This document provides an overview of security layers and principles, including confidentiality, integrity, availability, threats, risks, and attack surfaces. It discusses social engineering, site security, computer security, operating system security using Active Directory, security policies like passwords and account lockout. It also covers security software like DMZ, NAT, IPsec, SSH, and protecting wireless networks. Common attacks, malware, Windows updates, and phishing/pharming are described. The document emphasizes the importance of security for computers and networks in organizations.
Object Oriented Secure Modeling using SELinux Trusted Operating SystemEswar Publications
This research paper proposes the object oriented experimental setup for secure web application development and use of security performance flexibility model to keep high security in web applications. This model allows system administrators to skip or disable some unnecessary security checks in distributed trusted operating systems through which they can effectively balance their performance needs without compromising the security of the system. For example, system admin can tell that video on demand server is allowed to skip only security checks on reading files, while database server is allowed to skip only security checks on seeking files. Which operation is need to be skipped and which operation is not need to be skipped is very much subjective in nature, this will
depend upon the user’s requirement and the particular application’s requirement. The selection of these operations and system calls for a particular application is the part of software requirement elicitation process. This UML 2.0 based research work proposes object-oriented class-based software development, source code generation in C++ and the integration of security engineering into a model-driven software development.
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
The proposed work describes the design of a multimedia platform managing users and implementing cybersecurity. The paper describes in details the use cases of the whole platform embedding Big Data and artificial intelligence (AI) engine predicting network attacks. The platform has been tested by Tree Ensemble algorithm classifying and predicting anomalous server logs of possible attacks. The data logs are collected in Cassandra Big Data System enabling the AI training model. The work has been developed within the framework of a research industry project.
Secure System Password (SSP) Application for NT Editor Hacking Tooliosrjce
In windows, the password will be stored in SAM registry by default. This SAM registry hides the
windows password when the system is in ON state. The password in SAM registry will be cleared or changed by
using NT Editor Tool. So that data can be accessed by any user. Security for the windows will be done by the
proposed system as an application. If the user wants to install new OS then the data in the hard disk will be
encrypted for prevention of unauthorized access. The application will be start monitoring to avoid password remodification
or clearing the password. Features in this application is, if the user hacks the application
password, SSP does not allow the users to access USB, Ethernet and CD/DVD drive. Application will stop the
access of the driver ports, until it is re-installed or the password is set right.
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
Classic firewall systems are built to filter traffic based on IP addresses, source and destination ports and protocol types. The modern networks have grown to a level where the possibility for users’ mobility is a must. In such networks, modern firewalls may introduce such complexity where administration can become very frustrating since it needs the intervention of a firewall administrator. The solution for this problem is an identity based firewall system. In this paper we will present a new
design of a firewall system that uses the user’s identity to filter the traffic. In the design phase we will define key points which have to be satisfied as a crucial milestone for the functioning of the whole Identity based firewall system.
Object Oriented Secure Modeling using SELinux Trusted Operating SystemEswar Publications
This research paper proposes the object oriented experimental setup for secure web application development and use of security performance flexibility model to keep high security in web applications. This model allows system administrators to skip or disable some unnecessary security checks in distributed trusted operating systems through which they can effectively balance their performance needs without compromising the security of the system. For example, system admin can tell that video on demand server is allowed to skip only security checks on reading files, while database server is allowed to skip only security checks on seeking files. Which operation is need to be skipped and which operation is not need to be skipped is very much subjective in nature, this will
depend upon the user’s requirement and the particular application’s requirement. The selection of these operations and system calls for a particular application is the part of software requirement elicitation process. This UML 2.0 based research work proposes object-oriented class-based software development, source code generation in C++ and the integration of security engineering into a model-driven software development.
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
The proposed work describes the design of a multimedia platform managing users and implementing cybersecurity. The paper describes in details the use cases of the whole platform embedding Big Data and artificial intelligence (AI) engine predicting network attacks. The platform has been tested by Tree Ensemble algorithm classifying and predicting anomalous server logs of possible attacks. The data logs are collected in Cassandra Big Data System enabling the AI training model. The work has been developed within the framework of a research industry project.
