Security Awareness: Applying Practical Security in Your World

Download Report

Transcript Security Awareness: Applying Practical Security in Your World

Security Awareness: Applying
Practical Security in Your
World
Chapter 2: Personal Computer Security
Objectives

Define physical security and explain how to
apply it

List the different types of data security

Work with operating system security
Security Awareness: Applying Practical Security in Your World
2
Personal Computer Security

Ensuring physical security of personal
computers is one of the basic lines of defense


Users tend to focus on one or two defenses
Personal computer security:

Physically secure

Data secured on the personal computer

Operating systems and software secured
Security Awareness: Applying Practical Security in Your World
3
Physical Security

Physical Security  The process of protecting the
computer itself

Goal: prevent unauthorized users from reaching the
equipment to use, steal or vandalize it


Frequently overlooked security process
Two types of PC equipment to be protected:
Desktop
Security Awareness: Applying Practical Security in Your World
Portable
4
Protecting Desktop Equipment

Desktop equipment  Equipment located in an
office or not regularly moved to other locations


Door locks are first line of defense
Defended by:
What you have
What you know
What you are (See Figure 2-1)
Security Awareness: Applying Practical Security in Your World
5
Protecting Desktop
Equipment
Figure 2-1
Security Awareness: Applying Practical Security in Your World
6
Using What You Have to Provide
Protection

Door locks protect based on what you have: A
KEY!

Two types of door locks:
Preset (or key-in-knob) lock
Deadbolt lock
Security Awareness: Applying Practical Security in Your World
7
Using What You Have to
Provide Protection (continued)
Preset lock
Deadbolt lock
Security Awareness: Applying Practical Security in Your World
8
Door Lock Best Practices

Procedure to monitor use of locks and keys

Keep track of keys issued

Keep records of who uses and turns in keys

Inspect locks regularly

Change locks immediately upon theft or loss of
keys
Security Awareness: Applying Practical Security in Your World
9
Door Lock Best Practices
(continued)

No markings identifying master keys

Only issue keys to authorized persons

Keys not in use must be secured in a locked safe

Mark master keys with “Do Not Duplicate” and
erase manufacturer’s serial numbers
Security Awareness: Applying Practical Security in Your World
10
Using What You Know to Provide
Protection

Cipher lock  Use
buttons that must be
pushed in correct
sequence to grant
access

What you know:
COMBINATION
Security Awareness: Applying Practical Security in Your World
11
Using Who You Are to Provide
Protection

Biometrics  Using unique human traits to
authenticate

Traits that can be used:
Fingerprint
Hand
Retina
Face
Iris
Voice

Fingerprint matching is most common

Different methods of scanning
Biometrics weaknesses: expensive, difficult to use,
and prone to errors and security breach

Security Awareness: Applying Practical Security in Your World
12
Using Who You Are to Provide
Protection (continued)
Fingerprint Scanner
Figure 2-5
Security Awareness: Applying Practical Security in Your World
13
Using Who You Are to Provide
Protection (continued)
Ridge points
Selected locations
Security Awareness: Applying Practical Security in Your World
14
Protecting Portable Equipment

Portable equipment is designed to be mobile 
Requires different steps to secure

Device locks (See Figure 2-8)

Notebook safes (See Figure 2-9)

Stealth signal transmitter

Software installed that cannot be detected

If stolen, the transmitter sends a signal to the
monitoring center when it connects to the Internet

Signal can be analyzed to track down the device
Security Awareness: Applying Practical Security in Your World
15
Protecting Portable Equipment
(continued)
Device lock
Notebook safe
Security Awareness: Applying Practical Security in Your World
16
Data Security

Data security  More important than physical
security

Data is more valuable than devices

Two methods to secure data:
Cryptography  Scrambles data so no one can read
it
Access controls  Restricts who has access to the
data
Security Awareness: Applying Practical Security in Your World
17
Cryptography

Cryptography  Science of transforming
information so it is secure during transmission or
storage

Encryption:
Changing original text into a secret, encoded
message

Decryption:
Reversing the encryption process to change text
back to original, readable form
Security Awareness: Applying Practical Security in Your World
18
Cryptography (continued)

Public and Private Keys


Private Key System (See Figure 2-10)

Same key used to encrypt and decrypt messages

Key must remain secret

Distributing the private key can be difficult
Public Key System (See Figure 2-11)

Public key used to encrypt (Key openly distributed)

Private key used to decrypt (Key must remain
secret)

Eliminates the need for secret distribution of keys
Security Awareness: Applying Practical Security in Your World
19
Cryptography (continued)
Figure 2-10
Security Awareness: Applying Practical Security in Your World
20
Cryptography (continued)
Figure 2-11
Security Awareness: Applying Practical Security in Your World
21
Digital Signatures

Digital signature  Public key system used to
prove that the person sending the message is who
they claim to be

Sender creates digital signature using their private
key before encrypting the message with the
receiver’s public key (See Figure 2-12)
Security Awareness: Applying Practical Security in Your World
22
Cryptography (continued)
Figure 2-12
Security Awareness: Applying Practical Security in Your World
23
Digital Certificates

