SlideShare a Scribd company logo
1
MODULE 1
UNDERSTANDING SECURITY LAYERS:-
 Understanding Core Security Principles:-
When we are working with information security field we will go through the
word CIA (confidentiality, integrity and availability)
1. CONFIDENTIALITY:- It defines as a characteristic ensuring access is
restricted to only permited user, application or computer system.
2. INTEGRITY: - Consistency and accuracy and validity of data &
information is known as integrity. One of the goal of a successful
information is to secure your information i.e. data should be protect
against unauthorized changes.
3. AVAILABILITY: - It defines resources being accessible to a user,
application or computer system when required.
Fig.1.1 Core SecurityPrinciples
2
 THREAT:-
It is defined as unauthorized access to the resource. We have 2 types of
threats:-
• PHYSICAL THREAT :- Damage to resources, which is physical e.g.
Burn hard disk
• LOGICAL THREAT :-Other way of damaging resource. Again it is
classified into 2 categories-
o Accidental Threat:- e.g. natural disaster like fire accident, electrical
short circuits.
o Delibrate Threat:-It is related to exploitation of system security e.g.
hacking , spams, worms etc.
 RISK MANAGEMENT:-
Defines process ofidentifying, accessing and prioritizing risks and threats
e.g. backup servers.
Risk assessmentinclude four categories:-
i. Risk avoidance: - It is a process ofeliminating a risk by choosing not
to engage in any action or activity.
ii. Risk acceptance: - It defines the act of identifying and then making the
decision to acceptthe risk and impact of a specific risk.
iii. Risk mitigation: - It is defined as chances of reducing the risk on
impact of a risk to a particular level.
iv. Risk transfer: - It defines the act of taking steps to move responsibility
of a risk to a third part.
 Understanding Attack Surfaces: -
An attack surface consists of set of methods an attacker can use to enter a
system and potentially cause damage to the system. To calculate the attack
surface of an environment it is evaluated into 3 components: -
i. Application
ii. Network
iii. Internal attack (or system)
3
 Application Attack Evaluating:-
When evaluating the application attack, you need to concentrate on the
following things: -
a) The amount of codeof an application
b) The no. of data input to an application
c) The no. of running services
 Network Surface Evaluation: -
a) Network design and Architecture
b) Placement and rule sets of firewall
c) Other security concerns like VPN
 Internal/employee Evaluation: -
a) The potential for human errors
b) The risk of malicious software and social engineering
 SOCIAL ENGINEERING:-
It is a method used to gain access to data, systems, or networks primarily
through misrepresentation. These attacks can either by a person, email or
phones. To avoid social engineering attacks be suspicious to phone calls,
emails, etc.even verify identity.
Fig.1.2 SocialEngineering
4
 SITE SECURITY:-
It is a specialized area of security discipline where access controlis the
key conceptwhen thinking aboutphysical security. This site security is
designed may include the following:-
a) Authentication
b) Access control
c) Auditing
Physicalpremises are divided into 3 logicalareas:-
i. External parameter:-
External parameter uses security cameras and parameter fencing and
entry gates protected with guards and even gates with access card
reader.
ii. Internal parameter: -
Server wracks locking, keypad locking, security cameras, badge readers.
iii. Secure areas: -
• Highly protected
• Keypads
• Biometric technologies like finger or retina scanners and voice
recognition system.
 Understanding Computer Security:-
It consists of the process,procedures and technologies used to protect
computer system e.g. computer security cable, docking stations, laptop
security cables, theft recovery software and laptop alarms. You can also
protect using key loggers. Using key loggers you can protect the key
strokes and also to install a software that records your complete video.
5
MODULE 2
UNDERSTANDING OS SECURITY: -
Active Directory:-
It is a technology created by Microsoft in order to do centralized management of
entire enterprise network. This active directory includes different network
services such as-
a) LDAP(Light Weight DirectoryAccess Protocol):
It is an application protocolused for quering and modifying data using
directory services over TCP/IP. In active directory everything is arranged in
hierarchical order so that we can easily find the objects of structure.
b) SSO(Single SignOn):
This protocolprovides to log once and access multiple related but i
independent software systems without having to login again.
Domain Controller:
It is nothing but a window server that stores a replica of the accounts and
security information of a domain and also define domain boundaries .When we
install active directory services in 2008, 2012 it becomes domain
controller.Example-abc.com.
DC PROMOSS:
It is a command used to promoteserver to DC .When we install active directory