Secure System Password (SSP) Application for NT Editor Hacking Tooliosrjce
In windows, the password will be stored in SAM registry by default. This SAM registry hides the
windows password when the system is in ON state. The password in SAM registry will be cleared or changed by
using NT Editor Tool. So that data can be accessed by any user. Security for the windows will be done by the
proposed system as an application. If the user wants to install new OS then the data in the hard disk will be
encrypted for prevention of unauthorized access. The application will be start monitoring to avoid password remodification
or clearing the password. Features in this application is, if the user hacks the application
password, SSP does not allow the users to access USB, Ethernet and CD/DVD drive. Application will stop the
access of the driver ports, until it is re-installed or the password is set right.
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
Classic firewall systems are built to filter traffic based on IP addresses, source and destination ports and protocol types. The modern networks have grown to a level where the possibility for users’ mobility is a must. In such networks, modern firewalls may introduce such complexity where administration can become very frustrating since it needs the intervention of a firewall administrator. The solution for this problem is an identity based firewall system. In this paper we will present a new
design of a firewall system that uses the user’s identity to filter the traffic. In the design phase we will define key points which have to be satisfied as a crucial milestone for the functioning of the whole Identity based firewall system.
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneAlec Sloman
In this presentation, Dmitry Khlebnikov sets forward 6 broad principles for designing secure IT infrastructure, and provides a comprehensive overview of "Host-based Security".
A Secure Software Engineering Perspectiveidescitation
Software vulnerabilities are the prime cause for the
cyber attacks and potential misuse of software applications.
The vulnerabilities are mostly due to unsecure system
architecture, software development language and design
issues. Generally software development practice does not
address these issues due to time-budget constraints and
conflicting needs. This ultimately results in software
development, where security is a major concern, remains
mainly unnoticed. Secure software engineering by and large
refers to the process of software security. The software security
essentially focuses on developing the secure software, which
generally depends on system architecture and software
security assurance against the possible vulnerabilities. To
address these issues, in this paper, a survey is reported as a
state of art work in the areas of secure system architecture,
buffer overflow attacks and confinement.
The technology behind information systems in today’s world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
Java can be used two types of programs: applications & applets.An application is a program that runs on your computer, under the operating system of that computer.
An applets is an application designed to be transmitted over the Internet and executed by a java-compatible Web Browser. An applet is an executable program that runs inside a browser, such as Netscape or Internet Explorer.
Database-as-a-service (DbaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. All of the administrative tasks and maintenance are taken care of by the service provider and the user or the application owner needs to do is to use the database. The outsourcing of data can lead to confidentiality and integrity issues and also privilege escalation.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneAlec Sloman
In this presentation, Dmitry Khlebnikov sets forward 6 broad principles for designing secure IT infrastructure, and provides a comprehensive overview of "Host-based Security".
A Secure Software Engineering Perspectiveidescitation
Software vulnerabilities are the prime cause for the
cyber attacks and potential misuse of software applications.
The vulnerabilities are mostly due to unsecure system
architecture, software development language and design
issues. Generally software development practice does not
address these issues due to time-budget constraints and
conflicting needs. This ultimately results in software
development, where security is a major concern, remains
mainly unnoticed. Secure software engineering by and large
refers to the process of software security. The software security
essentially focuses on developing the secure software, which
generally depends on system architecture and software
security assurance against the possible vulnerabilities. To
address these issues, in this paper, a survey is reported as a
state of art work in the areas of secure system architecture,
buffer overflow attacks and confinement.
The technology behind information systems in today’s world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
Java can be used two types of programs: applications & applets.An application is a program that runs on your computer, under the operating system of that computer.
An applets is an application designed to be transmitted over the Internet and executed by a java-compatible Web Browser. An applet is an executable program that runs inside a browser, such as Netscape or Internet Explorer.
Database-as-a-service (DbaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. All of the administrative tasks and maintenance are taken care of by the service provider and the user or the application owner needs to do is to use the database. The outsourcing of data can lead to confidentiality and integrity issues and also privilege escalation.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
This playbook outlines the primary messages we focus on when we talk about iSPIRT, both in general and when we’re speaking to a specific audience. It contains the language and phrasing we use to share these messages. You can clip text directly from this playbook, but you don’t have to use the exact words. The messaging is a springboard to help you get started – the ideas behind the headlines and web copy you’ll create for various uses.
