SlideShare a Scribd company logo
1 of 19
System Security

By
Mr. Amin Pathan

(M.Tech-CSE Pursuing, BE-IT)

Lecturer, MGM`s Polytechnic, Aurangabad.
Password Management

Password Security
The important protection against Intruders is the password system.
The password serves in used to authenticate the ID of the individual who logs on
to the system.
ID determines whether the user is authorized or unauthorized to gain access to a system.
ID determines the privileges according to the user.
ID is used as unrestricted access control.











Example

UNIX Operating System
User selects a password of up to eight printable characters in length.
This password is then converted into a 56 bit value that serves as the key input to an
encryption process based on DES.
DES Algorithm is modified using a 12 bit salt value.
This way, it prevents duplicate password.









Password Selection Strategies (Policies)

1. User Education



2. Computer Generated Password



3. Reactive password checking



4. Proactive password checking


1. User Education

Tell the importance of hard-to-guess password to the users & provide guidelines for
selecting strong password.
This strategy is unlikely to be successful at most installation, particularly where there is
a large user population.
Many users will simply ignore the guidelines, which may not be good judgement of what
is a strong password.






2. Computer Generated Password

Users will not be able to remember the computer generated password, even though the
password is pronounceable.
The passwords are reasonably random in nature.
So many times users write it down.






3. Reactive password Checking

The system periodically runs its own password cracker program to find out guessable
passwords.
If the system find any such a password then cancels it & notifies the user




4. Proactive password checking

User is allowed to select his/her own password.
At the time of selection, the system checks the password if the password is allowable
then allow otherwise reject it.




Components of Good password

As a password is meant to protect access and resources from intruders, it should not be
easy for some one else to guess.
Followings are the some guidelines to make a password more difficult to guess or obtain.
1. Password should be at least eight characters long
2. It should have at least three elements among following elements
(one or more uppercase, one or more lowercase, one or more numerals, one or
more special characters).
3. It should not consist of dictionary words.
4. It should not at all be the same as the users login name












Operating System Hardening

OS is the system software which handles input, output, display, memory management &
all highly tasks.
OS Example :Microsoft (95, 98, NT, 2000, ME, XP, Vista, 7, 8)
Apple Mac OS, Sun Solaris, UNIX
NOS includes additional functions and capabilities to help in connecting computers &
devices like printers to LAN
Example :- Windows Server 2003, Windows Server 2008.
OS Manufactures will not provide security but some recommendations or simplified
tools & settings to facilitate security of the system.














Operating System Hardening cont...

Removing unnecessary applications and utilities, disabling unnecessary services, setting
of appropriate permissions on files and updating the OS and application code to the
latest version.
This process of securing an OS is known as OS hardening and it is intended to make
the system more secure.




Step for securing Windows OS

1. Disable all unnecessary Service
2. Restrict permissions on files and access to the Registry
3. Remove unnecessary Programs.
4. Apply the latest patches and fix
5. Remove unnecessary user accounts and ensure password guidelines are in place










Weaknesses of Windows OS

MS Windows is not open source
Windows OS installation is insecure because it includes hidden shares, blank passwords
& it will not provide protection for known vulnerabilities.
It is difficult for administrator to understand how to properly use & configure the
software on various hardware setups.
It slows down after running 24 hours.
Many users don`t understand the security risk related to system while configuring it,
so this will cause for different attacks.
Less actual control over files.














UNIX OS Hardening

The process of securing UNIX OS to make the system more secure is called as
UNIX OS Hardening.
It means it disable unnecessary services, restrict permissions on files and directories,
apply password guidelines, remove unnecessary software, apply patches, and remove
unnecessary users.
UNIX system is very powerful and flexible.
This is all depending on the skill and knowledge of the system administrator because
so much control is placed in the administrators hand.
UNIX systems are easier to secure and baseline when they are providing a single
service or performing a single function, like acting as SMTP or web Server.












UNIX OS Hardening

Cont...

During installation process, it is easy to select which services and applications are
placed on the system.
On UNIX System by using the process status or by ps command, you can see which
processes, applications and services are running.
An administrator can identify the service by its unique process identifier or PID.
To stop a running service the process is identified by PID and then kill command id
used to stop the services.






Updates

To the standard user or system administrator is constant stream of updates designed to
correct problems, replace sections of code, or even add new features to an installed OS.
Vendors typically follows a hierarchy for software updates given below:1. Hotfix
2. Patch
3. Service Pack










Updates

Cont...

