LECTURE 1 b) TSecurity Methods
LECTURE 1 b) TSecurity Methods
Security Methods
Learning Objectives
Secure a Workstation
Disposal Methods
Wireless Security
Wired Security
2
WORKSTATION SECURITY
3
Security Policy
4
Protecting Physical Equipment
Since stealing the whole PC is the
easiest way to steal data, physical
computer equipment must be secured:
•Control access to facilities
•Use cable locks
•Lock telecommunication rooms
•Use security screws
•Use security cages around equipment
•Label and install sensors on equipment
Physical Security Devices
5
Protecting Digital Data
6
Personal Firewall
7
Check Firewall Settings
8
Update and Patch Management
9
Patch Management
1. Depending on the type of update, Windows Update can deliver the
following:
1. Security updates – A broadly released fix for a product-specific
security-related vulnerability. Security vulnerabilities are rated
based on their severity, which is indicated in the Microsoft
security bulletin as critical, important, moderate, or low
2. Critical updates – A broadly released fix for a specific
problem addressing a critical, non-security related bug
3. Service Packs – A tested, cumulative set
of hotfixes, security updates, critical updates,
and important updates, as well as
additional fixes for problems found internally since the release of the
product. Service Packs might also contain customer requested
design changes or features
1. How to install patch
10
Know Your Antivirus/Antimalware
11
Windows Action Center
12
User Account Control (UAC)
13
User Account Control (UAC)
14
DISPOSAL METHODS
15
Computer Disposal and Recycling
16
Computer Disposal and Recycling
17
INTERNET SECURITY
18
Internet Attacks
19
Internet Attacks
1. Privacy attacks
A.Cookies
B.Adware
2. Attacks while surfing
A.Redirected Web traffic
B.Drive-by downloads
3. E-mail attacks
A.Spam
B.Malicious attachments
C.Embedded hyperlinks
20
Internet Defenses
21
E-Mail Security Settings
22
Embedded Hyperlink
23
WIRELESS SECURITY
24
Does Wireless Security Matter?
25
1. Lock Down AP
26
2. Access
27
Levels of Wireless Security
28
3. Turn on WPA2
Wireless Security
29
4. Limit Users By MAC
30
Summary
31
Technical Terms
1. Security Policy - A formal document defining network, computer,
and user security protocols for a system or organization.
1. Two-way personal software firewall – Inspects network traffic
passing through it and denies/permits passage based on rules
2. Application-aware firewall – Allows user to specify which desktop
applications can connect to the network.
1. SPI – Stateful Packet Inspection. Tracks of the state of network
connections and only packets matching a known active connection
to enter and all others will be rejected
2. Service Packs – A tested, cumulative set of hotfixes, security
updates, critical updates, and updates, as well as additional fixes for
problems found internally since the release of the product. Service
Packs might also contain customer requested design changes or
features.
32
Technical Terms
33
Technical Terms
34
Technical Terms
35
END