When writing copy, you’ll convey the same ideas, but will tailor the exact words and tone to each audience and situation. In addition to the messaging, you’ll want to weave in proof points - case studies, data, and testimonials that help to underscore the validity of the message.
This playbook will help us stay consistent and on-message so that people will begin to recognize us, trust us, and share our story with others.
Innofest is architectured as a festival, in a daring break from a ’traditiona...ProductNation/iSPIRT
Innofest is architectured as a festival, in a daring break from a ’traditional event’ format, we will take over the open spaces of a part of Bengaluru, and run a festival celebrating Innovation.
Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...ProductNation/iSPIRT
With Mergers and Acquisitions (M&A) totaling $2.27bn since Jan 2011, technology majors as well as large Indian ‘Unicorns’ are likely to continue acquiring Indian Technology product startups to fill technology gaps as well as talent requirements. This was among the key trends to emerge from the Think Next Roundtable Report - 2015 India technology Product M&A Industry Monitor Report released by iSPIRT, India’s software products think tank, technology focused M&A advisory boutique Signal Hill and Microsoft Ventures.
What animates us? Why do we do what we do? What sets us apart? Why are we a force for good? These are some questions that we tackle in this Annual Letter.
Problem solvers, responsible builders of companies, communities and ecosystems are the foundation for progress and growth of any nation. What drives all of them is a sense of challenge, ownership of problems, allegiance to autonomy, demonstration of personal accountability and the thrill of finding a solution. This energy is fueling a growing product movement in India. iSPIRT is proud to be part of this movement.
This Playbook is focused on guiding entrepreneurs in fund-raising and M&A conversations and sharing key learnings and directional insights about the process.
This Playbook is not intended to be a comprehensive guide on running, funding or selling a business or constitute any form of legal advice. Please consult a lawyer for formal advice relevant to your specific situation while raising funds or going through an acquisitio
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...ProductNation/iSPIRT
We believe the discussion about India’s technology industry – whether in government circles, the media or in Silicon Valley – overlooks India’s B2B software product companies which sell globally as well as into India. Instead, there is a lot of discussion about IT Services companies and E-commerce players.
When there is discussion about B2B software products, it lacks insights into product types, target markets, scaling strategies, perception of Indian vendors in India and abroad as well as the vibrant start-up ecosystem that has emerged around B2B software companies from India. These insights are important because a strong Indian B2B software product industry has the potential to drive tens of thousands of high-value jobs, enable Indian manufacturing and services companies to be globally competitive, drive large amounts of export-driven foreign exchange earnings for India as well as create billions of dollars of value for founders and investors.
We would like to shine a spotlight on these Indian B2B software products companies through the India Software Products Industry Index – B2B (iSPIxB2B), which we are launching today. The index tracks the thirty most valuable B2B software product companies headquartered in India and companies headquartered elsewhere in the world where cofounders are in India right from the creation of the company onwards.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
The Indo-American Journal of Agricultural and Veterinary Sciences is an online international journal published quarterly. It is a peer-reviewed journal that focuses on disseminating high-quality original research work, reviews, and short communications of the publishable paper.
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
cloud computing is also facing many challenges that, if not well resolved, may impede its fast growth. Data security, as it exists in many other applications, is among these challenges that would raise great concerns from users when they store sensitive information on cloud servers. These concerns originate from the fact that cloud servers are usually operated by commercial providers which are very likely to be outside of the trusted domain of the users. Data confidential against cloud servers is hence frequently desired when users outsource data for storage in the cloud.
Similar to report on network security fundamentals (20)
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
1. 1
MODULE 1
UNDERSTANDING SECURITY LAYERS:-
Understanding Core Security Principles:-
When we are working with information security field we will go through the
word CIA (confidentiality, integrity and availability)
1. CONFIDENTIALITY:- It defines as a characteristic ensuring access is
restricted to only permited user, application or computer system.
2. INTEGRITY: - Consistency and accuracy and validity of data &
information is known as integrity. One of the goal of a successful
information is to secure your information i.e. data should be protect
against unauthorized changes.
3. AVAILABILITY: - It defines resources being accessible to a user,
application or computer system when required.
Fig.1.1 Core SecurityPrinciples
2. 2
THREAT:-
It is defined as unauthorized access to the resource. We have 2 types of
threats:-
• PHYSICAL THREAT :- Damage to resources, which is physical e.g.