1. Hotfix
This term is given to small software update designed to address particular problem.
Hotfixes are typically developed in reaction to a discovered problem.
2. Patch
This term is given to large software updates designed to address particular problem.
Patches contain improvements or additional capabilities ans fixes for known bugs.
They are usually developed over a longer period of time.












Updates

Cont..

3. Service Pack
This term is given to a large collection of patches and hotfixes that are rolled into a single.
Service packs are designed to bring a system up to the latest known rather than
requiring the user or system administrator to download several of updates separately.






Thanks...!



More Related Content

What's hot

Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
Goals of protection
Goals of protectionGoals of protection
Goals of protectionveena ali
 
Secure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking ToolSecure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking Tooliosrjce
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMfaraz hussain
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating SystemMeghaj Mallick
 
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your WorkstationBrian Solomon, MBA
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application SecuritySunipa Bera
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 

What's hot (18)

Operating system security
Operating system securityOperating system security
Operating system security
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Ch11
Ch11Ch11
Ch11
 
Goals of protection
Goals of protectionGoals of protection
Goals of protection
 
system Security
system Security system Security
system Security
 
Secure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking ToolSecure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking Tool
 
Operating system security
Operating system securityOperating system security
Operating system security
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
File security system
File security systemFile security system
File security system
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating System
 
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your Workstation
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Presentation
PresentationPresentation
Presentation
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 

Viewers also liked

Charles Dickens
Charles DickensCharles Dickens
Charles DickensDavidwuTAS
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
9 password security
9   password security9   password security
9 password securitydrewz lin
 
Password Management
Password ManagementPassword Management
Password ManagementRick Chin
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security systempragyajain53
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password securitysecurityxploded
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy BeyondTrust
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 

Viewers also liked (11)

Cspass
CspassCspass
Cspass
 
Password Security
Password SecurityPassword Security
Password Security
 
Charles Dickens
Charles DickensCharles Dickens
Charles Dickens
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
9 password security
9   password security9   password security
9 password security
 
Password Security
Password SecurityPassword Security
Password Security
 
Password Management
Password ManagementPassword Management
Password Management
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security system
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 

Similar to System security by Amin Pathan

CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Jennifer Lopez
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxPrudhvi668506
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara
 
2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)Felipe Prado
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesInformation Technology
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS VulnerabilitiesSecurityTube.Net
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3qacaybagirovv
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromiseCal Bryant
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingTop 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingPaula Januszkiewicz
 

Similar to System security by Amin Pathan (20)

Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
 
Ch10
Ch10Ch10
Ch10
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingTop 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
 
Os lecture 6
Os lecture 6Os lecture 6
Os lecture 6
 

More from aminpathan11

4 g technology by amin
4 g technology by amin4 g technology by amin
4 g technology by aminaminpathan11
 
Cloud computing by amin
Cloud computing by aminCloud computing by amin
Cloud computing by aminaminpathan11
 
Access control by amin
Access control by aminAccess control by amin
Access control by aminaminpathan11
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathanaminpathan11
 
Human resource management by Amin
Human resource management by AminHuman resource management by Amin
Human resource management by Aminaminpathan11
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathanaminpathan11
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathanaminpathan11
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
Forms of ownerships in Management
Forms of ownerships in ManagementForms of ownerships in Management
Forms of ownerships in Managementaminpathan11
 

More from aminpathan11 (15)

E wallet by amin
E wallet by aminE wallet by amin
E wallet by amin
 
4 g technology by amin
4 g technology by amin4 g technology by amin
4 g technology by amin
 
Cloud computing by amin
Cloud computing by aminCloud computing by amin
Cloud computing by amin
 
Hololens
HololensHololens
Hololens
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Access control by amin
Access control by aminAccess control by amin
Access control by amin
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathan
 
Human resource management by Amin
Human resource management by AminHuman resource management by Amin
Human resource management by Amin
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
 
ISDN
ISDNISDN
ISDN
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
PSTN
PSTNPSTN
PSTN
 
Management
ManagementManagement
Management
 
Forms of ownerships in Management
Forms of ownerships in ManagementForms of ownerships in Management
Forms of ownerships in Management
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 

