SlideShare a Scribd company logo
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 5
Securing Hosts and Data
CompTIA Security +
Proprietary & Confidential
@GoCyberSec | January, 2020
Introduction
• Implementing secure systems
• Summarizing cloud concepts
• Deploying mobile devices securely
Proprietary & Confidential
@GoCyberSec | January, 2020
Implementing Host Security
• Least functionality
–Disabling unnecessary services
• Improves security posture
• Reduces attack surface
–Reduces risks from open ports
• Disabling unneeded applications
• Disabling unnecessary accounts
• Keeping systems up-to-date
Proprietary & Confidential
@GoCyberSec | January, 2020
Secure Operating Systems
• Windows
• MAC
• Linux
–Kiosks
–Network
–Appliance
• Trusted OS
Proprietary & Confidential
@GoCyberSec | January, 2020
Using Master Images
• Provides secure starting point
• Reduces
Proprietary & Confidential
@GoCyberSec | January, 2020
Secure Operating Systems
• Resiliency and automation strategies
–Automation, scripting, and templates
–Group Policy
• Standardize system configuration
• Standardize security settings
• Enforce strict company guidelines
–Easily apply security settings
to multiple computers
–Account Policies
–Local Policies
–System Services
–Software Restrictions
Proprietary & Confidential
@GoCyberSec | January, 2020
Secure Operating Systems
• Three steps
–Initial baseline configuration
–Integrity measurements for baseline deviation
–Remediation
Proprietary & Confidential
@GoCyberSec | January, 2020
Implementing Secure Systems
• Patch management
–Ensure that systems are up-to-date
–Protects system against known vulnerabilities
–Test patches in a test environment that mirrors the production
environment
–Automated deployment
–Testing, deploying and verifying updates
Proprietary & Confidential
@GoCyberSec | January, 2020
Implementing Secure Systems
• Change management
–Helps ensure changes to IT systems do not result in
unintended outages
–Provides an accounting structure or method to document all
changes
–Changes are proposed and reviewed before implementation
Proprietary & Confidential
@GoCyberSec | January, 2020
Implementing Secure Systems
• Unauthorized software
–Can include malware
• Compliance violations
–Licenses
Proprietary & Confidential
@GoCyberSec | January, 2020
Whitelisting vs Blacklisting
• Application whitelisting
–Identifies authorized software for workstations, servers, and
mobile devices
–Prevents users from installing or running software that isn’t on
the list
• Application blacklisting
–A list of prohibited applications
–Prevents users from installing or running software on the list
Proprietary & Confidential
@GoCyberSec | January, 2020
Secure Staging and Deployment
• Sandboxing
• Used for testing
• Isolated area on a system
• VMs
• Isolated operating system
• Chroot
• Isolated area within a Linux OS
Proprietary & Confidential
@GoCyberSec | January, 2020
Secure Staging Environment
• Development
• App created in a development environment
• Test
• App tested in a testing environment
• Staging
• Simulates production environment
• Production
• Final product
Proprietary & Confidential
@GoCyberSec | January, 2020
Peripherals
• Wireless keyboards
• Wireless mice
• Displays
• External storage devices
• Digital cameras
• Wi-Fi-enabled MicroSD card
• Printers and other multi-function devices (MFDs)
Proprietary & Confidential
@GoCyberSec | January, 2020
Hardware and Firmware Security
• Electromagnetic interference
(EMI)
• Interference from various
sources
• Motors
• Power lines
• Fluorescent lights
• Electromagnetic pulse (EMP)
• Short burst of electromagnetic
energy
• Electrostatic discharge (ESD)
• Lightning
• Military weapons
Proprietary & Confidential
@GoCyberSec | January, 2020
Hardware and Firmware Security
• EMI
• Electromagnetic interference
• Interference from various
sources
• Motors
• Power lines
• Fluorescent lights
• EMP
• Electromagnetic pulse
• Short burst of electromagnetic
energy
• Electrostatic discharge (ESD)
• Lightning
• Military weapons
Proprietary & Confidential
@GoCyberSec | January, 2020
Hardware and Firmware Security
• Full disk encryption (FDE)
- Can be software application
• Self-encrypting drives (SED)
- Includes the hardware and software to encrypt all data on the
drive
- Securely stores the encryption keys
- Typically unlocked with user credentials
Proprietary & Confidential
@GoCyberSec | January, 2020
Hardware and Firmware Security
• Basic Input/Output System (BIOS)
- Firmware used to start a computer
- Software stored on hardware chip
• Unified Extensible Firmware Interface (UEFI)
- Replacement for BIOS on most newer systems
- Includes similar functions and some enhancements
• Update BIOS and UEFI by flashing
Proprietary & Confidential
@GoCyberSec | January, 2020
Hardware-Based Encryption
Characteristics TPM HSM
Hardware Chip in motherboard (included with many
laptops)
Removable or external hardware device,
(purchased separately)
Uses Full disk encryption (for laptops and some
servers)
High-end mission-critical servers (SSL
accelerators, high availability clusters,
certificate authorities)
Authentication Performs platform authentication (verifies drive
not moved)
Performs application authentication (only
used by authorized applications)
Encryption Keys Includes endorsement key (burned into chip)
and storage root key
Storage root key generates and protects other
keys
Stores RSA keys used in asymmetric
encryption and can generate keys
Proprietary & Confidential
@GoCyberSec | January, 2020
Benefits of TPM and HSM
• Secure boot process
–Checks the files against stored signatures to ensure files
haven’t changed
–Attests that the files haven’t changed
–Blocks boot process if files have been modified
• Remote attestation
–Sends information on files to remote system
–Remote system verifies files haven’t changed
Proprietary & Confidential
@GoCyberSec | January, 2020
Benefits of TPM and HSM
• Hardware root of trust
–Known secure starting point
–TPM/HSM ships with a unique private key burned into
