Cyber - Security - Module 4 - 1
Cyber - Security - Module 4 - 1
2
Operating System Overview
3
Operating System Overview
• Key functions of an operating system
– Administers user actions and accounts
– Runs software utilities and programs
– Enforce security measures
– Schedules jobs
4
The Components of an Operating
System Security Environment
• Used as access points to the database
• Three components:
– Memory
– Services
– Files
5
Services
• Main component of operating system
security environment
• Used to gain access to the OS and its
features
• Include
– User authentication
– Remote access
– Administration tasks
– Password policies
6
Files
• Common threats:
– File permission
– File sharing
• Files must be protected from
unauthorized reading and writing actions
• Data resides in files; protecting files
protects data
• Read, write, and execute privileges
7
Memory
10
User Administration
• Create user accounts
• Set password policies
• Grant privileges to users
• Best practices:
– Use a consistent naming convention
– Always provide a password to an account
and force the user to change it at the first
logon
– Protect passwords
11
– Do not use default passwords
Vulnerabilities of Operating
Systems (continued)
• Top vulnerabilities to UNIX systems
(continued):
– Sendmail
– Simple Network Management Protocol
(SNMP)
– Secure Shell (SSH)
– Misconfiguration of Enterprise Services
NIS/NFS
– Open Secure Sockets Layer (SSL)
12
E-mail Security
• Tool must widely used by public
• May be the tool must frequently used by
hackers:
– Viruses
– Worms
– Spam
– Others
• Used to send private and confidential
data as well as offensive material 13
E-mail Security (continued)
• Used by employees to communicate with:
– Clients
– Colleagues
– Friends
• Recommendations:
– Do not configure e-mail server on the same
machine where sensitive data resides
– Do not disclose technical details about the
e-mail server
14
Computer Technology and
Security
Computer Viruses
• Virus
– Stands for Vital Information Resources Under Siege
– Is a destructive computer program written to alter the
way a computer operates
– Is written by individuals to cause damage to computers
and the data stored on them
• Some Examples of virus are
– Disk Killer
– W97M
– Sunday
– Cascade
– Anna Kournikova
– Lovegate
Antivirus Software
• Antivirus software
– Is a software to scan the computer for viruses
– Is used to remove the viruses from the computer if
found
• Examples of antivirus software are:
– Quick Heal
– Net Protector
– Avast
– McAfee
– VX2000
– Smartdog
How to Prevent A Virus Attack
• Hackers or Crackers
– Are people who access the computers of others
without their knowledge
– They are intelligent programmers, who have high
knowledge of computer systems and programming
languages
Misusing Personal Information
• Encryption
– Is the process of converting data into symbols
– Used to safeguard your data