1102 - Chapter 27 Securing Computers - Slide Handouts
1102 - Chapter 27 Securing Computers - Slide Handouts
1102 - Chapter 27 Securing Computers - Slide Handouts
Securing Computers
1
Episode: Threats
2
Episode Description
3
Key Terms
• 2:07 - Objective term - Man-in-the-middle (on-
path) attack
• 3:30 - Objective term - Spoofing
• 4:26 - Objective term - Denial of Service (DoS)
• 5:25 - Objective term - Distributed Denial of
Service (DDoS)
• 5:51 - Zombie
• 6:46 - Objective term - Zero day
• 7:47 - Objective term - Renamed system files
• 8:13 - Objective term - Disappearing files
4
Quick Review
• The term "security" encompasses host-
based, network-based, and physical
security
• Common threats include man-in-the-middle
(on-path), Denial of Service (DoS), and
Distributed DoS (DDoS) attacks
• Symptoms of such attacks include
renamed system files, missing files,
and more
5
Episode: Dealing with Threats
6
Episode Description
7
Key Terms
• 0:47 - Objective term - Patch your system!
• 1:43 - Objective term - Run anti-malware and
antivirus
• 1:58 - Objective term - Run a host-based
software firewall
• 2:41 - Intrusion detection systems (IDS)
• 3:43 - Intrusion prevention systems (IPS)
• 5:02 - Endpoint management
• 5:55 - Objective term - Unified Threat
Management (UTM)
8
9
Quick Review
• Host-based security includes patching,
anti-malware/antivirus, and firewalls
• Network-based security includes
intrusion detection (IDS), intrusion
prevention (IPS), and firewalls
• Unified Threat Management (UTM)
includes IDS/IPS, firewalls, and anti-
malware all in one and is often available
in the Cloud
10
Episode: Physical Security
11
Episode Description
12
Key Terms
13
Key Terms
14
Key Terms
15
Mantrap (Access Control Vestibule)
Source: https://www.newtonsecurityinc.com/datacenter_landing.html
16
Quick Review
• Physical security includes perimeter
security, room locks, and individual device
security
• Security guards and mantraps help
perimeter security
• Locks, badges, smart cards, and biometrics
enable room-level security
• Device security devices include server
locks, USB locks, and screen filters
17
Episode: Passwords and Authentication
18
Episode Description
19
Key Terms
• 0:55 - Hash
• 3:37 - Objective term - Brute-force
• 5:44 - Objective term - Dictionary attack
• 7:16 - Rainbow tables
• 9:09 - Objective term - Password best
practices
• 9:13 - Objective term - 1. Set strong
passwords
20
Key Terms
• 9:16 - Objective term - Make complex
passwords with upper- and lowercase letters
and use different character types
• 9:36 - Objective term - Looooong passwords
• 10:37 - Objective term - 2. Password
expiration
• 10:54 - Objective term - (Also...make sure
your employees aren't taping their passwords
to their monitors...)
21
Key Terms
• 11:22 - Objective term - 3. Require
screensavers with password login on desktops
• 11:49 - Objective term - 4. Require lock screens
with passwords on mobile devices
• 12:20 - Objective term - 5. BIOS/UEFI
passwords
• 12:36 - 6. Require passwords everywhere!
• 13:01 - Objective term - 7. Multifactor
authentication (MFA)
22
Password Cracking Websites
23
Download Kali Linux
24
Quick Review
• Modern password security relies on
passwords and hashes
• Methods for cracking passwords and
hashes include brute force,
dictionary attacks, and rainbow tables
• Use best password practices, such as
upper- and lowercase letters, numbers,
non-alphanumeric characters, and making
long passwords
25
Episode: Multifactor Authentication (MFA)
Core 1: 1.1 Given a scenario, install and configure laptop hardware and
components.
Core 1: 2.4 Summarize services provided by networked hosts.
Objective(s): Core 2: 2.1 Summarize various security measures and their purposes.
