CS Unit 5
CS Unit 5
UNIT 5
End Point device and mobile security
An endpoint device is any hardware or software that communicates with a network or system.
It is typically the point where users or applications access or interact with network resources.
➢Fix Bugs: Patches often fix errors or bugs that affect the software's
operation.
➢Security Vulnerabilities: Patches are frequently released to address
security holes (vulnerabilities) that could be exploited by hackers or
malware.
➢Performance Enhancements: Some patches improve the
performance of a system, such as speeding up processes or optimizing
resource use.
➢Feature Updates: Occasionally, patches may introduce new features
or improvements to existing functionality.
Types of Patches
➢Security Patches: These are focused on fixing known security
vulnerabilities to protect systems from threats, such as hackers
exploiting weaknesses.
➢Bug Fix Patches: These address software bugs or errors that can
cause crashes or unexpected behavior.
➢Feature Patches: These introduce minor updates or new features
that enhance the software's capabilities.
➢Performance Patches: These improve the efficiency, speed, or
overall performance of software or systems.
Security Patch Management
➢ Network Security
Devices should connect only to secure, trusted networks (e.g.,
encrypted Wi-Fi or VPN connections) to prevent data interception.
Public or unsecured networks should be avoided when accessing
sensitive company data.
Key Components of Device Security policy
➢Backup and Data Recovery
Devices must be regularly backed up to protect data in case of loss,
failure, or corruption.
A data recovery plan should be in place for quick restoration in case
of device issues.
➢ Physical Security
Employees should be trained to keep devices secure physically
Devices should be locked when not in use.
Key Components of Device Security policy
➢ Monitoring and Reporting
Devices may be monitored for security purposes to detect unauthorized
activity or security breaches.
Employees should report any suspicious activity or loss of devices
immediately.
➢ Use of External Storage
Use of external storage devices (like USB drives) should be controlled, and
such devices should be encrypted and scanned for malware before use.
➢ Remote Work and BYOD (Bring Your Own Device) Policy
For remote workers or those using personal devices (BYOD), additional security
measures, such as a VPN , may be required to access corporate data securely.
Key Components of Device Security policy
➢ User Training and Awareness
Employees should receive regular training on security best
practices, including recognizing phishing attempts, using strong
passwords, and safeguarding devices.
➢ Incident Response
The policy should specify actions to take if a security incident
occurs, such as a device breach, theft, or loss, and how it will be
handled and investigated.
Key Components of Device Security policy
➢Device Retirement and Disposal
When a device is no longer in use, it should be properly wiped of all
company data before being retired, sold, or recycled. This prevents
sensitive data from being accessed by unauthorized individuals.
➢ Access Control
Only authorized personnel should have access to sensitive data on
the devices. Role-based access controls (RBAC) may be
implemented to restrict access to certain apps or files.
Key Components of Device Security policy
➢Use of Cloud Services
Any cloud services used to store or back up data should be secure
and meet the organization's standards for security, including
encryption and multi-factor authentication (MFA).
Cyber security best practices
❖Use Strong, Unique Passwords
Create complex passwords with a mix of letters, numbers, and symbols.
Avoid reusing passwords across different sites to minimize risk.
❖Regularly Update Software
Install software and system updates promptly to patch security
vulnerabilities. These updates often contain important fixes for known
threats.
❖Enable Multi-Factor Authentication (MFA)
Add an extra layer of security by requiring a second form of verification,
such as a code from your phone. This makes unauthorized access more
difficult.
Cyber security best practices
❖Be Cautious with Phishing Emails
Do not click on links or open attachments in unsolicited emails. Verify
any suspicious requests by contacting the sender directly.
❖Use a VPN (Virtual Private Network)
A VPN encrypts your internet connection, protecting your data from
interception, especially on public Wi-Fi networks. It ensures your online
activity remains private.
❖Backup Your Data Regularly
Regularly back up important files to secure storage, either cloud-based
or physical drives. This helps prevent data loss in case of hardware
failure or cyberattacks.
Cyber security best practices
❖Use Antivirus and Anti-Malware Software
Install reliable antivirus and anti-malware software to detect and block
malicious threats. Ensure these tools are updated frequently to catch the
latest threats.