several MMC (Microsoft Management Console) and see different option that
are:
1. Active directory uses end computers
2. Active directory domains and services
3. Active directory administrative centre
4. Active directory sites and services.
6
To identify a system is working in workgroup or domain check the properties
of my computer.
Terminology of Active Directory:
Parent Domain: First domain controller of your enterprise network .Example-
sun.com
Child Domain: apparent domain can have multiple child domains and it is
hierarchical structure.
Tree:combination of parent domain and child domains and its structure.
Forest:combination of multiple domains.example-sun.com,sun.net etc.
Site : dividing the domain based on the geographical area.
OU (Organisationalunits): It is used to divide the network into small groups
for administration .example-account department.
Users:aperson who have access to network resources.
Groups: Collection of users with similar properties
Compilers: A PC which has the access towards the active directory.
Fig.2.1 Active Directory
7
User Category:
a) Local User Account: authentication is done local data base.
b) Global User Account or Domain User Account: authentication is done on
active directory.
GROUPS:
1. Security Groups: To assign rights and permissions to access resources.
2. Distribution Groups: these are non security groups.
GROUP SCOPE:
1. GlobalGroups: can be on any domain no limitation.
2. Universal Groups: a user of one domain can login on other domain
.Multiple domain functionality.
3. Domain Groups: Present on in any domain forest.
Built In Groups:
These groups are created automatically by the active directory.
Domain Admins: This group has computer administrator capatilty.
Domain Users : It is a default user group.
Account Operators: Users belongs to this group can create, modify, delete user
accounts but they do not have administrative rights.
BackupOperators: It provides rights to take the backup over network.
Authenticated User: Everyone
8
MODULE 3
UNDERSTANDING SECURITY POLICIES:
 Password Policies:
Password policies defines strong password and how user configure password
.Strong password can be determined by looking at the password length,
complexity and randomness. Microsoft provides number of controls that can
be used to ensure password security.
Password Complexity:
Different combination (upper caseto lower case plus numeric and special
symbols).
Password Length:
Microsoft by default its prompts up character for security concern .You can
define up to 14 characters.
Password History:
Set provides cache for the passwordscontent.
Time between Password Changes:
It defines time interval to change password frequently .example-email ,hosts
to server, database.
 Account Lockout Policies:
It defines number of encrypt logon attempts permitted before a system lock
an account .
9
Review Of password policies settings:
1. Go to start
2. Administrative servers
3. Local security policy
4. Expand this option
5.Two option:
a) Password policy:
1. Enforce password history
2. Maximum password age
3. Minimum password age
4. Password must need complexity requirements
5. Password encryption (enable)
Fig.3.1 PasswordPolicy
10
b) Account policy:
1. Account lockout duration
2. Account lockout inreshold (for invalid login attempts)
3. Reset account lockout
Fig.3.2 AccountLockoutPolicy
GPO (Group policy Objects):
It is a set of rules that allow an administrator granular control over the
configuration of objects in active directory like users, computers, printers,
applications etc.
11
Configure GPO:
Starts program ->administrative tools->active directory users to computers -
>window opens->expand the domain->right click ->click on properties ->click
on group policy tab->click on new ->enter the name of policy->close.
In order to make this policy as first priority to set priority go to group policy
tab->move the policy upset.
Understanding Common Attacks methods:
1. Dictionary Attack
2. Brute Forceattack
3. Physical attack using software and passwordskey lockers
4. Examining linked password
5. Cracked Password .Example- ophackline CD, giron CD)
6. Examining network and wireless password through shiffers.
7. Guest password login
12
MODULE 4
UNDERSTANDING SECURITY SOFTWARE:-
Classification of DMZ: -
1. Sandwich DMZ: - We have inner and outer firewall and network is
protected with these 2 firewalls.
Fig.4.1 SandwichDMZ
2. Single firewall DMZ: - which protects internal network and parameter
network and internet cloud.
Fig.4.2 Single FirewallDMZ
13
 NAT(network address translation) : -
Technique used to modify network address information of a host while
traffic is travelling through a router or firewall. This NAT hides the network
information of private network while still permitting the traffic across a
public network.
ClassificationofNAT: -
1. Static NAT: -It maps an unregistered IP address on a public network to a
registered IP address on a public network using 1 to 1 base.
2. Dynamic NAT:- It maps an unregistered IP address on a private network