Burn hard disk
• LOGICAL THREAT :-Other way of damaging resource. Again it is
classified into 2 categories-
o Accidental Threat:- e.g. natural disaster like fire accident, electrical
short circuits.
o Delibrate Threat:-It is related to exploitation of system security e.g.
hacking , spams, worms etc.
RISK MANAGEMENT:-
Defines process ofidentifying, accessing and prioritizing risks and threats
e.g. backup servers.
Risk assessmentinclude four categories:-
i. Risk avoidance: - It is a process ofeliminating a risk by choosing not
to engage in any action or activity.
ii. Risk acceptance: - It defines the act of identifying and then making the
decision to acceptthe risk and impact of a specific risk.
iii. Risk mitigation: - It is defined as chances of reducing the risk on
impact of a risk to a particular level.
iv. Risk transfer: - It defines the act of taking steps to move responsibility
of a risk to a third part.
Understanding Attack Surfaces: -
An attack surface consists of set of methods an attacker can use to enter a
system and potentially cause damage to the system. To calculate the attack
surface of an environment it is evaluated into 3 components: -
i. Application
ii. Network
iii. Internal attack (or system)
3. 3
Application Attack Evaluating:-
When evaluating the application attack, you need to concentrate on the
following things: -
a) The amount of codeof an application
b) The no. of data input to an application
c) The no. of running services
Network Surface Evaluation: -
a) Network design and Architecture
b) Placement and rule sets of firewall
c) Other security concerns like VPN
Internal/employee Evaluation: -
a) The potential for human errors
b) The risk of malicious software and social engineering
SOCIAL ENGINEERING:-
It is a method used to gain access to data, systems, or networks primarily
through misrepresentation. These attacks can either by a person, email or
phones. To avoid social engineering attacks be suspicious to phone calls,
emails, etc.even verify identity.
Fig.1.2 SocialEngineering
4. 4
SITE SECURITY:-
It is a specialized area of security discipline where access controlis the
key conceptwhen thinking aboutphysical security. This site security is
designed may include the following:-
a) Authentication
b) Access control
c) Auditing
Physicalpremises are divided into 3 logicalareas:-
i. External parameter:-
External parameter uses security cameras and parameter fencing and
entry gates protected with guards and even gates with access card
reader.
ii. Internal parameter: -
Server wracks locking, keypad locking, security cameras, badge readers.
iii. Secure areas: -
• Highly protected
• Keypads
• Biometric technologies like finger or retina scanners and voice
recognition system.
Understanding Computer Security:-
It consists of the process,procedures and technologies used to protect
computer system e.g. computer security cable, docking stations, laptop
security cables, theft recovery software and laptop alarms. You can also
protect using key loggers. Using key loggers you can protect the key
strokes and also to install a software that records your complete video.
5. 5
MODULE 2
UNDERSTANDING OS SECURITY: -
Active Directory:-
It is a technology created by Microsoft in order to do centralized management of
entire enterprise network. This active directory includes different network
services such as-
a) LDAP(Light Weight DirectoryAccess Protocol):
It is an application protocolused for quering and modifying data using
directory services over TCP/IP. In active directory everything is arranged in
hierarchical order so that we can easily find the objects of structure.
b) SSO(Single SignOn):
This protocolprovides to log once and access multiple related but i
independent software systems without having to login again.
Domain Controller:
It is nothing but a window server that stores a replica of the accounts and
security information of a domain and also define domain boundaries .When we
install active directory services in 2008, 2012 it becomes domain
controller.Example-abc.com.
DC PROMOSS:
It is a command used to promoteserver to DC .When we install active directory
several MMC (Microsoft Management Console) and see different option that
are:
1. Active directory uses end computers
2. Active directory domains and services
3. Active directory administrative centre
4. Active directory sites and services.
6. 6
To identify a system is working in workgroup or domain check the properties
of my computer.
Terminology of Active Directory:
Parent Domain: First domain controller of your enterprise network .Example-
sun.com
Child Domain: apparent domain can have multiple child domains and it is
hierarchical structure.
Tree:combination of parent domain and child domains and its structure.
Forest:combination of multiple domains.example-sun.com,sun.net etc.
