Unit: - Module 4: System and Application Security Chapter 1: Security Architectures and Models Chapter 2: System Security Chapter 3: OS Security Chapter 4: Wireless Networks and Security
Chapter 1: Security Architectures and Models 1. Designing Secure Operating Systems 2. Controls to enforce security services 3. Information Security Models
Chapter 1: Security Architectures and Models Designing Secure Operating Systems -- Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. -- OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised -- Microsoft Windows, Apple macOS , Linux, Android and Apple's iOS . -- Operating system functions Controls the backing store and peripherals such as scanners and printers. Deals with the transfer of programs in and out of memory. Organises the use of memory between programs. Organises processing time between programs and users. Maintains security and access rights of users. Deals with errors and user instructions.
Chapter 1: Security Architectures and Models Designing Secure Operating Systems -- Secure design principles Establish the context before designing a system . Make compromise difficult. Make disruption difficult. Make compromise detection easier. Reduce the impact of compromise. -- Most important points in design of secure system? -- Cryptography: Cryptography is one of the most important tools for building secure systems . -- The proper use of cryptography ensures the confidentiality of data, protect data from unauthorized modification, and authenticate the source of data
Chapter 1: Security Architectures and Models Designing Secure Operating Systems Steps for Designing Secure Operating Systems Keep up with system and software security updates Have your intelligence with you Enable a firewall Adjust your browser settings Install antivirus and anti spyware software Password protect your software and lock your device Encrypt your data Use a VPN -- While using a VPN, all of your internet traffic is encrypted and tunneled through an intermediary server in a separate location. This masks your IP, replacing it with a different one, so that your ISP can no longer monitor your activity.
Unit: - Module 4: System and Application Security 2. Controls to enforce security services -- Common examples are -- Authentication solutions -- Firewalls -- Antivirus software -- Intrusion detection systems ( IDSs) --Intrusion protection systems (IPSs ) -- Three primary areas or classifications of security controls -- Management security -- Operational security -- Physical security controls
Chapter 1: Security Architectures and Models 2. Controls to enforce security services Tips for Successfully Implementing your Security Control -- Be sure the solution solves your problems. -- Be sure the security problem you are solving justifies the effort necessary to implement and run it. -- Include the people who will be implementing and managing the system from the earliest stages. -- Be sure your deployment timeline is realistic. -- Be sure your testing is realistic.
Chapter 1: Security Architectures and Models Information Security Models -- A security model precisely describes important aspects of security and their relationship to system behavior. -- The primary purpose of a security model is to provide the necessary level of understanding for a successful implementation of key security requirements . -- A computer security model is a scheme for specifying and enforcing security policies. -- A security model may be founded upon a formal model of access rights, a model of computation , a model of distributed computing, or no particular theoretical grounding at all . .
Chapter 1: Security Architectures and Models Practical application of information security
Chapter 2: System Security 1 . Desktop Security 2. email security: PGP and SMIME 3. Web Security: web authentication, SSL and SET 4. Database Security
Chapter 2: System Security Desktop Security -- Encrypt your network connection -- Encrypt sensitive files stored locally -- Encrypt private information stored in the cloud -- Use a free VPN service to protect public Wi-Fi connections -- Prevent keystroke loggers, other data snoops -- Perform a manual virus scan with the free Malware bytes Anti-Malware -- Disable images in e-mail -- Be wary of e-mail attachments -- Use a standard ( non administrator ) account in Windows -- Destroy old data
Chapter 2: System Security Desktop Security -- Always install Licensed Software so that you have regular updates of your Operating system and Applications. -- In case of open source software, make sure to update frequently. -- Read the “Terms and Conditions” / “License Agreement” provided by vendor/software before installation. -- Properly shutdown and switch off your personal computer after the use along with your external devices like Monitor, Modem, Speakers etc.