to a registered IP address that is selected by router device.
 IP SECURITY: -
Benefits are: -
i. Access Control
ii. Data Authentication
iii. Replay Detection and Rejection
iv. Confidentiality using encryption
Components of IP security: -
i. AH(Authentication Header)
ii. ESP (Encapsulating Security Payload)
iii. IKE (Internet Key Exchange)
IP Security canbe used in 2 different modes:-
i. TransportMode i.e. host to host
ii. Tunnel Mode i.e. Gateway to hostor gateway to gateway
14
 SSH (Secure Shell) : -
Secure Shell is a program to log into another computer over a network, to
execute commands in a remote machine, and to move files from one
machine to another. It provides strong authenticationand secure
communications over insecure channels.
SSH protects a network from attacks such as IP
spoofing, IP sourcerouting, and DNS was spoofing. An attacker who has
managed to take over a network can only force SSH to disconnect. He or
she cannot play back the traffic or hijack the connection
when encryptions enabled.
 COMMON NETWORKATTACK METHODS :-
i. DOS (Deny of Services)
ii. DDOS (Distributed DOS)
iii. IP Spoofing
iv. Middle Attack
v. BackdoorAttack
vi. DNS poisoning
vii. Replay Attack
viii. Weak Encryption Keys
ix. Social engineering
x. Software Attack
xi. Buffer Overflow Attack
xii. Remote CodeExecution Attack
xiii. SQL injection Attack
xiv. Cross-siteScripting Attack
 Security Wireless Networks :-
Wireless networks basic components is SSID i.e. service set identity.
Using net stumbles utility you can scan SSID’S of your wireless
networks.
 Protecting or Securing Wireless networks : -
i. Chooseyour own SSID
ii. Use own naming conventions for your devices
15
 Techniques used for securing wireless networks: -
i. WEP (While equivalent privacy)
ii. WAP (Wireless protection Action)
 Connecting a wireless device involves 4 steps : -
i. Initialization
ii. Initiation
iii. Negotiation
iv. Authentication
 PROTECTING THE SERVER AND CLIENT: -
 Malicious Software:-
Also called as Malware . This software is designed to affect a computer
system without owners information concern. This malware is usually
associated with viruses, worms, trozen , spyware, route kits, Dishonest
Adwares.
 Malware Categories:- These are classified based on damaged costto
your system.
Virus: - replication of files
To protect this virus we have antivirus software programs.
 Virus Symptoms:-
i. Virus affects on CMOS and BIOS ROM : - You will get display
problem.
ii. Memory Resident Virus: - Memory related issues
iii. Booting Virus
iv. Partition or volume Virus :- Delete all partition
v. File Virus: - Modify the content, increase and decrease file size and
replicate the files.
vi. Software errors
vii. Problem related to hardware devices
16
viii. Network connectivity problems
ix. Corrupted files
x. Abnormal Error messages
xi. Blue Screen Errors
xii. Missing files
 To avoid virus of malware you should follow these steps: -
1. Don’t install unknown software/unlicensed software.
2. Don’t open strange email.
3. Don’t click on hyperlinks which provides free services
4. Don’t visit to survey websites
5. Don’t install freeware software
 WINDOWS UPDATE: -
It is a process ofincluding fix, patches, service packs, updating device
drivers. To run it go to controlpanel -> open windows -> click on update
now.
Fig.4.3 Windows Update
17
 3 Types of UPDATES: -
i. Important Updates
ii. Recommended Updates
iii. Optional Updates
 With the concernwith issues window update candeliver the
following: -
i. Security Update (related to antiviruses)
ii. Critical Updates (errors or bugs related to system)
iii. Service Packs (adds features to OS)
 PHISHING AND PHARMING:-
Phishing: -
Phishing is a technique to attack individual using fake websites or fake
data and collecting personal information and attempting to cause a threat.
Done by using Social Engineering methods e.g. collecting Gmail or
Facebookdata.
Pharming: -
Pharming is technique aimed website traffic to a fake website.
 PROTECTING SERVER: -
i. Placing the server : - related to physical location
ii. Hardening the server: - implementing firewalls, security services,
and antivirus protection.
iii. Disaster Solution
 MBSA (Microsoft Base Line Security Analyzer): -It is a tool
you can check missing security updates and other security components
18
CONCLUSION
The computer provides a great accuracy, speed and increasing volume of data
which accelerate the work of that department .Computer is a central element in
an organization, despite the fact that the computer is nothing more than a tool
for processing data, but its real role is to provide information for decision and
for planning and controlling operation.In present world, life is going very fast
and everybody wants a good and correct implementation in very short time.
Along with this everyone needs security against various attacks and thus
security tools are developed in order to save one’s identity and data.
19
REFERENCES
 MOAC SECURITYFUNDAMENTALS 98-369
 http://ayurveda.hubpages.com
 http://www.tech-faq.com

