Security

Computer Tips
Computer Training
Computer Repair
Computer Networking
Computer Books

Career Services
Internet Consulting
Online Marketing
Internet Consulting

Meet Jo Blitz A. Escotal
Deals of Month
Testimonials
Motivational Speaker

Join Our Mailing List!
SIGN ME UP




Computer Security

Computer security is a field of computer science concerned with the control of risks related to computer use.

Network vs. Host Security

Type I (something you know) password, pin, codes, secret word

Type II (something you have) keys, tokens, smart cards

Type III (something you are) biometrics

Type IV (something you do) gait, handwriting

Goals of Security

1. Identify
2. Authenticate
3. Authorize


Threats

Internal vs. External Threats
Hackers vs. Cracker


Pen Testing – Penetration Testing

White Hat - Legalized Hacking
Black Hat – Illegal Hacking
Gray Hat – in the middle of White and Black Hat Testing


Physical Security – Physical protection of your networks

Access Badge
ACL (Access Control List) MAC Mandatory Access Control,
DAC Discretionary Access Control, RBAC Role/Rule Based Access
Alarms
Biometrics (Fingerprints, Retina, Palm, Voice, Body)
Bright Lights
Cameras (Web, CCTV, Security, IP Based, Hidden)
CCTV (Close Circuit Television)
Codes
Dogs
Doors
Electronic Locks
Fence
Gates
Guards
Keys
Locks
Logical Security
Magnetic Stripe Card
Man Trap
Motion Sensors
Smart cards
Surveillance
Turnstiles
Walls

Technical Security

OS Hardening and Application Hardening
Service Packs, Hot fixes and Updates
Firewall
Proxy Server
IDS/IPS
Anti-virus
Anti-spyware
Encryption
Monitoring Software
Audit Software
Logs (Application, System, Security, Firewall, History)
Vulnerability Software

Procedural

Security Policies
Security Templates
Disaster Recovery (Hot, Warm and Cold Site, BCM and BIA)
Availability (UPS, RAID, Generator)
SLA and Contracts
Sign in and Sign Out
Foreign Objects
Monitoring
Authentication
Verification
Change
Incident
Problem
Security
Risks
Counter Measures

Social Engineering

Information Gathering
Dumpster Diving
Manipulation (pretty girls, games)
Deception
Trust Games
Chaos Theory
Lost Souls
Piggy Backing
Phishing
Vishing
Profiling
Shoulder Surfing
Act like you belong
Vendor Tricks
Sad Story
Maintenance
Gifts
Trickery (Tech Support for PC and ATM machines)
Uniforms
Authority Figure
Everyone has a price

Security Policies Sign in and Sign out Policies and Multi-factor Security

Password (Dictionary, Brute Force or Hybrid Attacks) Kerberos
Length, Expiration, History, Complexity and Strength

CIAConfidentiality, Integrity and Availability (Security Cornerstone and Foundation)

AAA - Authentication, Authorization and Accounting

Biometrics (Fingerprints, Retina, Isis, Facial, Palm Scans, Voice, Body) Only negative dealing with false positives

Smartcards / Tokens
RSA Smart Card

Virus – software written by someone to destroy or replicate

Trojans – Disguise malicious code within apparently useful applications
Logic Bombs – Trigger on a particular condition
Worms – Self replicating forms of other types of malicious code
Bots – Systems that can be controlled by outside sources
Rootkits – Pieces of software that can be installed and hidden on a PC mainly for the purpose of compromising a system
Boot Sector – Virus that attacks the MBR
Executable – Virus that will execute
Macro – Automated Virus

Anti-Virus Software (Norton, McAfee, AVG, Bit Defender and Kaspersky)

Pop Ups
Browser Redirection
Security Alerts
Slow Performance
Spam
Internet connectivity issues
Lock ups
Renamed system files
Files disappearing
File permission changes
Hijacked
Access Denied
Rogue Devices


Adware, Popups, Malware, Grayware Use Anti-Spyware (Malwarebytes, AdAware, Windows Defender and SpyBot)


Web Vulnerabilities
(Java, Java Script, Active X, Cookies, CGI, SMTP Relay)

SSL or TLS Secure Socket Layer and Transport Layer Security

Encryption
(Hash) EFS, Bit Locker Encryption) Clear Text vs. Cipher and Digital Signatures

Dumpster Diving – Shred information

Firewall

A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy. Firewalls can either be hardware and/or software based.