❖Limit Data Sharing
Be mindful of the personal information you share online, especially on
social media or websites. Only provide necessary details and check
privacy settings regularly.
❖Encrypt Sensitive Data
Use encryption to protect data both in transit and at rest, making it
unreadable to unauthorized users. This is especially important for
financial or personal information.
Cyber security best practices
❖Control Access Privileges
Grant access to sensitive systems and data only to those who need it.
Regularly review access permissions and remove unnecessary
privileges.
❖Secure Your Wi-Fi Network
Use strong encryption like WPA3 for your Wi-Fi network and change the
default router password. This prevents unauthorized users from gaining
access to your network.
❖Monitor Accounts and Devices
Regularly check for suspicious activity on your accounts and devices.
Set up alerts to notify you of unusual login attempts or financial
transactions.
Cyber security best practices
❖Be Wary of Public Wi-Fi
Avoid accessing sensitive accounts or making financial transactions on
public Wi-Fi. Use a VPN to encrypt your connection when on unsecured
networks.
❖Educate and Train Employees (For Businesses)
Conduct regular cybersecurity training for employees to raise awareness
of common threats. Empower them to recognize phishing, social
engineering, and other risks.
❖Implement and Test Incident Response Plans
Develop an incident response plan to guide your team through a
cyberattack. Regularly test and update the plan to ensure quick and
effective action during a breach.
Cyber security best practices
❖Secure Cloud Services
Use strong authentication and ensure data stored in the cloud is
encrypted. Review the security settings of any cloud services to control
access and data protection.
❖Use Two-Factor Authentication (2FA) on Mobile Devices
Enable 2FA for apps and services involving sensitive data. This adds an
extra verification step, such as a code sent to your phone, preventing
unauthorized access.
❖Regularly Review Permissions and Software
Periodically review app and software permissions to ensure they align
with your needs. Remove unnecessary apps and revoke permissions to
reduce exposure to threats.
Cyber security best practices
❖Use Strong Physical Security
Ensure physical access to your devices and servers is restricted.
Use locks, secure storage, and surveillance to prevent unauthorized
physical access to critical assets.
❖Stay Informed About Emerging Threats
Keep up with the latest cybersecurity news to stay aware of new
vulnerabilities and attack methods. Follow reputable sources for
security alerts and updates.
Significance of host firewall
A host firewall is a software-based security system that monitors
and controls incoming and outgoing network traffic on a specific
device (host), based on security rules.
It operates on individual computers, servers, or networked devices,
acting as a barrier to unauthorized access and protecting the device
from potential threats coming from the network.
Example:
Windows Firewall (built into Microsoft Windows)
Significance of host firewall
➢Traffic Filtering: A host firewall examines and filters network
traffic based on predefined security rules.
It allows only legitimate traffic and blocks potentially malicious or
unauthorized access.
➢Protection Against Unauthorized Access: It helps protect the
host (e.g., a computer or server) from unauthorized access or
attacks from external sources, like hackers or malware.
➢Prevents Spread of Malware: By controlling outbound traffic, a
host firewall can help prevent malware or ransomware from
communicating with external servers, thus limiting its ability to
spread or exfiltrate data.
Significance of host firewall
➢Control over Applications: Firewalls can enforce rules that allow
or block specific applications from communicating over the
network.
This is useful for blocking unwanted software or controlling the
behavior of allowed applications.
➢Prevents Network-Based Attacks: Host firewalls protect against
various types of network-based attacks, including DoS (Denial of
Service) attacks, brute-force attacks etc.
Significance of Anti-virus
➢Antivirus software is a program designed to detect, prevent, and
remove malicious software (malware) from computers, servers,
and other devices.
➢It scans files, programs, and system activities for signs of harmful
code, such as viruses, worms, trojans, ransomware, spyware, and
other forms of malware.
Significance of Anti-virus
➢Protection Against Malware:
Antivirus software is the first line of defense against various types of malware,
including viruses, trojans, worms, ransomware, adware, and spyware.
It helps detect, block, and remove these threats before they can harm the
system.
➢Prevents Data Loss:
Malware, especially ransomware, can encrypt or destroy valuable data.