Chapter 2: System Security Desktop Security -- Physical Security Regularly clean your system and it’s components. -- Turn your PC Off before cleaning it. -- Properly organize the power cables, wires, to prevent from water, insects etc. -- While working at PC, be careful not to spill water or food items on it. -- Always follow “Safely Remove” option provided by the Operating System while disconnecting the USB devices. -- By setting BIOS password, you can prevent unauthorized access to your personal computer. -- Switch off the computer when it’s not in use.
Chapter 2: System Security Desktop Security -- Internet Security: -- Follow Internet Ethics while browsing. -- Check the copyright issues before using the content of Internet. -- Always access the site which uses https (Hyper Text Transfer Protocol Secure) while performing Online transactions, Downloads etc , which is secure. -- If the site uses SSL, verify the Certificate details like Who is the owner, Expiry date of the certificate etc to confirm whether it is trusted or not. You can do this by clicking the lock icon. -- Use only Original Websites for downloading the files rather than Third Party websites. -- Scan the downloaded files with an updated Anti-Virus Software before using it. -- Install and properly configure a Software firewall, to protect against malicious traffic.
Chapter 2: System Security Desktop Security -- Data Security -- Enable Auto-updates of your Operating System and update it regularly. -- Download Anti-Virus Software from a Trusted Website and Install. Make sure it automatically gets updated with latest virus signatures. -- Download Anti-Spyware Software from a Trusted Website and Install. Make sure it automatically updates with latest definitions. -- Use “Encryption” to secure your valuable Information. Note: For encryption password is required, always remember the password used while encrypting it, else data would not be available thereafter. -- Strong password should be used for “Admin” Account on computer and for other important applications like E-mail client, Financial Applications (accounting etc ). -- Backup : Periodically backup your computer data on CD / DVD or USB drive etc.. in case it may get corrupted due to HardDisk failures or when reinstalling/format ting the system.
Chapter 2: System Security Desktop Security -- Browser Security: -- Always update your Web Browser with latest patches. -- Use privacy or security settings which are inbuilt in the browser . -- Also use content filtering software. -- Always have Safe Search “ON” in Search Engine
Chapter 2: System Security 2 . email security: PGP and SMIME Steps to Secure emails -- Security at sender’s side -- Security at receiver’s side -- Secure transmission of emails
Chapter 2: System Security Security at sender’s side -- Can be implemented by non-technical person -- Use incognito mode while sending mails -- Avoid using public computers Security at receiver’s side -- Avoid downloading attachments from unknown sender’s -- Check Email headers to verify identity of sender
Chapter 2: System Security Secure transmission of emails:- -- PGP (Pretty Good Privacy) -- SMIME (Secure / Multipurpose Internet Mail Extension)
Chapter 2: System Security Secure transmission of emails:- -- PGP (Pretty Good Privacy) -- Provides confidentiality and authentication service -- Available free worldwide -- Based on extremely secure algorithm -- PGP Services -- Confidentiality -- Authentication -- Compression -- Resemble -- Segmentation -- E-mail compatibility
Chapter 2: System Security email security: SMIME (Secure / Multipurpose Internet Mail Extension) -- It is standard for exchanging secure mails with the help of encryption -- Provides support for varying content -- Supported by major email like outlook, Netscape -- Public key cryptography is used for digital sign, encrypt or decrypt the email . -- User acquires a public-private key pair with a trusted authority and then makes appropriate use of those keys with email applications.
Chapter 2: System Security
Chapter 2: System Security 3 . Web Security: web authentication, SSL and SET 4 . Database Security
Unit: - Module 4: System and Application Security Chapter 3: OS Security 1. OS Security Vulnerabilities, updates and patches 2. OS integrity checks 3. Anti-virus software 4. Configuring the OS for security 5. OS Security Vulnerabilities, updates and patches
Unit: - Module 4: System and Application Security Chapter 4: Wireless Networks and Security 1. Components of wireless networks 2. Security issues in wireless