System security by Amin Pathan

  • 1. System Security By Mr. Amin Pathan (M.Tech-CSE Pursuing, BE-IT) Lecturer, MGM`s Polytechnic, Aurangabad.
  • 2. Password Management Password Security The important protection against Intruders is the password system. The password serves in used to authenticate the ID of the individual who logs on to the system. ID determines whether the user is authorized or unauthorized to gain access to a system. ID determines the privileges according to the user. ID is used as unrestricted access control.      
  • 3. Example UNIX Operating System User selects a password of up to eight printable characters in length. This password is then converted into a 56 bit value that serves as the key input to an encryption process based on DES. DES Algorithm is modified using a 12 bit salt value. This way, it prevents duplicate password.     
  • 4. Password Selection Strategies (Policies) 1. User Education  2. Computer Generated Password  3. Reactive password checking  4. Proactive password checking 
  • 5. 1. User Education Tell the importance of hard-to-guess password to the users & provide guidelines for selecting strong password. This strategy is unlikely to be successful at most installation, particularly where there is a large user population. Many users will simply ignore the guidelines, which may not be good judgement of what is a strong password.   
  • 6. 2. Computer Generated Password Users will not be able to remember the computer generated password, even though the password is pronounceable. The passwords are reasonably random in nature. So many times users write it down.   
  • 7. 3. Reactive password Checking The system periodically runs its own password cracker program to find out guessable passwords. If the system find any such a password then cancels it & notifies the user  
  • 8. 4. Proactive password checking User is allowed to select his/her own password. At the time of selection, the system checks the password if the password is allowable then allow otherwise reject it.  
  • 9. Components of Good password As a password is meant to protect access and resources from intruders, it should not be easy for some one else to guess. Followings are the some guidelines to make a password more difficult to guess or obtain. 1. Password should be at least eight characters long 2. It should have at least three elements among following elements (one or more uppercase, one or more lowercase, one or more numerals, one or more special characters). 3. It should not consist of dictionary words. 4. It should not at all be the same as the users login name      
  • 10. Operating System Hardening OS is the system software which handles input, output, display, memory management & all highly tasks. OS Example :Microsoft (95, 98, NT, 2000, ME, XP, Vista, 7, 8) Apple Mac OS, Sun Solaris, UNIX NOS includes additional functions and capabilities to help in connecting computers & devices like printers to LAN Example :- Windows Server 2003, Windows Server 2008. OS Manufactures will not provide security but some recommendations or simplified tools & settings to facilitate security of the system.       
  • 11. Operating System Hardening cont... Removing unnecessary applications and utilities, disabling unnecessary services, setting of appropriate permissions on files and updating the OS and application code to the latest version. This process of securing an OS is known as OS hardening and it is intended to make the system more secure.  
  • 12. Step for securing Windows OS 1. Disable all unnecessary Service 2. Restrict permissions on files and access to the Registry 3. Remove unnecessary Programs. 4. Apply the latest patches and fix 5. Remove unnecessary user accounts and ensure password guidelines are in place     
  • 13. Weaknesses of Windows OS MS Windows is not open source Windows OS installation is insecure because it includes hidden shares, blank passwords & it will not provide protection for known vulnerabilities. It is difficult for administrator to understand how to properly use & configure the software on various hardware setups. It slows down after running 24 hours. Many users don`t understand the security risk related to system while configuring it, so this will cause for different attacks. Less actual control over files.       
  • 14. UNIX OS Hardening The process of securing UNIX OS to make the system more secure is called as UNIX OS Hardening. It means it disable unnecessary services, restrict permissions on files and directories, apply password guidelines, remove unnecessary software, apply patches, and remove unnecessary users. UNIX system is very powerful and flexible. This is all depending on the skill and knowledge of the system administrator because so much control is placed in the administrators hand. UNIX systems are easier to secure and baseline when they are providing a single service or performing a single function, like acting as SMTP or web Server.      
  • 15. UNIX OS Hardening Cont... During installation process, it is easy to select which services and applications are placed on the system. On UNIX System by using the process status or by ps command, you can see which processes, applications and services are running. An administrator can identify the service by its unique process identifier or PID. To stop a running service the process is identified by PID and then kill command id used to stop the services.   
  • 16. Updates To the standard user or system administrator is constant stream of updates designed to correct problems, replace sections of code, or even add new features to an installed OS. Vendors typically follows a hierarchy for software updates given below:1. Hotfix 2. Patch 3. Service Pack     
  • 17. Updates Cont... 1. Hotfix This term is given to small software update designed to address particular problem. Hotfixes are typically developed in reaction to a discovered problem. 2. Patch This term is given to large software updates designed to address particular problem. Patches contain improvements or additional capabilities ans fixes for known bugs. They are usually developed over a longer period of time.      
  • 18. Updates Cont.. 3. Service Pack This term is given to a large collection of patches and hotfixes that are rolled into a single. Service packs are designed to bring a system up to the latest known rather than requiring the user or system administrator to download several of updates separately.   