More Related Content

What's hot

Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneHost-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Alec Sloman
 
A Secure Software Engineering Perspective
A Secure Software Engineering PerspectiveA Secure Software Engineering Perspective
A Secure Software Engineering Perspective
idescitation
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
Editor IJCATR
 
JAVA INTRODUCTION
JAVA INTRODUCTIONJAVA INTRODUCTION
JAVA INTRODUCTION
Prof Ansari
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
Syaiful Ahdan
 
Protection
ProtectionProtection
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Security
SecuritySecurity
Security
almabsli
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
Temesgen Berhanu
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaS
KAMLESH HINGWE
 
Os security issues
Os security issuesOs security issues
Os security issues
JOLLUSUDARSHANREDDY
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
Alfred Ouyang
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Toshiharu Harada, Ph.D
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
Information Technology
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
IRJET Journal
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
vampugani
 

What's hot (19)

Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security, by Dmitry Khlebnikov @ Secure Development MelbourneHost-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
 
A Secure Software Engineering Perspective
A Secure Software Engineering PerspectiveA Secure Software Engineering Perspective
A Secure Software Engineering Perspective
 
9.system analysis
9.system analysis9.system analysis
9.system analysis
 
OSCh18
OSCh18OSCh18
OSCh18
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 
JAVA INTRODUCTION
JAVA INTRODUCTIONJAVA INTRODUCTION
JAVA INTRODUCTION
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
Protection
ProtectionProtection
Protection
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Security
SecuritySecurity
Security
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaS
 
Os security issues
Os security issuesOs security issues
Os security issues
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 

Viewers also liked

Nous – Product that helps match people and skills in the enterprise
Nous – Product that helps match people and skills in the enterpriseNous – Product that helps match people and skills in the enterprise
Nous – Product that helps match people and skills in the enterprise
ProductNation/iSPIRT
 
Programming in mind
Programming in mindProgramming in mind
Programming in mind
Kazunari Ito
 
iSPIRT Messaging Playbook
iSPIRT Messaging PlaybookiSPIRT Messaging Playbook
iSPIRT Messaging Playbook
ProductNation/iSPIRT
 
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...ProductNation/iSPIRT
 
FrontalRain Presentation for IT Minister @iSPIRT Event - Conclave for India a...
FrontalRain Presentation for IT Minister @iSPIRT Event - Conclave for India a...FrontalRain Presentation for IT Minister @iSPIRT Event - Conclave for India a...
FrontalRain Presentation for IT Minister @iSPIRT Event - Conclave for India a...ProductNation/iSPIRT
 
4 Crucial Slides for Your Startup's Investor Presentation
4 Crucial Slides for Your Startup's Investor Presentation4 Crucial Slides for Your Startup's Investor Presentation
4 Crucial Slides for Your Startup's Investor Presentation
Dev Khare
 
Rewriting the Script of a Nation - Indian Software Product Industry Round Table
Rewriting the Script of a Nation - Indian Software Product Industry Round TableRewriting the Script of a Nation - Indian Software Product Industry Round Table
Rewriting the Script of a Nation - Indian Software Product Industry Round Table
ProductNation/iSPIRT
 
Dreamforce 2014 whats next in social business
Dreamforce 2014 whats next in social businessDreamforce 2014 whats next in social business
Dreamforce 2014 whats next in social businessAlan Lepofsky
 
