0% found this document useful (0 votes)
39 views

Midterms Module 2 Computer Security

There are no computer systems that are completely safe from hacking because vulnerabilities can always be discovered in software and hardware. A security policy outlines security objectives like securing physical access, encrypting and backing up data, using firewalls and antivirus software, and implementing strong access controls and password policies to minimize risks of hacking or data loss. Regular security updates and monitoring are also needed to maintain protection against evolving threats.

Uploaded by

kerwin Oligario
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Midterms Module 2 Computer Security

There are no computer systems that are completely safe from hacking because vulnerabilities can always be discovered in software and hardware. A security policy outlines security objectives like securing physical access, encrypting and backing up data, using firewalls and antivirus software, and implementing strong access controls and password policies to minimize risks of hacking or data loss. Regular security updates and monitoring are also needed to maintain protection against evolving threats.

Uploaded by

kerwin Oligario
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

COMPUTER

SECURITY

MIDTERMS
QUESTION:

 Are there any computer systems in the world that are safe
from being hacked? Why or why not?
CYBERSECURITY NEWS

Source: https://www.msn.com/en-ph/money/economy/s-26r-reports-cyber-attack-says-members-info-may-be-exposed/ar-AAR42nX
https://cnnphilippines.com/business/2021/11/24/NPC-SnR-breach-report-submission.html
https://www.gmanetwork.com/news/topstories/nation/811918/npc-s-liboro-no-direct-evidence-linking-contact-tracing-forms-to-influx-of-spam-text-messages/story/
Security Procedures
WHAT IS A SECURITY POLICY
 a set of security objectives that ensure the
security of a network, the data, and the
computers in an organization.
 a constantly evolving document based on
changes in technology, business, and
employee requirements.
 usually created by a committee with
members consisting of management and IT
staff.
 It is up to the IT staff to implement security
policy specifications in the network.
SECURING DEVICES AND DATA

 The goal of the security policy is to ensure a safe network environment and to protect assets.

 An organization’s assets include their data, employees, and physical devices such as computers
and network equipment.
 The security policy should identify hardware and equipment that can be used to prevent theft,
vandalism, and data loss.
PROTECTING PHYSICAL EQUIPMENT
PHYSICAL SECURITY

 Physical security is as important as data


security.
 For example, if a computer is taken from an
organization, the data is also stolen or worse,
lost.
 Physical security involves securing:

 Access to an organization’s premise


 Access to restricted areas
 The computing and network infrastructure
TYPE OF SECURE LOCKS

 Conventional lock – Unlocked by entering the required key into the door handle mechanism.

 Deadbolt lock – Unlocked by entering the required key into a lock separate from the door handle
mechanism.
 Electronic lock – Unlocked by entering a secret combination code or PIN into the keypad.

 Token-based lock – Unlocked by swiping a secure card or by using a near proximity reader to
detect a smart card or wireless key fob.
 Biometric lock – Unlocked by using a biometric scanner such as a thumbprint reader.

 Multifactor lock – A lock that uses a combination of the above mechanisms.


MANTRAPS

 In high-security environments, mantraps are often


used to limit access to restricted areas and to
prevent tailgating.
 A mantrap is a small room with two doors, one of
which must be closed before the other can be
opened.
 Typically, a person enters the mantrap by
unlocking one door. Once inside the mantrap,
the first door closes and then the user must
unlock the second door to enter the restricted
area.
DATA – YOUR GREATEST ASSET

 Data is likely to be an organization’s most valuable


assets. Organizational data may include research
and development, sales, financial, human resource,
employee, and customer data.
 Data can be lost or damaged in circumstances such
as theft, equipment failure, or a disaster.
 Data loss or exfiltration are terms used to describe
when data is lost, stolen, or leaked to the public.
 Data can be protected from data loss using data
backups, file/folder encryption and permissions.
DATA BACKUPS

 Backing up data is one of the most effective ways of protecting against data loss.

 A data backup stores a copy of the information on a computer to removable backup media
 Data backups should be performed on a regular basis as identified in the security policy.
 Data backups are usually stored offsite to protect the backup media if anything happens to the
main facility.
 Windows hosts have a backup and restore utility.

 macOS hosts have a Time Machine utility to perform backup and restore functions.
FILE AND FOLDER PERMISSIONS

 Permissions are rules you


configure to limit folder or file
access for an individual or for a
group of users.
 Users should be limited to only the
resources they need in a computer
or on a network.
 This is known as the principle of
least privilege.
FILE AND FOLDER ENCRYPTION

 Encryption is often used to protect data.