hardware
–Matched with public key
–Used during secure boot process
Proprietary & Confidential
@GoCyberSec | January, 2020
Hardware and Firmware Security
• Additional vulnerabilities
–End of life systems
• Sanitize before disposing
• Lack of vendor support
–No security updates
–No technical support
–Susceptible to security issues
Proprietary & Confidential
@GoCyberSec | January, 2020
Summarizing Cloud Computing
• Accessing computing resources on another system
• On-premise
–Cloud resources owned, operated, and maintained by an
organization for its employees
• Hosted
–Resources rented and managed by another organization
–Typically accessed via the Internet
Proprietary & Confidential
@GoCyberSec | January, 2020
Summarizing Cloud Computing
• Software as a Service (SaaS)
–Applications provided over the Internet (such as web-mail
accessed with a web browser)
• Platform as a Service (PaaS)
–Provides customers with a fully managed platform
–Vendor keeps platform up-to-date
• Infrastructure as a Service (IaaS)
–Provides customers with access to hardware in a self-managed
platform
–Customers are responsible for keeping an IaaS system up to
date
Proprietary & Confidential
@GoCyberSec | January, 2020
Summarizing Cloud Computing
• Comparing responsibilities
Proprietary & Confidential
@GoCyberSec | January, 2020
Understanding Cloud Computing
• Security as a service
–Any services provided via the cloud that provide security
services
–Commonly viewed as a subset of Software as a Service (SaaS)
• Cloud access security broker (CASB)
–Software tool or service
–Placed between organization’s network and the cloud provider
Proprietary & Confidential
@GoCyberSec | January, 2020
Cloud Deployment Models
• Public – Available to anyone
• Private – Only available within a company
• Community – Cloud shared by two or more organizations
• Hybrid – Combination of any two models
Proprietary & Confidential
@GoCyberSec | January, 2020
Mobile Device Deployment Models
• Models support connecting mobile devices to organization’s
network
–Corporate-owned
–COPE (corporate-owned, personally enabled)
–BYOD (bring your own device)
–Bring your own disaster
–CYOD (choose your own device)
–Limits supported devices
• VDI (virtual desktop infrastructure)
Proprietary & Confidential
@GoCyberSec | January, 2020
Mobile Device Connection Methods
• Cellular
• Wi-Fi
• SATCOM
• Bluetooth
• NFC (near field communication)
• ANT
• Infrared
• USB (Universal Serial Bus)
Proprietary & Confidential
@GoCyberSec | January, 2020
Mobile Device Management (MDM)
• Application management
• Full device encryption
• Storage segmentation
• Content management
• Containerization
• Passwords and PINs
• Biometrics
• Screen locks
• Remote wipe
• Geolocation
• Geofencing
• GPS tagging
• Context-aware
authentication
• Push notification services
Proprietary & Confidential
@GoCyberSec | January, 2020
MDM Enforcement / Monitoring
• Unauthorized software
– Third party app stores
– Rooting and jailbreaking
– Updates
– Sideloading
– SMS and MMS
– SMS
Proprietary & Confidential
@GoCyberSec | January, 2020
Mobile Device Management (MDM)
• Hardware control
• USB OTG cables
• Unauthorized connections
• Tethering
• Wi-Fi Direct
• Ad hoc
Proprietary & Confidential
@GoCyberSec | January, 2020
Embedded System
• Any device that has a dedicated function and uses a computer system
to perform that function
– Compare to desktop PCs, laptops, and servers
– All use central processing units (CPUs), operating systems, and
applications to perform various functions
• Embedded systems
– Use CPUs, operating systems, and one or more applications to
perform specific functions
Proprietary & Confidential
@GoCyberSec | January, 2020
Embedded System
• Security implications and vulnerabilities
– Keep up-to-date
• Implement patch management processes
• Avoid default configurations
Proprietary & Confidential
@GoCyberSec | January, 2020
Comparing Embedded Systems
• Smart devices
• Internet of things (IoT)
– Wearable technology
– Home automation
• HVAC
• SoC
• RTOS
• Printers/MFDs
• Camera systems
• Special purpose
– Medical devices
– Vehicles
– Aircraft/UAV
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting SCADA/ICSs
• Redundancy and diversity
• Network segmentation
• Security layers
• Application firewalls
• Manual updates
• Firmware version control
• Wrappers
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data
• Data at rest
– Any stored data
– Hard drives, mobile phones, USB flash drives, external drives,
databases. and backups
• Data in transit
– Data in motion
– Any data traveling over a network
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Confidentiality with Encryption
• Software-based encryption
• Full disk encryption
• Database column encryption
• File/folder encryption
Proprietary & Confidential
@GoCyberSec | January, 2020
Permission Issues & Access Violations
• Principle of least privilege
– Ensures users granted only the rights and permissions needed to
perform assigned tasks or functions
– Rights identify what a user can do, such as changing the system
time or rebooting a system
– Permissions define access to resources, such as being able to read
or modify a file
– Rights and permissions combined called privileges
Proprietary & Confidential
@GoCyberSec | January, 2020
File System Security
• Linux permissions
– Owner
– Group
– Others
– Read (r) 100 (4)
– Write (w) 010 (2)
– Execute (x) 001 (1)
Proprietary & Confidential
@GoCyberSec | January, 2020
File System Security
• Linux permissions
• Chmod
Proprietary & Confidential
@GoCyberSec | January, 2020
File System Security
• Windows permissions
– Read
– Read & Execute
– Write
– Modify
Proprietary & Confidential
@GoCyberSec | January, 2020
Data Loss Prevention (DLP)
• Removable media
• Data exfiltration
– Unauthorized transfer of data outside an organization
• Cloud-based DLP
– Can protect PII and PHI
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 5 Summary
• Implementing secure systems
• Summarizing cloud concepts
• Deploying mobile devices securely

