Evolution of Mankind
What is Security?
Its a technique for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
need to protect
Our data Our ability to use our computers (denial of service attacks) Unauthorized Access & Use
Layers of Security
Physical
Physical Security
Physical
security consists of all mechanisms used to ensure that physical access to the computer system and networks is restricted to only authorized users.
Access Controls, physical barriers, etc
Host Security
Host security takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole.
Authentication and Logging Mechanisms Host based IDS File Integrity Checkers
Network Security
In
network security, an emphasis is placed on controlling access to internal computers from external entities.
Firewalls Intrusion Detection Systems (IDS) Access Controls on network devices Vulnerability Scanners
Web application is an application, generally comprised of a collection of scripts, that reside on a Web server and interact with databases or other sources of dynamic content.
Examples of Web applications include search engines, Webmail, shopping carts and portal systems
Security Model
Detection
Response
Attackers
Restricted Data
DoS
Automated Attacks
Encryption
Encryption
To protect a users identity or data from being read To protect data from being altered To verify that data originates from a particular user
Firewalls
A system or group of systems that enforce a network access control policy Filters data packet in and out of intended target Will mitigate the following attacks:
Denial of Services (DoS) Attacks Unauthorized Access Port-scanning and Probing
IDS is an application which detects attacks on computer systems and / or networks. Network-based Intrusion Detection
Monitors real-time network traffic for malicious activity Similar to a network sniffer Sends alarms for network traffic that meets certain attack patterns or signatures
Host-based Intrusion-Detection
Monitors computer or server files for anomolies Sends alarms for network traffic that meets a predetermined attack signature
Virus Protection
Software should be installed on all network servers, as well as computers. Shall include the latest version, as well as signature files (detected viruses) Should screen all software coming into your computer or network system (files, attachments, programs, etc.) Secure from:
Viruses and Worms Malicious Code and Trojans
THANK YOU!