 Encryption is where data is transformed using a


complicated algorithm to make it unreadable.
 A special key must be used to return the
unreadable information back into readable
data.
 Encrypting File System (EFS) is a Windows feature
that can encrypt data.
 EFS is directly linked to a specific user account.
 Only the user that encrypted the data will be
able to access it after it has been encrypted.
WINDOWS BITLOCKER AND BITLOCKER TO GO
BitLocker is the Windows encryption technology that protects your data from unauthorized access
by encrypting your drive and requiring one or more factors of authentication before it will unlock it.
Windows will require a BitLocker recovery key when it detects a possible unauthorized attempt to access
the data.
 To use BitLocker:

 At least two volumes must be present on a hard disk.


 The Trusted Platform Module (TPM) must be enabled in
BIOS.
 The TPM is a specialized chip installed on the
motherboard that stores encryption keys, digital
certificates, and passwords.
 BitLocker encryption can also be used with removable drives
by using BitLocker To Go.
 BitLocker To Go does not use a TPM chip, but still
provides encryption and requires a password.
DATA WIPING MAGNETIC MEDIA

 Protecting data also includes removing files


from storage devices when they are no longer
needed.
 Simply deleting files or reformatting the drive
may not be enough to ensure your privacy.
 Software tools can be used to recover folders,
files, and even entire partitions.
 For this reason, storage media should be
fully erased using one or more of the
methods listed in the figure.
DATA WIPING OTHER MEDIA
 SSDs are comprised of flash memory instead of magnetic platters.
 Common techniques used for erasing data such as degaussing are not effective with flash
memory.
 Perform a secure erase to fully ensure that data cannot be recovered from an SSD and hybrid
SSD.
 Other storage media and documents (e.g., optical disks, eMMC, USB sticks) must also be
destroyed.
 Use a shredding machine or incinerator that is designed to destroy documents and each type of
media.
 When thinking about what devices must be wiped or destroyed, remember that devices besides
computers and mobile devices store data.
 Printers and multifunction devices may also contain a hard drive that caches printed or
scanned documents. This caching feature can be turned off in some instances, or the device
needs to be wiped on a regular basis.
HARD DRIVE RECYCLING AND DESTRUCTION

 When a storage media is no longer


needed, the media can either be:
 Destroyed - Destroying the hard drive
fully ensures that data cannot be
recovered from a hard drive.
 Recycled - Hard drives that have been
wiped can be reused in other
computers. The drive can be
reformatted, and a new operating
system installed.
Securing Windows Workstations
SECURING A COMPUTER
 Computers and workstations should be secured
from theft.
 Lock your workstation when you are not present
to prevent unauthorized users from stealing or
accessing local computer and network
resources.
 If you must leave a computer in an open public
area, cable locks should be used to deter theft.
 Use a privacy screen to protect the information
displayed on your screen from prying eyes
 Access to your computer must also be protected.

 There are three levels of password protection


that can be used on a computer.
SECURING WINDOWS LOGIN

 The most common type of password protection is the computer login.

 Depending on your computer system, Windows 10 may also support other sign-in options.
Specifically, Windows 10 supports the following sign-in options:
 Windows Hello – Feature that enables Windows to use facial recognition or use your fingerprint
to access Windows.
 PIN – Enter a pre-configured PIN number to access Windows.
 Picture password - You choose a picture and gestures to use with the picture to create a unique
password.
 Dynamic lock – Feature makes Windows lock when a pre-paired device such as a cell phone
goes out of range of the PC.
LOCAL PASSWORD MANAGEMENT
 Password management for stand-alone Windows computers can be set locally using the Windows
User Accounts tool.
 To create, remove, or modify a password in Windows, use Control Panel > User Accounts
 It is also important to make sure that computers are secure when users are away.