Core 2: 2.5 Given a scenario, manage and configure basic security
settings in the Microsoft Windows OS.
26
Episode Description
27
Key Terms
• 0:15 - Objective term - Multifactor
authentication (MFA)
• 0:21 - Something you know
• 0:49 - Two-factor authentication (2FA)
• 0:55 - Something you have
• 1:06 - Objective term - Hardware token
• 1:13 - Objective term - Authenticator
application
• 1:36 - Something you are
28
Key Terms
• 1:40 - Objective term - Biometrics such as
fingerprint, palmprint, or retinal scanners
• 1:54 - Objective term - Facial recognition
• 1:59 - Somewhere you are
• 2:11 - Objective term - Supervisory Control
and Data Acquisition (SCADA)
• 3:17 - Objective term - OS login options
include facial recognition, fingerprint
recognition, and personal identification
number (PIN)
29
Quick Review
• Multifactor authentication (MFA) is a
mechanism to help verify access to a
particular resource using multiple forms of
proof
• MFA includes one or more of the following:
something you know, something you have,
something you are, or somewhere you are
• Modern MFA can utilize unique biometric
details, like retinal, fingerprint, or facial
scans, or even detect your exact location
30
Episode: Malware
31
Episode Description
32
Key Terms
33
Key Terms
34
Key Terms
• 9:45 - Objective term - Security/desktop
alerts
• 10:06 - Objective term - OS update failure
• 10:27 - Spam
• 11:17 - Hijacked e-mail
• 11:35 - Automated replies
• 12:01 - Objective term - Invalid certificates
• 13:12 - Objective term- Network LAN tap
35
Quick Review
• Worms propagate via a network
• Trojans masquerade as benign programs,
but carry a payload for later
• Ransomware attacks lock down systems
in exchange for money
• Malware infestations manifest as browser
redirection, application crashes, update
failures, and more
36
Episode: Anti-Malware
37
Episode Description
38
Key Terms
• 0:36 - 1. No such thing as antivirus program
• 0:44 - Objective term - Anti-malware
• 1:13 - Objective term - Recovery console
(now called Recovery mode on the
objectives)
• 1:34 - Objective term - Backup/restore/
reimage
• 1:46 - Objective term - End-user education
39
Key Terms
• 2:08 - Objective term - Software firewalls
• 2:24 - Secure DNS
• 3:02 - 1. Non-ISP DNS servers
• 3:34 - 2. Encrypt DNS requests
• 5:35 - Objective term - 1. Identify and research
(investigate and verify) malware symptoms
• 5:48 - Objective term - 2. Quarantine the infected
systems
• 6:11 - Objective term - 3. Disable System Restore
(in Windows)
40
Key Terms
• 6:38 - Objective term - 4. Remediate the infected
systems
• 6:42 - Objective term - 4a. Update the anti-
malware software
• 7:34 - Objective term - 4b. Scan and use removal
techniques (safe mode, pre-installation
environment)
• 9:52 - Objective term - 5. Schedule scans and run
updates
• 10:27 - Objective term - 6. Enable System restore
and create a restore point (in Windows)
• 10:56 - Objective term - 7. Educate the end user
41
Cloudflare Free DNS
• https://www.cloudflare.com/dns/
42
Quick Review
• Prepare for malware attacks with good
backups, end-user education,
and firewalls
• Use secure DNS options, such as a
trusted third-party site and encryption
• Memorize the CompTIA A+ seven-step
malware-recovery process
43
Episode: Social Engineering
44
Episode Description
45
Key Terms
• 0:42 - Objective term - Impersonation
• 2:14 - Objective term - Tailgating
• 2:56 - Unauthorized access
• 3:11 - Objective term - Shoulder surfing
• 3:40 - Objective term - Dumpster diving
• 4:44 - Objective term - Phishing (targets people via e-
mail/websites)
• 4:44 - Objective term - Vishing (targets people via
voice/phone calls)
• 4:59 - Objective term - Spear phishing (targeting specific
people)
• 4:59 - Objective term - Whaling (targeting high-ranking
people)
46
Quick Review
• Social engineering enables bad people to
use information from people to gain access
to sensitive information
• Social engineering attacks include phishing,
