Computer Security Issues


Published on

Computer security areas are examined

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The Best Geeks ($pring Cha Ching)
  • Computer Security Issues

    1. 1. Computer Security Rus Bel Cell: 281-475-9168 Email: [email_address] Web:
    2. 2. Encryption Standards <ul><li>AES – Advanced Encryption Standard </li></ul><ul><ul><li>de facto encryption standard for commercial transactions in the private sector </li></ul></ul><ul><ul><li>offers security of a sufficient level to protect data for the next 20 to 30 years. </li></ul></ul><ul><ul><li>supports key sizes of 128, 192 and 256 bits </li></ul></ul><ul><ul><li>The larger the key size the harder to break the key. </li></ul></ul><ul><ul><li>Results in: AES 128, AES 192 and AES 256 </li></ul></ul>
    3. 3. Encryption Standards <ul><li>SSL – Secure Sockets Layer </li></ul><ul><ul><li>commonly-used protocol for managing the security of a message transmission on the Internet </li></ul></ul><ul><li>TLS – Transport Layer Security </li></ul><ul><ul><li>Recently succeeded SSL, based on SSL </li></ul></ul>
    4. 4. First Line of Defense <ul><li>Your Router/Firewall </li></ul><ul><ul><li>PORT: A window by which an application or service can send information to/from your network. </li></ul></ul><ul><ul><li>A Firewall does not necessarily close all unnecessary PORTS. All un-necessary PORTS into your network should be closed. </li></ul></ul>
    5. 5. Email Security <ul><li>Locally hosted email is the most secure </li></ul><ul><li>Remotely hosted exchange encrypted by SSL or TLS </li></ul><ul><li>IMAP with either SSL or TLS </li></ul><ul><li>POP3 with SSL or TLS </li></ul><ul><li>If email solution does not use either SSL or TLS then your transmissions are at risk of being eavesdropped on or snooped. </li></ul>
    6. 6. Internet Security https:// <ul><li>https: uses SSL, that is what the s is for </li></ul><ul><li>If a website is asking for sensitive data and it does not have https:// showing don’t trust it period. </li></ul><ul><li>If you get an invalid certificate or expired certificate warning it could be a sign of a fraudulent website. </li></ul><ul><li>Look at the website address to make sure that you really are where you think you are. </li></ul>
    7. 7. Disk/File Encryption <ul><li>Full Disk Encryption (FDE) </li></ul><ul><ul><li>Entire hard drive is encrypted, data is stored in an encrypted format </li></ul></ul><ul><li>Encrypted File System (EFS) </li></ul><ul><ul><li>A single file or folder is encrypted </li></ul></ul>
    8. 8. Disk/File Encryption <ul><li>Must have the “key” in order to decrypt. </li></ul><ul><li>Great for laptops that have secret information. If you don’t have the users password you cannot access the data. If you use an outside utility to change the users password then that data is inaccessible </li></ul><ul><li>Companies should have a backup key encryption process for when the user forgets their password </li></ul>
    9. 9. Virus Spyware Adware Malware Protection <ul><li>Vipre from Sunbelt Software </li></ul><ul><ul><ul><li>Very highly rated </li></ul></ul></ul><ul><ul><ul><li>Does not slow your system down as much as others </li></ul></ul></ul><ul><ul><ul><li>< $100 for unlimited home use copies </li></ul></ul></ul><ul><ul><ul><li>$10-25 per seat for corporate use, minimum of $100 order. </li></ul></ul></ul><ul><li>MalwareBytes </li></ul><ul><ul><ul><li>$Free </li></ul></ul></ul><ul><ul><ul><li>Very good in combination with Vipre to clean up infested computers. Must be run manually. </li></ul></ul></ul>
    10. 10. Email Virus and SPAM filtering <ul><li>If locally hosting email either: </li></ul><ul><ul><li>Use a product to filter for Virus/Spam </li></ul></ul><ul><ul><li>Use a service where you mail is directly sent to them first so they can scan for email/SPAM </li></ul></ul><ul><li>If using hosted exchange: </li></ul><ul><ul><li>Make sure that their service will scan for Virus and SPAM </li></ul></ul><ul><li>Make sure your Antivirus program will hook into your email program. </li></ul>
    11. 11. Protecting from Power hits <ul><li>Wall Outlet </li></ul><ul><ul><li>Power can surge above and fall below recommended values and stress the components </li></ul></ul><ul><li>Extension Cord or Power Tap </li></ul><ul><ul><li>Adds more outlets, does nothing to protect power surge </li></ul></ul><ul><li>Surge Protector </li></ul><ul><ul><li>Adds more outlets and provides protection from power surges </li></ul></ul>
    12. 12. Protecting from power hits <ul><li>Battery Backup </li></ul><ul><ul><li>Provides uninterruptable power to units for a period of time. </li></ul></ul><ul><ul><li>The larger the Volt Amps the longer it will last </li></ul></ul><ul><ul><ul><li>350VA - ~ 10min </li></ul></ul></ul><ul><ul><ul><li>500VA - ~ 15min </li></ul></ul></ul><ul><ul><ul><li>750VA - ~ 20min </li></ul></ul></ul><ul><ul><ul><li>1050VA - ~30+ min </li></ul></ul></ul><ul><ul><ul><li>1500VA - ~45+ min </li></ul></ul></ul><ul><ul><li>Most units have Battery and Surge Protection Outlets and Surge Protection Only Outlets. </li></ul></ul><ul><li>Battery Backup with AVR (Automatic Voltage Regulation) </li></ul><ul><ul><li>Everything that a Battery Backup does plus extra Voltage Regulation </li></ul></ul>