 A security policy should contain a rule about requiring a computer to lock when the screensaver
starts.
 In all versions of Windows, use Control Panel > Personalization > Screen Saver
 Choose a screen saver and a wait time, and then select the On resume, display logon screen
option.
USERNAMES AND PASSWORDS
 Usernames, like passwords, are an important
piece of information and should not be revealed.
 Password guidelines are an important
component of a security policy.
 Any user that must log on to a computer or
connect to a network resource should be
required to have a password.
 Passwords help prevent theft of data and
malicious acts.
 Passwords also help to confirm that the logging
of events is valid by ensuring that the user is the
correct person.
WINDOWS FIREWALL
FIREWALLS

 A firewall protects computers and networks by preventing undesirable traffic from entering internal
networks.
 A firewall can allow outside users controlled access to specific services.
 Firewall services can be provided as follows:
 Host-based firewall – Using software such as Windows Defender Firewall.
 Small office home office (SOHO) – Network-based solution using a home or small office wireless
router.
 Small to medium-sized organization - Network-based solution using a dedicated device such as a
Cisco Adaptive Security Appliance (ASA) or enabled on a Cisco Integrated Services Router (ISR).
 The focus of this section is on the host-based firewall solution using Windows Firewall.
SOFTWARE FIREWALLS
 A software firewall is a program that provides firewall services on a computer to allow or deny traffic to
the computer.
 A software firewall applies a set of rules to data transmissions through inspection and filtering of
data packets.
 Windows Firewall is an example of a software firewall that helps prevent cybercriminals and malware
from gaining access to your computer.
 It is installed by default when the Windows OS is installed.
 Note: In Windows 10 the Windows Firewall was renamed to Windows Defender Firewall. In this
section, Windows Firewall includes Windows Defender Firewall.
 Windows Firewall settings are configured using the Windows Firewall window.
 To change Windows Firewall settings, you must have administrator privileges to open the Windows
Firewall window.
 To open the Windows Firewall window, use Control Panel > Windows Firewall.
WEB SECURITY

 Web browsers are not only used for web browsing, they are also now used to run other applications
including Microsoft 365, Google docs, interface for remote access SSL users, and more.
 To help support these additional features, browsers use plug-ins to support other content.

 However, some of these plug-ins may also introduce security problems.


 Browsers are targets and should be secured.
INPRIVATE BROWSING
 Web browsers retain information about the web pages that
you visit, the searches that you perform, and other
identifiable information including usernames, passwords,
and more.
 The information retained by web browsers can be recovered
and exploited to steal your identity, your money, or change
your passwords on important accounts.
 To improve security when using a public computer, always:
 Clear your browsing history – All web browser have a way
to clear their browsing history, cookies, files, and more.
 Use the InPrivate mode – Using an InPrivate browser
temporarily stores files and cookies and deletes them
when the InPrivate session has ended.
 For Internet Explorer 11, use Tools > InPrivate Browsing
 Note: As an alternative press Ctrl+Shift+P to open an
InPrivate window.
 Chrome, Linux : Ctrl+Shift+N
POP-UP BLOCKER
 Pop-ups are initiated while browsing, such as a
link on a page that opens a pop-up to deliver
additional information or a close-up of a picture.
 Some pop-ups are initiated by a website or
advertiser and are often unwanted or annoying.
 Most web browsers offer the ability to block pop-
up windows.
 This enables a user to limit or block most of the pop-
ups that occur while browsing the web.
 To enable the Internet Explorer 11 Pop-up Blocker
feature, use Tools > Pop-up Blocker > Turn on Pop-up
Blocker.
SMARTSCREEN FILTER
QUESTIONS???

 Activity Guide: (Performance Task) – Interpreting Cybersecurity News


 Class will be divided into 6 groups. Each group will read an article about a cybersecurity breach (or attempted breach) and will answer guide
questions about the incident.
 Read your article and answer the questions below.
 Be sure to include details of the article in your answers, and cite any information you quote directly from the article.
 Your answers should be understandable to any individual who has read the article. Assumption: The reader should not need to be an IT to understand your answers.

 Questions:
 What aspects of this incident illustrate the importance of cybersecurity?
 What exactly happened in this incident?
 What did the attackers do?
 How did they do it? What vulnerabilities did they exploit? (If known.)
 Who was impacted by this incident? How were they impacted? (If the attack was unsuccessful, who could have been impacted and how?)
 What measures / steps done to address the issue?

 Do not forget to include your source / reference page link.


 Submit in a PDF / DOC file using filename: Midterm_PT_Groupno._Lastname
 Submission Date: December 11, 8PM
 Scoring as an Assessment: Each answer should be clearly connected to the incident, and should be supported with pertinent details from the article and references
to the lesson content.
REFERENCES

 www.netacad.com

 https://www.forcepoint.com/cyber-
edu/malware#:~:text=Malware%20is%20the%20collective%20name,unauthorized%20access%20to%20a%20netw
ork.
 https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

 https://www.dailyscripture.net/

You might also like