Site : dividing the domain based on the geographical area.
OU (Organisationalunits): It is used to divide the network into small groups
for administration .example-account department.
Users:aperson who have access to network resources.
Groups: Collection of users with similar properties
Compilers: A PC which has the access towards the active directory.
Fig.2.1 Active Directory
7. 7
User Category:
a) Local User Account: authentication is done local data base.
b) Global User Account or Domain User Account: authentication is done on
active directory.
GROUPS:
1. Security Groups: To assign rights and permissions to access resources.
2. Distribution Groups: these are non security groups.
GROUP SCOPE:
1. GlobalGroups: can be on any domain no limitation.
2. Universal Groups: a user of one domain can login on other domain
.Multiple domain functionality.
3. Domain Groups: Present on in any domain forest.
Built In Groups:
These groups are created automatically by the active directory.
Domain Admins: This group has computer administrator capatilty.
Domain Users : It is a default user group.
Account Operators: Users belongs to this group can create, modify, delete user
accounts but they do not have administrative rights.
BackupOperators: It provides rights to take the backup over network.
Authenticated User: Everyone
8. 8
MODULE 3
UNDERSTANDING SECURITY POLICIES:
Password Policies:
Password policies defines strong password and how user configure password
.Strong password can be determined by looking at the password length,
complexity and randomness. Microsoft provides number of controls that can
be used to ensure password security.
Password Complexity:
Different combination (upper caseto lower case plus numeric and special
symbols).
Password Length:
Microsoft by default its prompts up character for security concern .You can
define up to 14 characters.
Password History:
Set provides cache for the passwordscontent.
Time between Password Changes:
It defines time interval to change password frequently .example-email ,hosts
to server, database.
Account Lockout Policies:
It defines number of encrypt logon attempts permitted before a system lock
an account .
9. 9
Review Of password policies settings:
1. Go to start
2. Administrative servers
3. Local security policy
4. Expand this option
5.Two option:
a) Password policy:
1. Enforce password history
2. Maximum password age
3. Minimum password age
4. Password must need complexity requirements
5. Password encryption (enable)
Fig.3.1 PasswordPolicy
10. 10
b) Account policy:
1. Account lockout duration
2. Account lockout inreshold (for invalid login attempts)
3. Reset account lockout
Fig.3.2 AccountLockoutPolicy
GPO (Group policy Objects):
It is a set of rules that allow an administrator granular control over the
configuration of objects in active directory like users, computers, printers,
applications etc.
11. 11
Configure GPO:
Starts program ->administrative tools->active directory users to computers -
>window opens->expand the domain->right click ->click on properties ->click
on group policy tab->click on new ->enter the name of policy->close.
In order to make this policy as first priority to set priority go to group policy
tab->move the policy upset.
Understanding Common Attacks methods:
1. Dictionary Attack
2. Brute Forceattack
3. Physical attack using software and passwordskey lockers
4. Examining linked password
5. Cracked Password .Example- ophackline CD, giron CD)
6. Examining network and wireless password through shiffers.
7. Guest password login
12. 12
MODULE 4
UNDERSTANDING SECURITY SOFTWARE:-
Classification of DMZ: -
1. Sandwich DMZ: - We have inner and outer firewall and network is
protected with these 2 firewalls.
Fig.4.1 SandwichDMZ
2. Single firewall DMZ: - which protects internal network and parameter
network and internet cloud.
Fig.4.2 Single FirewallDMZ
13. 13
NAT(network address translation) : -
Technique used to modify network address information of a host while
traffic is travelling through a router or firewall. This NAT hides the network
information of private network while still permitting the traffic across a
public network.
ClassificationofNAT: -
1. Static NAT: -It maps an unregistered IP address on a public network to a
registered IP address on a public network using 1 to 1 base.
2. Dynamic NAT:- It maps an unregistered IP address on a private network
to a registered IP address that is selected by router device.
IP SECURITY: -
Benefits are: -
i. Access Control
ii. Data Authentication
iii. Replay Detection and Rejection
iv. Confidentiality using encryption
Components of IP security: -
i. AH(Authentication Header)
ii. ESP (Encapsulating Security Payload)
iii. IKE (Internet Key Exchange)
IP Security canbe used in 2 different modes:-
i. TransportMode i.e. host to host
ii. Tunnel Mode i.e. Gateway to hostor gateway to gateway
14. 14
SSH (Secure Shell) : -
Secure Shell is a program to log into another computer over a network, to
execute commands in a remote machine, and to move files from one
machine to another. It provides strong authenticationand secure
communications over insecure channels.