Innofest is architectured as a festival, in a daring break from a ’traditiona...
Innofest is architectured as a festival, in a daring break from a ’traditiona...Innofest is architectured as a festival, in a daring break from a ’traditiona...
Innofest is architectured as a festival, in a daring break from a ’traditiona...
ProductNation/iSPIRT
 
Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...
Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...
Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...
ProductNation/iSPIRT
 
Simplified Framework for Capital Raising by technological start ups - INSTITU...
Simplified Framework for Capital Raising by technological start ups - INSTITU...Simplified Framework for Capital Raising by technological start ups - INSTITU...
Simplified Framework for Capital Raising by technological start ups - INSTITU...
ProductNation/iSPIRT
 
2017 iSPIRT Annual letter
2017 iSPIRT Annual letter2017 iSPIRT Annual letter
2017 iSPIRT Annual letter
ProductNation/iSPIRT
 
iSPIRT first Founder Circle meeting in Bangalore on 4th Feb 2013
iSPIRT first Founder Circle meeting in Bangalore on 4th Feb 2013iSPIRT first Founder Circle meeting in Bangalore on 4th Feb 2013
iSPIRT first Founder Circle meeting in Bangalore on 4th Feb 2013
ProductNation/iSPIRT
 
iSPIRT Brand identity and the logo options
iSPIRT Brand identity and the logo optionsiSPIRT Brand identity and the logo options
iSPIRT Brand identity and the logo options
ProductNation/iSPIRT
 
From a closed gate to an open door
From a closed gate to an open doorFrom a closed gate to an open door
From a closed gate to an open door
Steve Hall
 
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
ProductNation/iSPIRT
 
India unlocking the Missing Middle
India unlocking the Missing Middle India unlocking the Missing Middle
India unlocking the Missing Middle
ProductNation/iSPIRT
 
Psp playbook for indian product startups
Psp playbook for indian product startups Psp playbook for indian product startups
Psp playbook for indian product startups
ProductNation/iSPIRT
 
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
ProductNation/iSPIRT
 

Viewers also liked (20)

Nous – Product that helps match people and skills in the enterprise
Nous – Product that helps match people and skills in the enterpriseNous – Product that helps match people and skills in the enterprise
Nous – Product that helps match people and skills in the enterprise
 
seekers factory
seekers factoryseekers factory
seekers factory
 
Programming in mind
Programming in mindProgramming in mind
Programming in mind
 
iSPIRT Messaging Playbook
iSPIRT Messaging PlaybookiSPIRT Messaging Playbook
iSPIRT Messaging Playbook
 
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
 
FrontalRain Presentation for IT Minister @iSPIRT Event - Conclave for India a...
FrontalRain Presentation for IT Minister @iSPIRT Event - Conclave for India a...FrontalRain Presentation for IT Minister @iSPIRT Event - Conclave for India a...
FrontalRain Presentation for IT Minister @iSPIRT Event - Conclave for India a...
 
4 Crucial Slides for Your Startup's Investor Presentation
4 Crucial Slides for Your Startup's Investor Presentation4 Crucial Slides for Your Startup's Investor Presentation
4 Crucial Slides for Your Startup's Investor Presentation
 
Rewriting the Script of a Nation - Indian Software Product Industry Round Table
Rewriting the Script of a Nation - Indian Software Product Industry Round TableRewriting the Script of a Nation - Indian Software Product Industry Round Table
Rewriting the Script of a Nation - Indian Software Product Industry Round Table
 
Dreamforce 2014 whats next in social business
Dreamforce 2014 whats next in social businessDreamforce 2014 whats next in social business
Dreamforce 2014 whats next in social business
 
Innofest is architectured as a festival, in a daring break from a ’traditiona...
Innofest is architectured as a festival, in a daring break from a ’traditiona...Innofest is architectured as a festival, in a daring break from a ’traditiona...
Innofest is architectured as a festival, in a daring break from a ’traditiona...
 
Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...
Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...
Indian Unicorns will continue to strengthen through acquisitions in Mobile, M...
 
