need to be
securely erased.
• There are also degaussing wands that can be used for smaller jobs, where it
uses powerful magnets instead of electromagnets and costs much less.
– To use a degaussing wand, a hard drive must be disassembled and the platters
exposed to the wand for approximately 2 minutes.
7/15/2016 Security | 15
Access to Data and Equipment
• Destroying the hard drive is the best option for companies with
sensitive data.
• To fully ensure that data cannot be recovered from a hard drive,
carefully shatter the platters with a hammer and safely dispose of
the pieces.
7/15/2016 Security | 16
Security Policies
|
Security Measures
Wireless Security
Data Protection
Physical Equipment
7/15/2016 Security | 18
Security Policies
• A security policy is a collection of rules and guidelines for protecting data and
equipment and meet the security requirements of the organization
• It includes:
1. An acceptable computer usage statement for the organization.
2. The people permitted to use the computer equipment.
3. Devices that are permitted to be installed on a network, as well as the conditions
of the installation. Modems and wireless access
4. Requirements necessary for data to remain confidential on a network.
5. Process for employees to acquire access to equipment and data. This process may
require the employee to sign an agreement regarding company rules. It also lists
the consequences for failure to comply.
7/15/2016 Security | 19
Protecting Equipment
7/15/2016 Security | 20
Protecting Data
7/15/2016 Security | 21
Protecting Data
7/15/2016 Security | 22
Protecting Data - Firewalls
7/15/2016 Security | 23
Protecting Data – Biometric Security
7/15/2016 Security | 24
Protecting Data – Smart Cards
• A smart card is a small plastic card, about the size of a credit card,
with a small chip embedded in it
• The chip is an intelligent data carrier, capable of processing,
storing, and safeguarding data.
• Smart cards store private information, such as bank account
numbers, personal identification, medical records, and digital
signatures.
7/15/2016 Security | 25
Protecting Data – Data Back up and
Encryption
• Back up – It is one of the most effective ways of protecting against data loss.
– Data can be lost or damaged in circumstances such as theft, equipment failure, or
a disaster.
– Data backups should be performed on a regular basis and included in a security
plan while considering storage and validation.
• Encryption - data is transformed using a complicated algorithm to make it
unreadable.
– A special key must be used to return the unreadable information back into
readable data.
– Software programs are used to encrypt files, folders, and even entire drives.
– These include Encryption File System and BitLocker in Windows
7/15/2016 Security | 26
Protecting Against Malicious Software
• Running virus and spyware scanning programs to detect and remove unwanted
software is highly recommended.
• Many browsers now come equipped with special tools and settings that prevent the
operation of several forms of malicious software.
• It may take several different programs and multiple scans to completely remove all
malicious software.
1. Virus protection - An antivirus program typically runs automatically in the background
and monitors for problems.
• When a virus is detected, the user is warned, and the program attempts to quarantine or
delete the virus
2. Spyware protection
3. Adware protection
4. Phishing protection - block the IP addresses of known phishing websites and warn the
user about suspicious websites.
7/15/2016 Security | 27
Exercise
7/15/2016 Security | 28
Security Updates and Patches
7/15/2016 Security | 29
Security Updates and Patches
7/15/2016 Security | 30
Security Updates and Patches
7/15/2016 Security | 31
Common Problems and Solutions
7/15/2016 Security | 32
Ole Sangale Road, Madaraka Estate. PO Box 59857-00200, Nairobi, Kenya
Tel: (+254) (0)703 034000/200/300 Fax : +254 (0)20 607498
Email: [email protected] Website: www.strathmore.edu
|