Antivirus software helps prevent these attacks, safeguarding important files
and reducing the risk of data loss.
➢Protection from Online Threats:
Antivirus programs can protect users from malicious websites, phishing
attempts, and drive-by downloads that can occur while browsing the internet,
preventing the infection of the device.
Significance of Anti-virus
➢Improves System Performance:
Antivirus programs not only protect the system but can also help optimize
performance by identifying and removing unnecessary files, like temporary
files or unwanted applications that may slow down the computer.
➢Reduces Financial Risk:
Many forms of malware can lead to financial loss, whether it's through theft of
banking credentials, loss of business data, or damage to critical infrastructure.
Antivirus software helps prevent these kinds of threats, reducing financial risks.
➢Peace of Mind:
Knowing that antivirus software is running on a device provides peace of mind
to users, knowing their system is being continuously monitored for potential
threats and that action will be taken if malware is detected.
Management of host firewall
❑Initial Firewall Configuration
Set up clear rules for which traffic should be allowed and which should
be blocked.
Use a "default deny" rule to block all traffic by default and only allow
what's needed.
Be specific when creating rules, allowing only necessary traffic to pass
through.
❑Regular Updates and Rule Maintenance
Regularly update firewall software to stay protected from new threats.
Review and adjust firewall rules to make sure they’re still relevant and
effective.
Remove old or unnecessary rules to avoid security gaps.
Management of host firewall
❑Monitoring and Logging
Enable logging to track all incoming and outgoing traffic, and look for
unusual activity.
Regularly check logs to spot potential security issues or threats early.
Set up alerts to notify you if something suspicious happens.
❑Firewall Rule Testing and Validation
Test new rules in a safe environment before applying them to your live
network.
Use tools like nmap to check that your firewall is blocking unwanted
traffic.
Keep a documented process for changing rules, so all changes are
tracked.
Management of host firewall
❑Incident Response and Recovery
Have a plan ready for responding to firewall breaches or incidents.
Regularly back up firewall settings so you can restore them quickly if something goes
wrong.
If an incident happens, quickly isolate affected systems and start recovery.
❑VPN and Remote Access Security
Only allow secure VPN connections for remote workers.
Limit remote access to essential services and always use strong authentication.
Regularly review who has access to remote systems to keep them secure.
❑Advanced Firewall Features
Enable Intrusion Detection and Prevention (IDS/IPS) to spot and block attacks.
Management of Anti-virus
❑Installation and Configuration
Install antivirus software on all devices in your organization to ensure
comprehensive protection.
Configure the software to automatically scan files, emails, and websites for
threats.
Set up the software to run real-time protection to catch malware as it tries to
infect the system.
❑Regular Updates
Make sure the antivirus software automatically updates its virus definitions to
catch the latest threats.
Regularly update the software itself to ensure it's working with the most current
features and security patches.
Set updates to occur during off-hours to avoid disrupting work.
Management of Anti-virus
❑Scheduled and Manual Scans
Set the antivirus to run automatic full-system scans at regular intervals (e.g.,
weekly or monthly).
Encourage users to manually scan suspicious files or areas of their system
when they notice something unusual.
Make sure scans cover all drives and files, not just system-critical ones.
❑Monitoring and Alerts
Monitor antivirus alerts to quickly respond to detected malware or security
breaches.
Set up automatic notifications when malware is found or when an action is
required, such as quarantining a file.
Review the antivirus logs regularly to track threats and actions taken.
Management of Anti-virus
❑Incident Response
Have a plan for handling antivirus alerts, including steps for isolating affected devices
and containing malware.
If malware is detected, disconnect infected devices from the network to prevent the
spread.
Perform a deeper scan and review backups to recover any lost or damaged data.
❑User Education and Awareness
Educate users about safe computing habits, like avoiding suspicious emails,
downloads, and websites that might introduce malware.
Remind employees to report any unusual behavior on their devices, such as system
slowdowns or unexpected pop-ups.
Offer training on identifying phishing emails and other social engineering attacks that
antivirus software might miss.
Wi-fi Security
• Wi-Fi security refers to the measures and protocols put in place to
protect a wireless network from unauthorized access and cyber
threats.
