Module 8 Part 2
Module 8 Part 2
Architecture
Module 8 – Host, Application, Data and
Cloud Security
Host Security
4
Objectives
Discuss Data Loss Prevention (DLP)
Residential
keyed entry lock
Locks
Deadbolt lock
9
• Recommended key management
procedures
• Change locks after key loss or
theft
Securing • Inspect locks regularly
• Issue keys only to authorized
Devices users
(cont’d.) • Keep records of who uses and
turns in keys
• Keep track of issued keys
• Master keys should not have
identifying marks
10
Cipher Locks
• Alternative access method: physical token
• ID badge may contain bearer’s photo
• ID badge emits a signal identifying the
Securing owner
Devices • Proximity reader receives signal
• Access list
RFID tag • Record of individuals who have
permission to enter secure area
• Records time they entered and left 13
14
Securing Devices
Mantrap (cont’d.)
• Mantrap
• Separates a secured area
from a non-secured area
• Device monitors and controls
two interlocking doors
• Only one door may open at
any time
15
Video surveillance
(cont’d.) Fencing
ROLLER BARRIER
ANTI-CLIMB PAINT
ROTATING SPIKES
16
17
18
Securing Devices
Hardware Security
(cont’d.)
• Hardware security
• Physical security protecting host system
hardware
• Portable devices have steel bracket security slot
• Cable lock inserted into slot and
secured to device
• Cable connected to lock secured to desk
or immobile object
• Laptops may be placed in a safe
• Locking cabinets
• Can be prewired for power and network
connections
• Allow devices to charge while stored
19
How do we secure
Mobile Devices
Mobile device security 20
• Fingerprints
• Face ID
Securing • Phone Lock Numeric
Devices • Password
Mobile • Mobile devices’ unique security
Device features
• Remote wipe / sanitation
Security • Data can be remotely
(cont’d.) erased if device is stolen
• GPS tracking
• Can pinpoint location to
within 100 meters
21
Securing Devices
(cont’d.)
23
24
26
27
4. Deploy the settings
• Security template: collections of
security configuration settings
Securing the • Process can be automated
Operating • Group policy
System • Windows feature providing
centralized computer
Software management
• A single configuration may be
cont. deployed to many users
• Security patch
• General software update to cover
discovered vulnerabilities
ACTIVE
DIRECT
ORY
DOMAIN
28
29
• Hotfix addresses specific
customer situation
• Service pack accumulates
Securing the security updates and additional
Operating features
System 5. Implement patch management
• Modern operating systems can
Software perform automatic updates
cont. • Patches can sometimes create
new problems
• Vendor should thoroughly test
before deploying
• Automated patch update service
30
• Manage patches locally rather
than rely on vendor’s online
update service
Securing the • Advantages of automated patch
update service
Operating • Administrators can force updates
System to install by specific date
• Users cannot disable or
Software circumvent updates
cont. • Computers not on the Internet
can receive updates as soon as
they reconnect
31
• Anti-virus
• Software that examines a
computer for infections
Securing • Scans new documents that might
contain viruses
with Anti- • Searches for known virus
patterns
Malware
Software • Challenges of anti-virus
• Vendor must continually search
for new viruses, update and
distribute signature files to users
32
• Spammers can distribute malware
through email attachments
• Spam can be used for social
engineering attacks
Securing with • Spam filtering methods
Anti-Spam • Bayesian filtering
Methods • Local host filtering
• Blacklist
• Whitelist
• Blocking certain file attachment
types
SPAM
• https://www.youtube.com/watch?v=O2L2Uv9pdDA
33
34
Pop-up
• Firewalls
• Designed to prevent malicious
packets from entering or leaving
computers
Firewalls • May be hardware or software-
based
• Host-based software firewall runs
on the local system
36
Host-Based
Firewalls
• Microsoft
Window’s Host
Based firewall
• Three
designations for
networks: Public,
home (Private),
or work (Domain)
• Users can
configure
settings for each
type separately
37
• Log: record of events that occur
• Log entries
• Contain information related to a
specific event
• Audit log can track user
Monitoring authentication attempts
System Logs • Access log can provide details about
requests for specific files
• Monitoring system logs
• Useful in determining how an
attack occurred and whether
successfully resisted
38