More Related Content

What's hot

501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
gocybersec
 
501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
gocybersec
 
Ending the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New HopeEnding the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New Hope
Michele Chubirka
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
SecureAuth
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined Perimeter
Vishwas Manral
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Perimeter 81
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
Cryptzone
 
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Jason Trost
 
Cryptzone AppGate Technical Architecture
Cryptzone AppGate Technical ArchitectureCryptzone AppGate Technical Architecture
Cryptzone AppGate Technical Architecture
Cryptzone
 
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
Priyanka Aash
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
Mike Stone
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
SISA Information Security Pvt.Ltd
 
Automation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret ManagementAutomation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret Management
Mary Racter
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
DataWorks Summit
 
Data Security for Project Managers
Data Security for Project ManagersData Security for Project Managers
Data Security for Project Managers
Joseph Wojowski
 
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
Chris Ryu
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
Sectricity
 
Threat Hunting at Scale
Threat Hunting at ScaleThreat Hunting at Scale
Threat Hunting at Scale
Panther Labs
 
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
North Texas Chapter of the ISSA
 

What's hot (20)

501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
 
Ending the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New HopeEnding the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New Hope
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined Perimeter
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
 
Cryptzone AppGate Technical Architecture
Cryptzone AppGate Technical ArchitectureCryptzone AppGate Technical Architecture
Cryptzone AppGate Technical Architecture
 
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Automation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret ManagementAutomation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret Management
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
 
Data Security for Project Managers
Data Security for Project ManagersData Security for Project Managers
Data Security for Project Managers
 