• It includes encryption methods, password protection, and
network configurations that prevent attackers from intercepting
data, accessing private networks, or causing disruptions.
Some tips to enhance wi-fi security
➢Use Strong Encryption (WPA3 or WPA2)
Always use the strongest encryption available, such as WPA3 or WPA2,
to protect your network.
These protocols secure your data from being intercepted by hackers.
Avoid outdated encryption like WEP, which is easily cracked.
➢Change Default Router Credentials
Default usernames and passwords are widely known and can be
exploited by attackers.
Set a strong, unique password for your router’s admin panel. This
prevents unauthorized access to your router’s settings.
Some tips to enhance wi-fi security
➢Use a Strong Wi-Fi Password
Set a unique and complex password for your Wi-Fi network, ideally 12-16
characters long.
A strong password should mix uppercase, lowercase, numbers, and
special characters.
This makes it harder for attackers to guess or crack your password.
➢Enable a Guest Network
Set up a separate guest network for visitors or devices that don’t need
access to your main network.
This isolates their traffic and protects your sensitive data. Use a different
password for the guest network to add another layer of security.
Some tips to enhance wi-fi security
➢Enable a Firewall
Ensure your router's firewall is turned on to monitor and block
suspicious traffic.
A firewall helps protect your network from malicious intrusions. It’s
an essential tool for filtering out harmful data from the internet.
➢Limit the Range of Your Wi-Fi Signal
➢Turn Off Wi-Fi When Not in Use
➢Enable Two-Factor Authentication (2FA)
Configuration of basic security policy and
permissions
Creating a basic security policy and configuring permissions is
crucial for ensuring that only authorized users and devices have
access to sensitive data and resources.
Approaches for setting up security policy and permissions:-
Define Security Objectives
• Identify what you want to protect, such as customer data or
company systems. Set clear goals to guide your security efforts.
This helps you prioritize security measures that are most
important.
Configuration of basic security policy and
permissions
Identify User Roles and Responsibilities
• Create roles for different users, like admins, managers, or regular
employees. Assign permissions based on what they need to do
their job. This ensures everyone has access to the right resources
without excess privileges.
Set Permissions Based on Roles
• Give each user only the access they need for their job (read, write,
delete). Limit sensitive data access to those who need it. This
helps prevent unauthorized actions on important files or systems.
Configuration of basic security policy and
permissions
Implement Strong Password Policies
• Require users to create complex passwords with a mix of letters,
numbers, and symbols. Enforce password changes every 60-90
days. Strong passwords make it harder for attackers to guess or
crack.
Enable Multi-Factor Authentication (MFA)
• Require users to confirm their identity with something extra, like a
code sent to their phone. MFA adds an additional layer of
protection. Even if a password is stolen, the attacker still needs
the second factor to log in.
Configuration of basic security policy and
permissions
• Establish Regular User Audits and Reviews
Review user accounts and their permissions regularly to make sure
they still match their roles. Remove unnecessary access rights
when employees change positions or leave. Regular audits prevent
unused or outdated permissions from becoming a security risk.
• Configure Firewall and Network Policies
Set up rules to allow or block certain types of network traffic. Use
firewalls to protect systems from unauthorized access. Proper
configuration helps keep malicious traffic from entering your
network.
Configuration of basic security policy and
permissions
• Apply Security Software (Antivirus/Antimalware) Policies
Make sure all devices have up-to-date antivirus software installed
and running. Schedule regular scans to catch potential threats
early. Security software helps prevent malware and viruses from
compromising your systems.
• Set Backup and Recovery Permissions
Control who can create, access, and restore backups of critical
data. Only trusted users should have backup and recovery
permissions. This ensures your important data can be recovered in
case of an incident without unauthorized access.
Configuration of basic security policy and
permissions
Monitor and Log Activity
• Track actions taken on your network, like logins or file access, and
store this data securely. Regularly review activity logs for
suspicious actions. Monitoring helps detect and respond to
security incidents quickly.
Encrypt Sensitive Data
• Protect sensitive information by converting it into unreadable text,
both when stored and when sent over the network. Use strong
encryption methods like AES-256. This ensures that even if data is
intercepted, it remains secure.
THANK YOU