Digital certificate  Links or binds a specific
person to a public key

Issued by a Certificate Authority (CA)

Public keys that have been digitally signed by a
trusted third party (the CA) that attests to the
identity of the key owner
Security Awareness: Applying Practical Security in Your World
24
Authentication

Authentication  Confirms the identity of the
person requesting access

Passwords

Biometrics

Tokens

Smart cards
Security Awareness: Applying Practical Security in Your World
25
Authentication (continued)

Passwords

Secret combination of
words or numbers
that identify the user

Used in combination
with usernames (See
Figure 2-13 at right)

First line of defense
WEAK SECURITY
Security Awareness: Applying Practical Security in Your World
26
Authentication (continued)

Password shortcuts that compromise security:

Short passwords

Common word passwords

Personal information password

Same for all accounts

Located (written down) under mouse pad or
keyboard

A stale, unchanged password
Security Awareness: Applying Practical Security in Your World
27
Authentication (continued)

Techniques for choosing hard-to-crack
passwords that are easy to remember:




Long phrases
Substitute special characters
Replace letters with numbers
Group multiple accounts by security level


Choose same password, but make increasingly
difficult to crack depending on security level
Do not write down passwords on paper  Password
protected document (See Figure 2-14)
Security Awareness: Applying Practical Security in Your World
28
Authentication (continued)
Password Options
Figure 2-14
Security Awareness: Applying Practical Security in Your World
29
Authentication (continued)

Biometrics

Biometrics used for
door locks, can also be
used for access control
to personal computers

Fingerprint scanners
(See Figure 2-15)
Security Awareness: Applying Practical Security in Your World
Fingerprint scanner
30
Authentication (continued)

Tokens  Security device that authenticates the
user by embedding the appropriate permission in
the token itself
What you have (token)
+ What you know (password or PIN)
= ACCESS GRANTED
Security Awareness: Applying Practical Security in Your World
31
Authentication (Cont.)

Smart Cards  Contains a chip that stores the
user’s private key, login information and public key
digital certificate

Can be either credit cards or USB tokens (See
Figure 2-16 below)
Security Awareness: Applying Practical Security in Your World
32
Operating System Security

Modern operating systems have sophisticated
security enhancements


Most of these security tools not implemented by
users—off by default
Operating system hardening  Process of
making a PC operating system more secure
Patch management
Antispyware software
Security Awareness: Applying Practical Security in Your World
Antivirus software
Permissions
33
Patch Management

Patches  Updates to software to correct a
problem or weakness

Critical step in securing a system

Generally not automatically installed

User must download and install (See Figure 2-17) or
give specific permission for automatically
downloaded patches to be installed
Security Awareness: Applying Practical Security in Your World
34
Patch Management
Figure 2-17
Security Awareness: Applying Practical Security in Your World
35
Patch Management (continued)

Patch management  Describes the tools,
utilities, and processes for keeping patches up-todate

Different types of software updates (See Table 2-1)

Weakness of patch management: often up to the
user to download and install the patch

Automated patch management is becoming more
prevalent
Security Awareness: Applying Practical Security in Your World
36
Patch Management (continued)
Table 2-1
Security Awareness: Applying Practical Security in Your World
37
Antivirus and Antispyware Software

Antivirus software  Works with the operating
system to identify and destroy viruses

Antivirus software companies regularly create updates
to detect and destroy the latest viruses


Definition files or signature files
Antispyware software  Software that disinfects
a computer from spyware and monitors any
spyware activity

Spyware not only tracks what the user is doing, but can
be used by hackers to identify security weaknesses
Security Awareness: Applying Practical Security in Your World
38
Shares

Share  Any object that is shared with others

Necessary for today’s networked computers, but can
open security weaknesses if not done correctly

General rules for setting up shares:

Determine who needs access and what level

Use groups and assign permissions to the group
rather than individuals

Assign most restrictive permissions that still allow
users to perform necessary tasks

Organize resources
Security Awareness: Applying Practical Security in Your World
39
Summary

Physical security is protecting the computer and
equipment itself.




Easily and often overlooked area of personal
computer security.
One primary goal: prevent unauthorized users from
reaching the equipment to steal, use or vandalize it.
Door locks are the first line of defense in physical
security.
The steps taken to protect portable devices are
different, because they are designed to be moved.
Security Awareness: Applying Practical Security in Your World
40
Summary (continued)

Data security is as important as physical
security.

Two procedures used to secure data:

Cryptography


Science of transforming information so that it
is secure during transmission or storage
Restrict users from accessing the data using a
variety of tools

Passwords—Biometrics—Tokens—Smart cards
are examples of the tools used for
authentication of identity
Security Awareness: Applying Practical Security in Your World
41
Summary (continued)

Operating system hardening is the process of
making a PC operating system more secure

Patch management

Antivirus software

Antispyware software

Setting correct permissions for shares
Security Awareness: Applying Practical Security in Your World
42