Firewall Types

Network Based Firewall Example:

Sonic Wall
Cisco
Juniper
Fortinet

Host Based Windows Firewall:

WIndows FIrewall
Black Ice Defender
Zone Alarm

Packet Filter or Stateless Firewall
checks for specific data packets restricts or allows access to network based on certain criteria
(IP Address, Port Number, Protocol ID and MAC Address)

Stateful Firewall monitors data traffic streams from one end to the other.
Circuit Level Firewall
operate at the transport and session layers
Application Layer Firewalls
operate at the application layer
Demilitarized Zones are perimeter network protection
Proxy Servers
Other Roles for a Firewall: Content Filtering, Signature Identification, Virus Scanning, NAT, Filtering and Bandwidth Management

Auditing and Event Logging
(Security Logs, Application Logs, History Logs and Syslogs)


Honeypots and Honeynets
A system use as a decoy to attract and deflect attacks from hackers

An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet.

An Intrusion prevention system (IPS) is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities.

Behavior Based, Signature Based and Anomaly Based

Tunneling and Encryption

ISAKMP –
Internet Security Association and Key Management Protocol is a procedure use for authentication, creation and management of security associations key generation techniques and threat mitigation.
PPTP – Point to Point Tunneling Protocol creates a secure tunnel between two points on a network, over which other connectivity protocols, such as PPP, can be used.
L2TP – Layer 2 Tunneling Protocol is a combination PPTP and Cisco L2F technology.
IPSec
– IP Security protocol is designed to provide secure communications between systems.

Site to Site and Client-to-Site

In Site to Site implementation, as the name implies, whole networks are connected together
In a Client-to-Site scenario, individual clients connect to the network remotely.

TCP/IP and MAC Filtering – Accepts or Rejects incoming connection based on IP and MAC addresses.

Authentication Security Protocols –
PAP, SPAP, CHAP, MS CHAP and EAP

Remote Access Security

RAS –Remote Access Service
RDP – Remote Desktop Protocol
PPPoE – Point to Point Protocol over Ethernet
PPP – Point to Point Protocol
VNC – Virtual Network Computing
ICA – Independent Computer Architecture (Citrix)
SSH – Secure Shell

Cryptography- is the practice and study of hiding information

PKI – Public Key Infrastructure (Asymmetric vs. Symmetric) Private vs. Public Key it is used for web security, confidentiality, digital signatures and secures email.

Certificates, CA Certificate Authority, Templates, CRL Certificate Revocation List and RA Registration Authority

Public Key – A non secret that forms half of the cryptographic key pair used with a public key algorithm.
Private Key – The secret half of cryptographic key pair used with a public key algorithm.

Asymmetric (RSA, El Gamal, Diffie Hellman and Elliptic Curve)
Symmetric (MD, Blowfish, RC, DES, 3DES, AES)

TPM – Trusted Platform Module

Types of DOS Denial of Service Attacks
Fraggle – Is type of attack that spoofs UDP packets
Smurf – Similar to Fraggle causes a BSOD
Ping of Death – Sends an oversize ICMP datagram that is use to crash a system
SYN Flood – overwhelms victim with a flood of SYN packets
Buffer Overflow – Causes system to crash by overflowing the buffer
ICMP Flood – Also known as a Ping Flood

Other Attacks: Eavesdropping, Back Door, Man-in-the-middle, Spoof, Rogue Access Point, Phishing

 

top10computercertifications2010


Copyright © 2022 Escotal.Com