Vous êtes sur la page 1sur 14

Abhijit Chakrabarty

abhijitchakrabarty@ymail.com
Presents

System & Network Security


Acknowledgment
• I sincerely acknowledge the guidance, support
and assistance provided to me by Dr. Dipankar
Sarkar, Director, D.I.T., Prof. B. Giri, H.O.D.
Computer Sc. & Engg, and other faculty members
of D.I.T.
• I would like to thank my parents for extending
their cooperation and support to carry out the
project.
• I am grateful to the Corporation for
providing such a wonderful platform of OpenOffice
Impress.
Contents

Security and its needs

The seven common rules of security

Account Security

Data Encryption

Network attacks

Firewall

Security tools

Summary
What is “Security”
• According to www.dictionary.com
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call
building security if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent
espionage, sabotage, or attack.
• 3. Measures adopted, as by a business or
homeowner, to prevent a crime such as burglary or
assault: Security was lax at the firm's smaller plant.
…etc.
Why do we need security?

We need security to protect vital information or data
while allowing access of our PC to other concerned
persons, to provide authentication and control for
resources, guarantee for availability of resources.
− Trade secrets, medical records, etc.

Provide authentication and access control for
resources
− Ex: AFS

Guarantee availability of resources
− Ex: 5 9’s (99.999% reliability)
The seven common rules of security
• Files containing confidential or secret information that may invite
attention of hackers should not be restored in a PC.
• Plug holes to ensure that hackers do not gain access to the
system.
• Don’t leave space for hackers to build a nest on the system.
• Set basic traps on the system that are connected to the internet,
Eg, tripwire, crack etc.
• Regularly monitor reports generated by the security tools.
• Educate yourself on the issues and take corrective measures.
• Always remain vigilant for suspicious activities around.
Account Security
• System administration needs to be monitored on password
security.
• Implement UNIX type password protection system.
• Use shadow password files.
• Use programs that prevent simple passwords and also update new
passwords periodically.
• Use authentication systems such as KERBEROS.
• System administration should always be alert and watchful for off-
hours user, log-ins and off-site log-ins by local users.
• User accounts should not be set to 777.
• Hardware security features for single user should be implemented.
Data Encryption

• Sensitive data should be stored / communicated in encrypted


form.
• Systems using crypt at first should compress the data, since
compressed data is un-intelligible so decrypting is harder.
• Tying-up PGP(Pretty Good Privacy) & DES encryption utilities
with the Operating System to provide secure environment for
data.
Network Attacks
• Unauthorized access by people who shouldn't use your computer
resources are able to connect and use them.
• Exploitation of known weaknesses in programs. Some programs
are not designed with strong security resulting in exposure to
hackers.
• Denial of service cause the service or program to cease functioning
or prevent others from making use of the service or program.
• Spoofing-mimic the actions of another host.
• Eavesdropping-hosts are configured to “listen” to and capture data
not belonging to it.
Firewall
• A firewall is a secure and trusted machines that sits between a
private network and a public network.

• It is used to filter packets based on a combination of features.

Internet
Firewall

Firewall
Intranet
Security Tools
• Use of proper software for authentication of users.
• Proper configuration of firewall.
• Installing regular security patches.
• Periodical upgradation of system & other softwares.
• Use of third-party security tools like tcpd, TRIPWIRE,etc.
• Using several public domain tools to periodically scan passwords,
system and user files looking for vulnerabilities like crack,etc.
Summary
• Securing individual systems is the first step towards providing
secure system.
• User account and password authentication are basics.
• Essential data needs to be encrypted.
• Single user system needs to be monitored.
• Becoming familiar with system security tools and implementing
them to the system.
• Setup proper Firewall Rules.
• Periodically update system in order to remove system attacks.
Thank You

Vous aimerez peut-être aussi