Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
System Defense Defending Home Networks Introduction • Computer Security • What it’s not • Person, Place or Thing • What it is • Independent – Of Network OS – Of Host OS – Of Application • Process • Achievable Why Computer Security? Data Integrity Confidentiality Availability Non Repudiation Identification Authentication Identify Risk • Physical Access • Humans • Application Runtime • Browser • Email • IM • Network Access Risk Vectors Consol Physical Host Removable Media Application Browser ICQ IM email Network FTP SMTP snmp Defend Yourself • Know your system • • • • • • What it is What’s on it What Changes on it Who is using it Who can use it Patch vulnerabilities The Onion of Security HARDWARE File System HOST OS Config App Config LAN WAN Physical Protection HARDWARE File System BIOS Password File System File Integrity Anti Virus Scanner File System Encryption HARDWARE File System Host Defenses Host based Firewall Host based IDS HOST OS Config Configuration Management Auditing Patch Maintenance IP Restrictions Backup HARDWARE Application Defenses Configuration File System Patch HOST OS Config App Config Encrypt Auditing Access Control HARDWARE LAN Defenses LAN Based IDS File System HOST OS Config Ensure Hosts Authenticate App Config LAN Router Based ACL HARDWARE WAN Defenses File System HOST OS Config App Config LAN Firewall WAN Filter Both Directions Implement NAT Router Based ACL Resources • Firewalls • Linux • Back it up with an IDS • Tiny Firewall – www.tinysoftware.com • Zonelabs – www.zonelabs.com • Netscreen - www.netscreen.com Resources • IDS • Port Sentry - www.psionic.com • Snort – www.snort.org • AracNIDS - http://www.whitehat.org Resources • Configuration advice • Microsoft – www.microsoft.com/technet/treeview/default.as p?url=/technet/security/tools/tools.asp • Linux –www.cert.org/securityimprovement/index.html • Benchmark – www.cisecurity.org Resources • Vulnerability Awareness. • www.securityfocus.com - Bugtrak. • www.nessus.org – Nessus Scanner. • www.sans.org/top20.htm - SANS/FBI Top 20 Vulnerabilities. • www.cert.org - Carnegie Mellon CERT. • www.nipc.gov/warnings/computertips.htm The National Infrastructure Protection Center. • Best Newsletter http://www.neohapsis.com/. • http://www.cio.com/research/security. Resources • Encryption • OpenPGP – www.openpgp.org • File integrity • MD5 • Tripwire www.tripwire.com/products/linux/ • www.tripwire.org • Port Scanner - NMAP – www.nmap.org • AV Software - McAfee • Pest Patrol Q&A