Anda di halaman 1dari 18

Basics of Computer Security

Protecting the Personal Information which is held within your Computer.

Evolution of Mankind

What is Security?

Its a technique for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.

Why Computer Security?


The

Internet is a dangerous place

We are constantly being scanned for weak or vulnerable systems.


We

need to protect

Our data Our ability to use our computers (denial of service attacks) Unauthorized Access & Use

Layers of Security
Physical

Security Host Security Network Security Web Application Security

Physical Security
Physical

security consists of all mechanisms used to ensure that physical access to the computer system and networks is restricted to only authorized users.
Access Controls, physical barriers, etc

Host Security

Host security takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole.
Authentication and Logging Mechanisms Host based IDS File Integrity Checkers

Network Security
In

network security, an emphasis is placed on controlling access to internal computers from external entities.
Firewalls Intrusion Detection Systems (IDS) Access Controls on network devices Vulnerability Scanners

Web Application Security


A

Web application is an application, generally comprised of a collection of scripts, that reside on a Web server and interact with databases or other sources of dynamic content.
Examples of Web applications include search engines, Webmail, shopping carts and portal systems

Web Application Security


Application attacks are the latest trend when it comes to hacking. On average, 90% of all dynamic content sites have vulnerabilities associated with them. No single web server and database server combination has been found to be immune!

Security Model

Protection = Prevention + (Detection + Response) Prevention


Access controls Firewall Encryption

Detection

Response

Audit Logs Intrusion Detection System

Backups Incident Response teams Computer Forensics

Common Types of Attacks


Organizational Attacks

Attackers

Restricted Data
DoS

Automated Attacks

Accidental Breaches In Security

Connection Fails Denial of Service (DoS)

Viruses, Trojan Horses, and Worms

Overview of Security Technology


Encryption Secure communication Firewalls IDS (Intrusion Detection System) Virus Protection

Encryption

Encryption

is the process of encoding data

To protect a users identity or data from being read To protect data from being altered To verify that data originates from a particular user

Firewalls

Firewalls can provide:


Secure gateway to the Internet for internal clients Packet filtering Application filtering

A system or group of systems that enforce a network access control policy Filters data packet in and out of intended target Will mitigate the following attacks:
Denial of Services (DoS) Attacks Unauthorized Access Port-scanning and Probing

Intrusion Detection System (IDS)


IDS is an application which detects attacks on computer systems and / or networks. Network-based Intrusion Detection
Monitors real-time network traffic for malicious activity Similar to a network sniffer Sends alarms for network traffic that meets certain attack patterns or signatures

Host-based Intrusion-Detection
Monitors computer or server files for anomolies Sends alarms for network traffic that meets a predetermined attack signature

Virus Protection

Software should be installed on all network servers, as well as computers. Shall include the latest version, as well as signature files (detected viruses) Should screen all software coming into your computer or network system (files, attachments, programs, etc.) Secure from:
Viruses and Worms Malicious Code and Trojans

THANK YOU!

Anda mungkin juga menyukai