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
Threat Hunting at Scale
Threat Hunting at ScaleThreat Hunting at Scale
Threat Hunting at Scale
 
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
 

Similar to 501 ch 5 securing hosts and data

WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
WSO2
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
FIDO Alliance
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
Amazon Web Services
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
WSO2
 
IT Application Services & Management | SoftClouds
IT Application Services & Management | SoftCloudsIT Application Services & Management | SoftClouds
IT Application Services & Management | SoftClouds
SoftClouds LLC
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
John Mathon
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
HartVidaRaffo
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
Pete Wassell
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
C/D/H Technology Consultants
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
Alex Lavell
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2
 
8.mentor graphics
8.mentor graphics8.mentor graphics
8.mentor graphics
EITESANGO
 
Latest trendsincloud computing
Latest trendsincloud computingLatest trendsincloud computing
Latest trendsincloud computing
Liliana Ignat
 
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxConfidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Carlo Sacchi
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
VMware Tanzu
 
IoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlIoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and ml
Marco Dal Pino
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
C/D/H Technology Consultants
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance
 

Similar to 501 ch 5 securing hosts and data (20)

WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
IT Application Services & Management | SoftClouds
IT Application Services & Management | SoftCloudsIT Application Services & Management | SoftClouds
IT Application Services & Management | SoftClouds
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
 
8.mentor graphics
8.mentor graphics8.mentor graphics
8.mentor graphics
 
Latest trendsincloud computing
Latest trendsincloud computingLatest trendsincloud computing
Latest trendsincloud computing
 
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxConfidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
 
IoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and mlIoTSummit: Create iot devices connected or on the edge using ai and ml
IoTSummit: Create iot devices connected or on the edge using ai and ml
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 

More from gocybersec

501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
gocybersec
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
gocybersec
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
gocybersec
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
gocybersec
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
gocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
gocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
gocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
gocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
gocybersec
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
gocybersec
 

More from gocybersec (11)

501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 

Recently uploaded

Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 

Recently uploaded (20)

Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 

501 ch 5 securing hosts and data

  • 1. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 5 Securing Hosts and Data CompTIA Security +
  • 2. Proprietary & Confidential @GoCyberSec | January, 2020 Introduction • Implementing secure systems • Summarizing cloud concepts • Deploying mobile devices securely
  • 3. Proprietary & Confidential @GoCyberSec | January, 2020 Implementing Host Security • Least functionality –Disabling unnecessary services • Improves security posture • Reduces attack surface –Reduces risks from open ports • Disabling unneeded applications • Disabling unnecessary accounts • Keeping systems up-to-date
  • 4. Proprietary & Confidential @GoCyberSec | January, 2020 Secure Operating Systems • Windows • MAC • Linux –Kiosks –Network –Appliance • Trusted OS
  • 5. Proprietary & Confidential @GoCyberSec | January, 2020 Using Master Images • Provides secure starting point • Reduces
  • 6. Proprietary & Confidential @GoCyberSec | January, 2020 Secure Operating Systems • Resiliency and automation strategies –Automation, scripting, and templates –Group Policy • Standardize system configuration • Standardize security settings • Enforce strict company guidelines –Easily apply security settings to multiple computers –Account Policies –Local Policies –System Services –Software Restrictions
  • 7. Proprietary & Confidential @GoCyberSec | January, 2020 Secure Operating Systems • Three steps –Initial baseline configuration –Integrity measurements for baseline deviation –Remediation
  • 8. Proprietary & Confidential @GoCyberSec | January, 2020 Implementing Secure Systems • Patch management –Ensure that systems are up-to-date –Protects system against known vulnerabilities –Test patches in a test environment that mirrors the production environment –Automated deployment –Testing, deploying and verifying updates
  • 9. Proprietary & Confidential @GoCyberSec | January, 2020 Implementing Secure Systems • Change management –Helps ensure changes to IT systems do not result in unintended outages –Provides an accounting structure or method to document all changes –Changes are proposed and reviewed before implementation
  • 10. Proprietary & Confidential @GoCyberSec | January, 2020 Implementing Secure Systems • Unauthorized software –Can include malware • Compliance violations –Licenses
  • 11. Proprietary & Confidential @GoCyberSec | January, 2020 Whitelisting vs Blacklisting • Application whitelisting –Identifies authorized software for workstations, servers, and mobile devices –Prevents users from installing or running software that isn’t on the list • Application blacklisting –A list of prohibited applications –Prevents users from installing or running software on the list
  • 12. Proprietary & Confidential @GoCyberSec | January, 2020 Secure Staging and Deployment • Sandboxing • Used for testing • Isolated area on a system • VMs • Isolated operating system • Chroot • Isolated area within a Linux OS
  • 13. Proprietary & Confidential @GoCyberSec | January, 2020 Secure Staging Environment • Development • App created in a development environment • Test • App tested in a testing environment • Staging • Simulates production environment • Production • Final product
  • 14. Proprietary & Confidential @GoCyberSec | January, 2020 Peripherals • Wireless keyboards • Wireless mice • Displays • External storage devices • Digital cameras • Wi-Fi-enabled MicroSD card • Printers and other multi-function devices (MFDs)
  • 15. Proprietary & Confidential @GoCyberSec | January, 2020 Hardware and Firmware Security • Electromagnetic interference (EMI) • Interference from various sources • Motors • Power lines • Fluorescent lights • Electromagnetic pulse (EMP) • Short burst of electromagnetic energy • Electrostatic discharge (ESD) • Lightning • Military weapons
  • 16. Proprietary & Confidential @GoCyberSec | January, 2020 Hardware and Firmware Security • EMI • Electromagnetic interference • Interference from various sources • Motors • Power lines • Fluorescent lights • EMP • Electromagnetic pulse • Short burst of electromagnetic energy • Electrostatic discharge (ESD) • Lightning • Military weapons
  • 17. Proprietary & Confidential @GoCyberSec | January, 2020 Hardware and Firmware Security • Full disk encryption (FDE) - Can be software application • Self-encrypting drives (SED) - Includes the hardware and software to encrypt all data on the drive - Securely stores the encryption keys - Typically unlocked with user credentials
  • 18. Proprietary & Confidential @GoCyberSec | January, 2020 Hardware and Firmware Security • Basic Input/Output System (BIOS) - Firmware used to start a computer - Software stored on hardware chip • Unified Extensible Firmware Interface (UEFI) - Replacement for BIOS on most newer systems - Includes similar functions and some enhancements • Update BIOS and UEFI by flashing
  • 19. Proprietary & Confidential @GoCyberSec | January, 2020 Hardware-Based Encryption Characteristics TPM HSM Hardware Chip in motherboard (included with many laptops) Removable or external hardware device, (purchased separately) Uses Full disk encryption (for laptops and some servers) High-end mission-critical servers (SSL accelerators, high availability clusters, certificate authorities) Authentication Performs platform authentication (verifies drive not moved) Performs application authentication (only used by authorized applications) Encryption Keys Includes endorsement key (burned into chip) and storage root key Storage root key generates and protects other keys Stores RSA keys used in asymmetric encryption and can generate keys
  • 20. Proprietary & Confidential @GoCyberSec | January, 2020 Benefits of TPM and HSM • Secure boot process –Checks the files against stored signatures to ensure files haven’t changed –Attests that the files haven’t changed –Blocks boot process if files have been modified • Remote attestation –Sends information on files to remote system –Remote system verifies files haven’t changed
  • 21. Proprietary & Confidential @GoCyberSec | January, 2020 Benefits of TPM and HSM • Hardware root of trust –Known secure starting point –TPM/HSM ships with a unique private key burned into hardware –Matched with public key –Used during secure boot process
