25
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 1 CHAPTER 9 Fundamental Security IT Essentials: PC Hardware and Software v4.0

Ite pc v40_chapter9_edited_h

Embed Size (px)

Citation preview

Page 1: Ite pc v40_chapter9_edited_h

© 2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0Chapter 1 1

CHAPTER 9Fundamental Security

IT Essentials: PC Hardware and Software v4.0

Page 2: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Objectives■ Why is security important?

■ What are security threats?

■ What are some security procedures?

■ What are the preventive maintenance techniques

for security?

■ What can be done to troubleshoot security?

Page 3: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

■ Define viruses, worms, and Trojan horses.

■ Explain web security.

■ Define adware, spyware, and grayware.

■ Explain denial of service.

■ Describe spam and popups.

■ Explain social engineering.

■ Explain TCP/IP attacks.

■ Explain hardware deconstruction and recycling.

Page 4: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Threats

To successfully protect computers and the network, a technician must understand both of the following types of threats to computer security:

■ Physical: Events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring.

■ Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.

Page 5: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

■ Internal: Employees who have access to data, equipment, and the network. Internal attacks can be characterized as follows:

■ Malicious threats are when an employee intends to cause damage.

■ Accidental threats are when the user damages data or equipment unintentionally.

Page 6: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

■ External: Users outside an organization who do not have authorized access to the network or resources. External attacks can be characterized as follows:

■ Unstructured attacks, which use available resources, such as passwords or scripts, to gain access to and run programs designed to vandalize.

■ Structured attacks, which use code to access operating systems and software.

Page 7: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Viruses, Worms, and Trojan Horses

Virus is attached to small pieces of computer code, software, or documents. It executes when the software is run on a computer.

A virus is transferred to another computer through e-mail, file transfers, and instant messaging.

The virus hides by attaching itself to a file on the computer. When the file is accessed, the virus executes and infects the computer. A virus has the potential to corrupt or even delete files on your computer, use your e-mail to spread itself to other computers, or even erase your hard drive.

Page 8: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

A worm is a self-replicating program that is harmful to networks. A worm uses the network to duplicate its code to the hosts on a network, often without any user intervention.

A Trojan horse technically is a worm. It does not need to be attached to other software. Instead, a Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another. Trojans often are disguised as useful software. The Trojan program can reproduce like a virus and spread to other computers.

Page 9: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Virus protection software, known as antivirus software, is software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer.

Page 10: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Web Security

Web security is important because so many people visit the World Wide Web every day. Some of the features that make the web useful and entertaining can also make it harmful to a computer.

Page 11: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Adware, Spyware, and Grayware Adware is a software program that displays

advertising on your computer. Most often, adware is displayed in a popup window. Adware popup windows are sometimes difficult to control; they open new windows faster than users can close them.

Grayware or malware is a file or program other than a virus that is potentially harmful. Many grayware attacks are phishing attacks, which try to persuade the user to unknowingly give attackers access to personal information.

Page 12: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Spyware, a type of grayware, is similar to adware. It is distributed without any user intervention or knowledge.

Phishing is a form of social engineering, in which the attacker pretends to represent a legitimate outside organization, such as a bank.

Page 13: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Denial of Service Denial of service (DoS) is a form of attack that

prevents users from accessing normal services, such as e-mail or a web server.

DoS attacks can affect servers and computers in the following ways:

■ Ping of death is a series of repeated, larger-than-normal pings that are intended to crash the receiving computer.

■ An e-mail bomb is a large quantity of bulk e-mail sent to individuals, lists, or domains, intending to prevent users from accessing e-mail.

Page 14: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Distributed DoS (DDoS) is another form of attack that uses many infected computers, called zombies, to launch an attack.

Page 15: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Spam and Popup Windows

Spam, also known as junk mail, is unsolicited e-mail. In most cases, spam is used for advertising. However, spam can be used to send harmful links or deceptive content.

(popups) designed to capture your attention and lead you to advertising sites. Uncontrolled popup windows can quickly cover your screen and prevent you from getting any work done.

Page 16: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Social Engineering

A social engineer is a person who gains access to equipment or a network by tricking people into providing the necessary information.

Often, the social engineer gains the confidence of an employee and convinces that person to divulge username and password information.

Page 17: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

The following are some basic precautions to help protect against social engineering:

■ Never give out your password.

■ Always ask for the ID of unknown persons.

■ Restrict the access of unexpected visitors.

■ Escort all visitors.

■ Never post your password in your work area.

■ Log off or lock your computer when you leave your desk.

■ Do not let anyone follow you through a door that requires an access card.

Page 18: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Procedures

You should use a security plan to determine what will be done in a critical situation.

Security plan policies should be constantly updated to reflect the latest threats to a network.

A security plan with clear security procedures is the basis for a technician to follow.

Security plans should be reviewed each year.

Page 19: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Pyramid

Wireless security

Data protection

Physical Equipment

Local security policy

Page 20: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

What Is Required in a Basic Local SecurityPolicy?

Although local security policies may vary between organizations, all organizations should

ask the following questions:

■ What assets require protection?

■ What are the possible threats?

■ What should be done in the event of a security breach?

Page 21: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

What Is Required in a Basic Local SecurityPolicy?

A security policy should describe how a company defines security issues:

■ A process for handling network security incidents

■ A process for auditing existing network security

■ A general security framework for implementing network security

■ Behaviors that are allowed

■ Behaviors that are prohibited

■ What to log and how to store the logs: Event Viewer, system log files, or security log files

■ Network access to resources through account permissions

■ Authentication technologies (such as usernames, passwords, biometrics, and smart cards) to access data

Page 22: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Tasks Required to Protect PhysicalEquipment

Physical security is as important as data security. When a computer is stolen, the data is also stolen.

There are several ways to physically protect computer equipment:

■ Control access to facilities.

■ Use cable locks with equipment

■ Keep telecommunication rooms locked.

■ Fit equipment with security screws

■ Use security cages around equipment

■ Label and install sensors, such as Radio Frequency Identification (RFID) tags, on equipment.

Page 23: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Locking Devices

For access to facilities, there are several means of protection:

■ Card keys that store user data, including level of access

■ Biometric sensors that identify the user’s physical characteristics, such as fingerprints

or retinas

■ Posted security guard

■ Sensors, such as RFID tags, to monitor equipment

Page 24: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Ways to Protect Data

Password protection can prevent unauthorized access to content. To keep attackers from gaining access to data, all computers should be password-protected.

Two levels of password protection are recommended:

■ BIOS prevents BIOS settings from being changed without the appropriate password.

■ Login prevents unauthorized access to the network.

Page 25: Ite pc v40_chapter9_edited_h

ITE PC v4.0Chapter 1 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Data Backups

■ Frequency of backups: Backups can take a long time. Sometimes it is easier to make full backup monthly or weekly and then do frequent partial backups of any data that has changed since the last full backup

■ Storing backups: Backups should be transported to an approved offsite storage location for extra security.

■ Security of backups: Backups can be protected with passwords. These passwords have to be entered before the data on the backup media can be restored.