    13. 13. Battery Backup Guidelines <ul><li>Make sure that the battery has been hooked up internally (APC units) </li></ul><ul><li>Make sure that the following is always connected to the Battery Backup section versus the Surge Only </li></ul><ul><ul><li>Any networking equipment </li></ul></ul><ul><ul><ul><li>Routers </li></ul></ul></ul><ul><ul><ul><li>Switches </li></ul></ul></ul><ul><ul><ul><li>Cable/DSL Modems </li></ul></ul></ul><ul><ul><li>Computers </li></ul></ul><ul><ul><li>Monitors </li></ul></ul><ul><ul><li>Possibly (External USB hard drives) </li></ul></ul>
    14. 14. Backup and Disaster Recovery (What If’s) <ul><li>You lose your computer to theft, fire, voltage spikes, or a natural disaster (hurricane/tornado) </li></ul><ul><li>Your computer’s motherboard dies </li></ul><ul><li>Your hard drive dies </li></ul><ul><li>What happens to your data? </li></ul><ul><ul><li>Email </li></ul></ul><ul><ul><li>Financial Data (QuickBooks, Peachtree, Quicken) </li></ul></ul><ul><ul><li>Pictures/Music </li></ul></ul><ul><ul><li>Client Data </li></ul></ul>
    15. 15. Backup Options <ul><li>External Hard Drives </li></ul><ul><ul><li>Can be automated </li></ul></ul><ul><ul><li>Two will allow swapping out and taking offsite </li></ul></ul><ul><li>Remote Backup </li></ul><ul><ul><li>Performed over the Internet to an offsite location </li></ul></ul><ul><ul><li>Automated usually at end of the day </li></ul></ul>
    16. 16. Remote Backup Considerations <ul><li>Do I need to access the data remotely? </li></ul><ul><li>Do I need to keep multiple versions of files? </li></ul><ul><li>How much data do I need to backup? </li></ul><ul><li>Am I willing to sacrifice service for price? </li></ul><ul><ul><li>Long hold times </li></ul></ul><ul><ul><li>Non American accent </li></ul></ul><ul><ul><li>Longer restore times </li></ul></ul><ul><li>Backup your data remotely </li></ul><ul><ul><li>Each night or as you update files the changes are uploaded to a remote online backup location. </li></ul></ul><ul><ul><li>Your data should be protected by your own generated encryption key, using AES 256. </li></ul></ul>
    17. 17. Disaster Recovery (Typical Issues) <ul><li>New computer has to be installed from scratch </li></ul><ul><li>Specific changes have to be remembered from other machine. </li></ul><ul><li>Applications have to be re-installed and all of the CD’s that you need must be located along with any product keys </li></ul><ul><li>Takes time and something will be missed </li></ul>
    18. 18. Disaster Recovery Issues (Solved) <ul><li>Preparation: </li></ul><ul><ul><li>Take a disk image of your key machines that can be universally restored to any new computer! </li></ul></ul><ul><ul><li>Keep these Images onsite and offsite </li></ul></ul><ul><ul><li>Initial Cost: Software/Hardware $340; labor $275 - $400 </li></ul></ul><ul><ul><li>Must be redone any time computer configuration changes! </li></ul></ul><ul><li>When it happens: </li></ul><ul><ul><li>Get a new computer and restore the saved image </li></ul></ul><ul><ul><li>Connect to your remote backup site and restore the changed data </li></ul></ul><ul><li>* Recovery can be done in less than 2-3 hours versus days and will be exactly as it was before! </li></ul>
    19. 19. Disaster Recovery For Servers <ul><li>Preparation: </li></ul><ul><ul><li>Install a Backup Disaster/Recovery (BDR) unit that will take an image snapshot of your Server every 15 minutes </li></ul></ul><ul><ul><li>Sends offsite via AES 256 the items that changed during the day </li></ul></ul><ul><li>When the disaster occurs (BDR unit not destroyed too): </li></ul><ul><ul><li>Virtualize the BDR unit and within minutes the business operation continues. </li></ul></ul><ul><li>When the disaster occurs (BDR unit also destroyed): </li></ul><ul><ul><li>Have the latest Image of your Server within the last 24 hours flown in on a New BDR unit. Should arrive within 24-48 hours. </li></ul></ul><ul><li>Once you have your new server: </li></ul><ul><ul><li>It is very simple to take the current Image on the BDR unit and universally restore it to your new server. </li></ul></ul><ul><ul><li>Bring up your new server </li></ul></ul><ul><ul><li>The BDR unit starts backing up the new server every 5 minutes. </li></ul></ul>
    20. 20. Clouds <ul><li>Definition </li></ul><ul><ul><li>Any business processing done through the Internet and not local to the business. </li></ul></ul><ul><li>Examples: </li></ul><ul><ul><li>Hosted email </li></ul></ul><ul><ul><li>Quickbooks online </li></ul></ul><ul><ul><li>Online CRM’s (Salesnexus, </li></ul></ul><ul><ul><li>Online file storage (Rackspace) </li></ul></ul><ul><ul><li>Online Sharepoint </li></ul></ul>
    21. 21. <ul><li>Access via the web </li></ul><ul><ul><li>https:// minimum requirement </li></ul></ul><ul><li>Access via client installed software: </li></ul><ul><ul><li>Look for AES 256 </li></ul></ul>Cloud Security
    22. 22. Cloud Security (What to ask?)