Midterms Module 2 Computer Security
Midterms Module 2 Computer Security
SECURITY
MIDTERMS
QUESTION:
Are there any computer systems in the world that are safe
from being hacked? Why or why not?
CYBERSECURITY NEWS
Source: https://www.msn.com/en-ph/money/economy/s-26r-reports-cyber-attack-says-members-info-may-be-exposed/ar-AAR42nX
https://cnnphilippines.com/business/2021/11/24/NPC-SnR-breach-report-submission.html
https://www.gmanetwork.com/news/topstories/nation/811918/npc-s-liboro-no-direct-evidence-linking-contact-tracing-forms-to-influx-of-spam-text-messages/story/
Security Procedures
WHAT IS A SECURITY POLICY
a set of security objectives that ensure the
security of a network, the data, and the
computers in an organization.
a constantly evolving document based on
changes in technology, business, and
employee requirements.
usually created by a committee with
members consisting of management and IT
staff.
It is up to the IT staff to implement security
policy specifications in the network.
SECURING DEVICES AND DATA
The goal of the security policy is to ensure a safe network environment and to protect assets.
An organization’s assets include their data, employees, and physical devices such as computers
and network equipment.
The security policy should identify hardware and equipment that can be used to prevent theft,
vandalism, and data loss.
PROTECTING PHYSICAL EQUIPMENT
PHYSICAL SECURITY
Conventional lock – Unlocked by entering the required key into the door handle mechanism.
Deadbolt lock – Unlocked by entering the required key into a lock separate from the door handle
mechanism.
Electronic lock – Unlocked by entering a secret combination code or PIN into the keypad.
Token-based lock – Unlocked by swiping a secure card or by using a near proximity reader to
detect a smart card or wireless key fob.
Biometric lock – Unlocked by using a biometric scanner such as a thumbprint reader.
Backing up data is one of the most effective ways of protecting against data loss.
A data backup stores a copy of the information on a computer to removable backup media
Data backups should be performed on a regular basis as identified in the security policy.
Data backups are usually stored offsite to protect the backup media if anything happens to the
main facility.
Windows hosts have a backup and restore utility.
macOS hosts have a Time Machine utility to perform backup and restore functions.
FILE AND FOLDER PERMISSIONS
Depending on your computer system, Windows 10 may also support other sign-in options.
Specifically, Windows 10 supports the following sign-in options:
Windows Hello – Feature that enables Windows to use facial recognition or use your fingerprint
to access Windows.
PIN – Enter a pre-configured PIN number to access Windows.
Picture password - You choose a picture and gestures to use with the picture to create a unique
password.
Dynamic lock – Feature makes Windows lock when a pre-paired device such as a cell phone
goes out of range of the PC.
LOCAL PASSWORD MANAGEMENT
Password management for stand-alone Windows computers can be set locally using the Windows
User Accounts tool.
To create, remove, or modify a password in Windows, use Control Panel > User Accounts
It is also important to make sure that computers are secure when users are away.
A security policy should contain a rule about requiring a computer to lock when the screensaver
starts.
In all versions of Windows, use Control Panel > Personalization > Screen Saver
Choose a screen saver and a wait time, and then select the On resume, display logon screen
option.
USERNAMES AND PASSWORDS
Usernames, like passwords, are an important
piece of information and should not be revealed.
Password guidelines are an important
component of a security policy.
Any user that must log on to a computer or
connect to a network resource should be
required to have a password.
Passwords help prevent theft of data and
malicious acts.
Passwords also help to confirm that the logging
of events is valid by ensuring that the user is the
correct person.
WINDOWS FIREWALL
FIREWALLS
A firewall protects computers and networks by preventing undesirable traffic from entering internal
networks.
A firewall can allow outside users controlled access to specific services.
Firewall services can be provided as follows:
Host-based firewall – Using software such as Windows Defender Firewall.
Small office home office (SOHO) – Network-based solution using a home or small office wireless
router.
Small to medium-sized organization - Network-based solution using a dedicated device such as a
Cisco Adaptive Security Appliance (ASA) or enabled on a Cisco Integrated Services Router (ISR).
The focus of this section is on the host-based firewall solution using Windows Firewall.
SOFTWARE FIREWALLS
A software firewall is a program that provides firewall services on a computer to allow or deny traffic to
the computer.
A software firewall applies a set of rules to data transmissions through inspection and filtering of
data packets.
Windows Firewall is an example of a software firewall that helps prevent cybercriminals and malware
from gaining access to your computer.
It is installed by default when the Windows OS is installed.
Note: In Windows 10 the Windows Firewall was renamed to Windows Defender Firewall. In this
section, Windows Firewall includes Windows Defender Firewall.
Windows Firewall settings are configured using the Windows Firewall window.
To change Windows Firewall settings, you must have administrator privileges to open the Windows
Firewall window.
To open the Windows Firewall window, use Control Panel > Windows Firewall.
WEB SECURITY
Web browsers are not only used for web browsing, they are also now used to run other applications
including Microsoft 365, Google docs, interface for remote access SSL users, and more.
To help support these additional features, browsers use plug-ins to support other content.
Questions:
What aspects of this incident illustrate the importance of cybersecurity?
What exactly happened in this incident?
What did the attackers do?
How did they do it? What vulnerabilities did they exploit? (If known.)
Who was impacted by this incident? How were they impacted? (If the attack was unsuccessful, who could have been impacted and how?)
What measures / steps done to address the issue?
www.netacad.com
https://www.forcepoint.com/cyber-
edu/malware#:~:text=Malware%20is%20the%20collective%20name,unauthorized%20access%20to%20a%20netw
ork.
https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering
https://www.dailyscripture.net/