0% found this document useful (0 votes)
52 views32 pages

Chapter - 5

Uploaded by

Thirthan Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views32 pages

Chapter - 5

Uploaded by

Thirthan Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Chapter-5

• End Point device and Mobile phone security, Password


policy,
• Security patch management,
• Data backup,
• Downloading and management of third-party software,
• Device security policy,
• Cyber Security best practices, Significance of host firewall a
• Ant-virus, Management of host firewall and Anti-virus, Wi-
Fi security, Configuration of basic security policy and
permissions.
introduction
• Securing endpoint devices and
mobile phones is crucial due to the
sensitive information they often hold
and their susceptibility to various
threats.
End Point Devices:

Keep Software Updated

Use Antivirus/Malware Protection

Implement Firewalls

Strong Authentication

Encrypt Data:

Backup Regularly

Limit User Privileges


For Mobile Phones:
Lock Screen Security:

App Permissions

Install from Trusted Sources

Encrypt Mobile Data:

Remote Wipe/Find Features

Regular Updates:

Use VPNs on Public Networks:

Avoid Jailb reaking or Rooting:


Password policy
• A password policy sets the rules that
passwords for a service must meet, such as
length and type of characters allowed and
disallowed.
• Password policies are crucial for ensuring the
security of digital accounts and systems. They
typically include guidelines and requirements
that dictate how passwords should be created,
used, and managed.
Robust policy
Password Length:

Complexity Requirements:

Regular Changes:

Prohibiting Common Passwords

Account Lockout:

Multi-Factor Authentication (MFA):

Education and Training

Restrictions on Password Sharing

Monitoring and Enforcement

Encryption and Storage:


Security patch management
• Security patch management is a crucial aspect
of maintaining a secure system or network.
• It involves identifying, acquiring, testing, and
applying patches or updates to software,
applications, or devices to address known
vulnerabilities or security weaknesses
Security patch management involves
1. Identification:
Stay informed about security vulnerabilities.
This involves monitoring vendor websites,
security advisories, mailing lists, and other
sources to identify patches relevant to your
systems.
2. Assessment:
• Evaluate the severity and impact of the
vulnerability on your systems. Determine if
the patch is applicable and necessary for your
environment.
Acquisition:
Testing:
Deployment:
Verification,
Monitoring and Maintenance
Documentation:
Data backup
• Data backup is crucial for safeguarding your
important information.
• It involves creating duplicate copies of your
files or data to protect against data loss in
case of hardware failures, human error,
cyberattacks, or any unforeseen disasters.
some essential tips for effective data
backup:
Regular backups

Multiple locations:

Automate backups

Verify backups

Use encryption

Test restoration

Prioritize important data


Downloading and management of
third-party software

• Downloading and managing third-party


software involves several steps to ensure
you're obtaining it safely and using it securely:
safely and using it securely:
Verify Authenticity:

Source:

Reviews and Ratings:

Official Websites:

Read Permissions:

Security Software:

Regular Updates:

Virtual Environments/Sandboxes:

License Agreement:

Back Up Data

Uninstall Unused Software:


Device security policy
• Creating a device security policy is crucial to
safeguarding your systems and data.
• Here are some key components you might
want to consider when drafting a device
security policy:
Device Usage Guidelines:
Acceptable Use Policy:
Password and Authentication:
Data Encryption:
Regular Updates and Patching:
Access Control:
Remote Access Security:
Lost or Stolen Devices:
Software and Application Management:
Monitoring and Reporting:
Employee Training:
Cyber Security best practices

• Cybersecurity is crucial in protecting digital


systems and data. Here are some best
practices to enhance cybersecurity:
Steps:
Use Strong Passwords

Enable Multi-Factor Authentication (MFA):

Keep Software Updated:

Regular Backups

Educate Employees:

Secure Wi-Fi Networks

Implement Firewalls:

Limit Access and Permissions

Monitor and Respond:

Encrypt Sensitive Data:

Regular Security Audits

Stay Informed
Significance of host firewall and Ant-
virus
• Both host firewalls and antivirus
software play critical roles in
computer security, albeit in different
ways.
Host Firewall:
• A host firewall is a software or hardware
component that monitors and controls
incoming and outgoing network traffic on an
individual device (such as a computer or
server).
• Its primary function is to act as a barrier
between your device and potentially malicious
content from the internet or other networks.
Antivirus Software:
Antivirus software is designed to detect, prevent, and remove
malicious software (malware) from a computer or device.

A. − Malware Protection: It scans files, emails, downloads, and


other elements of your system for known patterns and behaviors
associated with viruses, worms, Trojans, spyware, ransomware,
and other types of malicious software.
B. − Real-time Monitoring: Many antivirus programs run
continuously in the background, monitoring system activities and
flagging or quarantining suspicious files or processes.
C. − Updates and Heuristics: Antivirus software relies on regular
updates to its virus definition databases to recognize new threats.
Additionally, some use heuristic analysis to detect previously
unknown malware by identifying suspicious behavior patterns.
Management of host firewall and
Anti-virus
• Managing host firewalls and antivirus
software is crucial for maintaining a secure
system. Here are some general guidelines for
managing them effectively:
Firewall Management:
 Understand Firewall Rules: Learn how your firewall works and
the rules governing inbound and outbound traffic. Configure
rules based on the principle of least privilege, allowing only
necessary traffic.
 Regular Updates: Keep the firewall software updated to
ensure it has the latest security patches and features.
 Logging and Monitoring: Enable logging to track firewall
activities. Regularly review logs for any suspicious activities or
unauthorized access attempts.
 Default Deny Policy: Implement a default deny policy where all
traffic is blocked unless specifically allowed. This minimizes the
attack surface.
 Application Control: Use application-specific rules to control
which applications can access the network. This helps prevent
unauthorized programs from communicating externally.
Antivirus Management:
• Regular Updates: Ensure your antivirus software is updated with the
latest virus definitions and software patches

• Scheduled Scans: Set up regular system scans to check for malware,


viruses, and other threats. Perform full system scans periodically.

• Real-Time Protection: Enable real-time scanning to monitor files and


processes in real- time for any suspicious behavior or malware.

• Quarantine and Removal: Configure the antivirus to quarantine or


remove identified threats automatically. Regularly review quarantined items to
ensure no false positives.

• User Education: Educate users about safe browsing habits, downloading


files from trusted sources, and avoiding suspicious emails or websites that could
introduce malware.

• Compatibility and Performance: Ensure the antivirus software


doesn’t conflict with other applications
Wi-Fi security

• Wi-Fi security is crucial in


safeguarding your network from
unauthorized access, data breaches,
and various cyber threats.
Here are some essential tips to
enhance Wi-Fi security:
Strong Passwords:
Encryption
Network Name (SSID) Hiding:
Router Firmware Updates:
Firewall:
Guest Network:
MAC Address Filtering:
Use a VPN
Disable WPS:
Regular Audits
Physical Security:
Stronger Authentication:
Configuration of basic security policy
and permissions
• Creating a basic security policy involves
several steps and considerations.
Here’s a general guide on how to
approach setting up security policies
and permissions:
Identify Assets

Risk Assessment

Define Security Policies

Implement Permissions

Regular Audits and Updates

Employee Training:

Monitoring and Logging

Compliance:
Thank you

You might also like