  • 22. Proprietary & Confidential @GoCyberSec | January, 2020 Hardware and Firmware Security • Additional vulnerabilities –End of life systems • Sanitize before disposing • Lack of vendor support –No security updates –No technical support –Susceptible to security issues
  • 23. Proprietary & Confidential @GoCyberSec | January, 2020 Summarizing Cloud Computing • Accessing computing resources on another system • On-premise –Cloud resources owned, operated, and maintained by an organization for its employees • Hosted –Resources rented and managed by another organization –Typically accessed via the Internet
  • 24. Proprietary & Confidential @GoCyberSec | January, 2020 Summarizing Cloud Computing • Software as a Service (SaaS) –Applications provided over the Internet (such as web-mail accessed with a web browser) • Platform as a Service (PaaS) –Provides customers with a fully managed platform –Vendor keeps platform up-to-date • Infrastructure as a Service (IaaS) –Provides customers with access to hardware in a self-managed platform –Customers are responsible for keeping an IaaS system up to date
  • 25. Proprietary & Confidential @GoCyberSec | January, 2020 Summarizing Cloud Computing • Comparing responsibilities
  • 26. Proprietary & Confidential @GoCyberSec | January, 2020 Understanding Cloud Computing • Security as a service –Any services provided via the cloud that provide security services –Commonly viewed as a subset of Software as a Service (SaaS) • Cloud access security broker (CASB) –Software tool or service –Placed between organization’s network and the cloud provider
  • 27. Proprietary & Confidential @GoCyberSec | January, 2020 Cloud Deployment Models • Public – Available to anyone • Private – Only available within a company • Community – Cloud shared by two or more organizations • Hybrid – Combination of any two models
  • 28. Proprietary & Confidential @GoCyberSec | January, 2020 Mobile Device Deployment Models • Models support connecting mobile devices to organization’s network –Corporate-owned –COPE (corporate-owned, personally enabled) –BYOD (bring your own device) –Bring your own disaster –CYOD (choose your own device) –Limits supported devices • VDI (virtual desktop infrastructure)
  • 29. Proprietary & Confidential @GoCyberSec | January, 2020 Mobile Device Connection Methods • Cellular • Wi-Fi • SATCOM • Bluetooth • NFC (near field communication) • ANT • Infrared • USB (Universal Serial Bus)
  • 30. Proprietary & Confidential @GoCyberSec | January, 2020 Mobile Device Management (MDM) • Application management • Full device encryption • Storage segmentation • Content management • Containerization • Passwords and PINs • Biometrics • Screen locks • Remote wipe • Geolocation • Geofencing • GPS tagging • Context-aware authentication • Push notification services
  • 31. Proprietary & Confidential @GoCyberSec | January, 2020 MDM Enforcement / Monitoring • Unauthorized software – Third party app stores – Rooting and jailbreaking – Updates – Sideloading – SMS and MMS – SMS
  • 32. Proprietary & Confidential @GoCyberSec | January, 2020 Mobile Device Management (MDM) • Hardware control • USB OTG cables • Unauthorized connections • Tethering • Wi-Fi Direct • Ad hoc
  • 33. Proprietary & Confidential @GoCyberSec | January, 2020 Embedded System • Any device that has a dedicated function and uses a computer system to perform that function – Compare to desktop PCs, laptops, and servers – All use central processing units (CPUs), operating systems, and applications to perform various functions • Embedded systems – Use CPUs, operating systems, and one or more applications to perform specific functions
  • 34. Proprietary & Confidential @GoCyberSec | January, 2020 Embedded System • Security implications and vulnerabilities – Keep up-to-date • Implement patch management processes • Avoid default configurations
  • 35. Proprietary & Confidential @GoCyberSec | January, 2020 Comparing Embedded Systems • Smart devices • Internet of things (IoT) – Wearable technology – Home automation • HVAC • SoC • RTOS • Printers/MFDs • Camera systems • Special purpose – Medical devices – Vehicles – Aircraft/UAV
  • 36. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting SCADA/ICSs • Redundancy and diversity • Network segmentation • Security layers • Application firewalls • Manual updates • Firmware version control • Wrappers
  • 37. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data • Data at rest – Any stored data – Hard drives, mobile phones, USB flash drives, external drives, databases. and backups • Data in transit – Data in motion – Any data traveling over a network
  • 38. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Confidentiality with Encryption • Software-based encryption • Full disk encryption • Database column encryption • File/folder encryption
  • 39. Proprietary & Confidential @GoCyberSec | January, 2020 Permission Issues & Access Violations • Principle of least privilege – Ensures users granted only the rights and permissions needed to perform assigned tasks or functions – Rights identify what a user can do, such as changing the system time or rebooting a system – Permissions define access to resources, such as being able to read or modify a file – Rights and permissions combined called privileges
  • 40. Proprietary & Confidential @GoCyberSec | January, 2020 File System Security • Linux permissions – Owner – Group – Others – Read (r) 100 (4) – Write (w) 010 (2) – Execute (x) 001 (1)
  • 41. Proprietary & Confidential @GoCyberSec | January, 2020 File System Security • Linux permissions • Chmod
  • 42. Proprietary & Confidential @GoCyberSec | January, 2020 File System Security • Windows permissions – Read – Read & Execute – Write – Modify
  • 43. Proprietary & Confidential @GoCyberSec | January, 2020 Data Loss Prevention (DLP) • Removable media • Data exfiltration – Unauthorized transfer of data outside an organization • Cloud-based DLP – Can protect PII and PHI
  • 44. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 5 Summary • Implementing secure systems • Summarizing cloud concepts • Deploying mobile devices securely