vishing, shoulder surfing, spear phishing,
whaling, tailgating, impersonation, and
dumpster diving
• Phishing, vishing, spear phishing, and
whaling attacks seek personal or financial
information with targeted scams
47
Episode: Licensing
48
Episode Description
49
Key Terms
• 0:49 - “An Open Letter to Hobbyist” - Bill Gates, 1976
• 0:56 - Required licensing fee for the BASIC programming
language
• 1:01 - Licensing
• 1:11 - Objective term - End-user license agreement (EULA)
• 1:55 - Objective term - Digital rights management (DRM)
• 2:55 - Objective term - Commercial/corporate license
• 3:11 - Objective term - Open-source
• 3:32 - GNU General Personal license (GNU GPL)
• 5:13 - Objective term - Personal license
• 5:31 - Enterprise license
• 6:26 - Per-processor license for Windows
50
Quick Review
• An End-user license agreement (EULA)
describes what users can do with licensed
software
• Digital rights management (DRM) controls
what users can do with some content
• Producers retain all rights to commercial
software
• Open-source software enables users to
change or modify the software
51
Episode: Incident Response
52
Episode Description
53
Key Terms
54
Key Terms
55
Quick Review
• Know your responsibilities
• Be sure to report the incident to the correct
management and/or law enforcement
agency based on company policies
• Preserve data integrity by copying the
suspicious drive
• Exercise proper chain-of-custody
procedures and always document,
document, document
56
Episode: Environmental Controls
57
Episode Description
58
Key Terms
• 0:46 - Objective term - Compliance to
government regulations
• 0:59 - Occupational Safety and Health
Administration (OSHA) in the US
• 1:53 - Objective term - Material safety data
sheet (MSDS)
• 2:02 - Objective term - MSDSes include how
to safely handle and dispose of materials and
their environmental impacts
59
Key Terms
60
Key Terms
• 4:21 - Enclosures
• 4:29 - Objective term - Air filters/mask
• 4:50 - Objective term - Compressed air
• 5:01 - Objective term - Vacuums
• 5:22 - Objective term - Anti-static vacuum
61
Quick Review
• Check the MSDS for any spills or
problems with equipment
• Monitor temperature and humidity levels
• Ensure proper ventilation
• Employ surge suppressors and UPS
backup devices
• Clean systems with compressed air and
specialized vacuums
62
Episode: Malware in Action
63
Episode Description
This episode demonstrates some
destructive malware and ransomware
applications to give you an idea of what to
look for when you suspect a system has
been infected. WARNING! If you attempt
these at home, be sure you’re in a sandbox
or virtual machine that is appropriately
segmented from your network. These
viruses can cause real issues!
64
Key Terms
• 0:22 - Objective term - Sandbox testing
• 1:04 - MEMZ virus
• 2:06 - Objective term - Viruses can lead to
applications crashing, unexpected application
behavior, low memory warnings, system
instability
• 2:26 - Objective term - Viruses can also lead
to services not starting
• 2:34 - Objective term - Some viruses cause
high network traffic which can lead to limited
or no Internet connectivity
65
Key Terms
• 3:04 - Objective term - Data usage limit
notification
• 3:29 - Objective term - Limited Internet
connectivity
• 4:00 - Objective term - Fake security warnings
• 4:15 - Objective term - Leaked personal files/data
• 4:28 - Objective term - High number of ads
• Objective term - Frequent shutdowns
• Objective term - Sluggish response time
66
theZoo on GitHub
67
Quick Review
• Windows Sandbox can be a safe and
effective way to test potentially dangerous
files, but always take the proper
precautions beforehand
• Knowing how malware infects a system is
critical in understanding how to stop it
• Symptoms of malware include applications
crashing, low memory warnings, system
instability, services not starting,
unexplained high network traffic, fake
security warnings, and high number of ads
68