Simplified Framework for Capital Raising by technological start ups - INSTITU...
Simplified Framework for Capital Raising by technological start ups - INSTITU...Simplified Framework for Capital Raising by technological start ups - INSTITU...
Simplified Framework for Capital Raising by technological start ups - INSTITU...
 
2017 iSPIRT Annual letter
2017 iSPIRT Annual letter2017 iSPIRT Annual letter
2017 iSPIRT Annual letter
 
iSPIRT first Founder Circle meeting in Bangalore on 4th Feb 2013
iSPIRT first Founder Circle meeting in Bangalore on 4th Feb 2013iSPIRT first Founder Circle meeting in Bangalore on 4th Feb 2013
iSPIRT first Founder Circle meeting in Bangalore on 4th Feb 2013
 
iSPIRT Brand identity and the logo options
iSPIRT Brand identity and the logo optionsiSPIRT Brand identity and the logo options
iSPIRT Brand identity and the logo options
 
From a closed gate to an open door
From a closed gate to an open doorFrom a closed gate to an open door
From a closed gate to an open door
 
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
 
India unlocking the Missing Middle
India unlocking the Missing Middle India unlocking the Missing Middle
India unlocking the Missing Middle
 
Psp playbook for indian product startups
Psp playbook for indian product startups Psp playbook for indian product startups
Psp playbook for indian product startups
 
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
 

Similar to report on network security fundamentals

Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
ahmad abdelhafeez
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
MulunehBardadeYegeta
 
Security_PPT.pptx
Security_PPT.pptxSecurity_PPT.pptx
Security_PPT.pptx
BHARATGupta323808
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALSEMSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALYEARSTUDENTPROJECT
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
Security Issues in OpenStack
Security Issues in OpenStackSecurity Issues in OpenStack
Security Issues in OpenStack
oldbam
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
sohaildanish
 
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdfUNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
KavitaShinde26
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
amiyadutta
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 

Similar to report on network security fundamentals (20)

Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
Security_PPT.pptx
Security_PPT.pptxSecurity_PPT.pptx
Security_PPT.pptx
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
publishable paper
publishable paperpublishable paper
publishable paper
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Security Issues in OpenStack
Security Issues in OpenStackSecurity Issues in OpenStack
Security Issues in OpenStack
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdfUNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 

Recently uploaded

Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 

Recently uploaded (20)

Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 

report on network security fundamentals

  • 1. 1 MODULE 1 UNDERSTANDING SECURITY LAYERS:-  Understanding Core Security Principles:- When we are working with information security field we will go through the word CIA (confidentiality, integrity and availability) 1. CONFIDENTIALITY:- It defines as a characteristic ensuring access is restricted to only permited user, application or computer system. 2. INTEGRITY: - Consistency and accuracy and validity of data & information is known as integrity. One of the goal of a successful information is to secure your information i.e. data should be protect against unauthorized changes. 3. AVAILABILITY: - It defines resources being accessible to a user, application or computer system when required. Fig.1.1 Core SecurityPrinciples
  • 2. 2  THREAT:- It is defined as unauthorized access to the resource. We have 2 types of threats:- • PHYSICAL THREAT :- Damage to resources, which is physical e.g. Burn hard disk • LOGICAL THREAT :-Other way of damaging resource. Again it is classified into 2 categories- o Accidental Threat:- e.g. natural disaster like fire accident, electrical short circuits. o Delibrate Threat:-It is related to exploitation of system security e.g. hacking , spams, worms etc.  RISK MANAGEMENT:- Defines process ofidentifying, accessing and prioritizing risks and threats e.g. backup servers. Risk assessmentinclude four categories:- i. Risk avoidance: - It is a process ofeliminating a risk by choosing not to engage in any action or activity. ii. Risk acceptance: - It defines the act of identifying and then making the decision to acceptthe risk and impact of a specific risk. iii. Risk mitigation: - It is defined as chances of reducing the risk on impact of a risk to a particular level. iv. Risk transfer: - It defines the act of taking steps to move responsibility of a risk to a third part.  Understanding Attack Surfaces: - An attack surface consists of set of methods an attacker can use to enter a system and potentially cause damage to the system. To calculate the attack surface of an environment it is evaluated into 3 components: - i. Application ii. Network iii. Internal attack (or system)
  • 3. 3  Application Attack Evaluating:- When evaluating the application attack, you need to concentrate on the following things: - a) The amount of codeof an application b) The no. of data input to an application c) The no. of running services  Network Surface Evaluation: - a) Network design and Architecture b) Placement and rule sets of firewall c) Other security concerns like VPN  Internal/employee Evaluation: - a) The potential for human errors b) The risk of malicious software and social engineering  SOCIAL ENGINEERING:- It is a method used to gain access to data, systems, or networks primarily through misrepresentation. These attacks can either by a person, email or phones. To avoid social engineering attacks be suspicious to phone calls, emails, etc.even verify identity. Fig.1.2 SocialEngineering
  • 4. 4  SITE SECURITY:- It is a specialized area of security discipline where access controlis the key conceptwhen thinking aboutphysical security. This site security is designed may include the following:- a) Authentication b) Access control c) Auditing Physicalpremises are divided into 3 logicalareas:- i. External parameter:- External parameter uses security cameras and parameter fencing and entry gates protected with guards and even gates with access card reader. ii. Internal parameter: - Server wracks locking, keypad locking, security cameras, badge readers. iii. Secure areas: - • Highly protected • Keypads • Biometric technologies like finger or retina scanners and voice recognition system.  Understanding Computer Security:- It consists of the process,procedures and technologies used to protect computer system e.g. computer security cable, docking stations, laptop security cables, theft recovery software and laptop alarms. You can also protect using key loggers. Using key loggers you can protect the key strokes and also to install a software that records your complete video.
  • 5. 5 MODULE 2 UNDERSTANDING OS SECURITY: - Active Directory:- It is a technology created by Microsoft in order to do centralized management of entire enterprise network. This active directory includes different network services such as- a) LDAP(Light Weight DirectoryAccess Protocol): It is an application protocolused for quering and modifying data using directory services over TCP/IP. In active directory everything is arranged in hierarchical order so that we can easily find the objects of structure. b) SSO(Single SignOn): This protocolprovides to log once and access multiple related but i independent software systems without having to login again. Domain Controller: It is nothing but a window server that stores a replica of the accounts and security information of a domain and also define domain boundaries .When we install active directory services in 2008, 2012 it becomes domain controller.Example-abc.com. DC PROMOSS: It is a command used to promoteserver to DC .When we install active directory several MMC (Microsoft Management Console) and see different option that are: 1. Active directory uses end computers 2. Active directory domains and services 3. Active directory administrative centre 4. Active directory sites and services.
  • 6. 6 To identify a system is working in workgroup or domain check the properties of my computer. Terminology of Active Directory: Parent Domain: First domain controller of your enterprise network .Example- sun.com Child Domain: apparent domain can have multiple child domains and it is hierarchical structure. Tree:combination of parent domain and child domains and its structure. Forest:combination of multiple domains.example-sun.com,sun.net etc. Site : dividing the domain based on the geographical area. OU (Organisationalunits): It is used to divide the network into small groups for administration .example-account department. Users:aperson who have access to network resources. Groups: Collection of users with similar properties Compilers: A PC which has the access towards the active directory. Fig.2.1 Active Directory