SSH protects a network from attacks such as IP
spoofing, IP sourcerouting, and DNS was spoofing. An attacker who has
managed to take over a network can only force SSH to disconnect. He or
she cannot play back the traffic or hijack the connection
when encryptions enabled.
COMMON NETWORKATTACK METHODS :-
i. DOS (Deny of Services)
ii. DDOS (Distributed DOS)
iii. IP Spoofing
iv. Middle Attack
v. BackdoorAttack
vi. DNS poisoning
vii. Replay Attack
viii. Weak Encryption Keys
ix. Social engineering
x. Software Attack
xi. Buffer Overflow Attack
xii. Remote CodeExecution Attack
xiii. SQL injection Attack
xiv. Cross-siteScripting Attack
Security Wireless Networks :-
Wireless networks basic components is SSID i.e. service set identity.
Using net stumbles utility you can scan SSID’S of your wireless
networks.
Protecting or Securing Wireless networks : -
i. Chooseyour own SSID
ii. Use own naming conventions for your devices
15. 15
Techniques used for securing wireless networks: -
i. WEP (While equivalent privacy)
ii. WAP (Wireless protection Action)
Connecting a wireless device involves 4 steps : -
i. Initialization
ii. Initiation
iii. Negotiation
iv. Authentication
PROTECTING THE SERVER AND CLIENT: -
Malicious Software:-
Also called as Malware . This software is designed to affect a computer
system without owners information concern. This malware is usually
associated with viruses, worms, trozen , spyware, route kits, Dishonest
Adwares.
Malware Categories:- These are classified based on damaged costto
your system.
Virus: - replication of files
To protect this virus we have antivirus software programs.
Virus Symptoms:-
i. Virus affects on CMOS and BIOS ROM : - You will get display
problem.
ii. Memory Resident Virus: - Memory related issues
iii. Booting Virus
iv. Partition or volume Virus :- Delete all partition
v. File Virus: - Modify the content, increase and decrease file size and
replicate the files.
vi. Software errors
vii. Problem related to hardware devices
16. 16
viii. Network connectivity problems
ix. Corrupted files
x. Abnormal Error messages
xi. Blue Screen Errors
xii. Missing files
To avoid virus of malware you should follow these steps: -
1. Don’t install unknown software/unlicensed software.
2. Don’t open strange email.
3. Don’t click on hyperlinks which provides free services
4. Don’t visit to survey websites
5. Don’t install freeware software
WINDOWS UPDATE: -
It is a process ofincluding fix, patches, service packs, updating device
drivers. To run it go to controlpanel -> open windows -> click on update
now.
Fig.4.3 Windows Update
17. 17
3 Types of UPDATES: -
i. Important Updates
ii. Recommended Updates
iii. Optional Updates
With the concernwith issues window update candeliver the
following: -
i. Security Update (related to antiviruses)
ii. Critical Updates (errors or bugs related to system)
iii. Service Packs (adds features to OS)
PHISHING AND PHARMING:-
Phishing: -
Phishing is a technique to attack individual using fake websites or fake
data and collecting personal information and attempting to cause a threat.
Done by using Social Engineering methods e.g. collecting Gmail or
Facebookdata.
Pharming: -
Pharming is technique aimed website traffic to a fake website.
PROTECTING SERVER: -
i. Placing the server : - related to physical location
ii. Hardening the server: - implementing firewalls, security services,
and antivirus protection.
iii. Disaster Solution
MBSA (Microsoft Base Line Security Analyzer): -It is a tool
you can check missing security updates and other security components
18. 18
CONCLUSION
The computer provides a great accuracy, speed and increasing volume of data
which accelerate the work of that department .Computer is a central element in
an organization, despite the fact that the computer is nothing more than a tool
for processing data, but its real role is to provide information for decision and
for planning and controlling operation.In present world, life is going very fast
and everybody wants a good and correct implementation in very short time.
Along with this everyone needs security against various attacks and thus
security tools are developed in order to save one’s identity and data.