  • 7. 7 User Category: a) Local User Account: authentication is done local data base. b) Global User Account or Domain User Account: authentication is done on active directory. GROUPS: 1. Security Groups: To assign rights and permissions to access resources. 2. Distribution Groups: these are non security groups. GROUP SCOPE: 1. GlobalGroups: can be on any domain no limitation. 2. Universal Groups: a user of one domain can login on other domain .Multiple domain functionality. 3. Domain Groups: Present on in any domain forest. Built In Groups: These groups are created automatically by the active directory. Domain Admins: This group has computer administrator capatilty. Domain Users : It is a default user group. Account Operators: Users belongs to this group can create, modify, delete user accounts but they do not have administrative rights. BackupOperators: It provides rights to take the backup over network. Authenticated User: Everyone
  • 8. 8 MODULE 3 UNDERSTANDING SECURITY POLICIES:  Password Policies: Password policies defines strong password and how user configure password .Strong password can be determined by looking at the password length, complexity and randomness. Microsoft provides number of controls that can be used to ensure password security. Password Complexity: Different combination (upper caseto lower case plus numeric and special symbols). Password Length: Microsoft by default its prompts up character for security concern .You can define up to 14 characters. Password History: Set provides cache for the passwordscontent. Time between Password Changes: It defines time interval to change password frequently .example-email ,hosts to server, database.  Account Lockout Policies: It defines number of encrypt logon attempts permitted before a system lock an account .
  • 9. 9 Review Of password policies settings: 1. Go to start 2. Administrative servers 3. Local security policy 4. Expand this option 5.Two option: a) Password policy: 1. Enforce password history 2. Maximum password age 3. Minimum password age 4. Password must need complexity requirements 5. Password encryption (enable) Fig.3.1 PasswordPolicy
  • 10. 10 b) Account policy: 1. Account lockout duration 2. Account lockout inreshold (for invalid login attempts) 3. Reset account lockout Fig.3.2 AccountLockoutPolicy GPO (Group policy Objects): It is a set of rules that allow an administrator granular control over the configuration of objects in active directory like users, computers, printers, applications etc.
  • 11. 11 Configure GPO: Starts program ->administrative tools->active directory users to computers - >window opens->expand the domain->right click ->click on properties ->click on group policy tab->click on new ->enter the name of policy->close. In order to make this policy as first priority to set priority go to group policy tab->move the policy upset. Understanding Common Attacks methods: 1. Dictionary Attack 2. Brute Forceattack 3. Physical attack using software and passwordskey lockers 4. Examining linked password 5. Cracked Password .Example- ophackline CD, giron CD) 6. Examining network and wireless password through shiffers. 7. Guest password login
  • 12. 12 MODULE 4 UNDERSTANDING SECURITY SOFTWARE:- Classification of DMZ: - 1. Sandwich DMZ: - We have inner and outer firewall and network is protected with these 2 firewalls. Fig.4.1 SandwichDMZ 2. Single firewall DMZ: - which protects internal network and parameter network and internet cloud. Fig.4.2 Single FirewallDMZ
  • 13. 13  NAT(network address translation) : - Technique used to modify network address information of a host while traffic is travelling through a router or firewall. This NAT hides the network information of private network while still permitting the traffic across a public network. ClassificationofNAT: - 1. Static NAT: -It maps an unregistered IP address on a public network to a registered IP address on a public network using 1 to 1 base. 2. Dynamic NAT:- It maps an unregistered IP address on a private network to a registered IP address that is selected by router device.  IP SECURITY: - Benefits are: - i. Access Control ii. Data Authentication iii. Replay Detection and Rejection iv. Confidentiality using encryption Components of IP security: - i. AH(Authentication Header) ii. ESP (Encapsulating Security Payload) iii. IKE (Internet Key Exchange) IP Security canbe used in 2 different modes:- i. TransportMode i.e. host to host ii. Tunnel Mode i.e. Gateway to hostor gateway to gateway
  • 14. 14  SSH (Secure Shell) : - Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authenticationand secure communications over insecure channels. SSH protects a network from attacks such as IP spoofing, IP sourcerouting, and DNS was spoofing. An attacker who has managed to take over a network can only force SSH to disconnect. He or she cannot play back the traffic or hijack the connection when encryptions enabled.  COMMON NETWORKATTACK METHODS :- i. DOS (Deny of Services) ii. DDOS (Distributed DOS) iii. IP Spoofing iv. Middle Attack v. BackdoorAttack vi. DNS poisoning vii. Replay Attack viii. Weak Encryption Keys ix. Social engineering x. Software Attack xi. Buffer Overflow Attack xii. Remote CodeExecution Attack xiii. SQL injection Attack xiv. Cross-siteScripting Attack  Security Wireless Networks :- Wireless networks basic components is SSID i.e. service set identity. Using net stumbles utility you can scan SSID’S of your wireless networks.  Protecting or Securing Wireless networks : - i. Chooseyour own SSID ii. Use own naming conventions for your devices
  • 15. 15  Techniques used for securing wireless networks: - i. WEP (While equivalent privacy) ii. WAP (Wireless protection Action)  Connecting a wireless device involves 4 steps : - i. Initialization ii. Initiation iii. Negotiation iv. Authentication  PROTECTING THE SERVER AND CLIENT: -  Malicious Software:- Also called as Malware . This software is designed to affect a computer system without owners information concern. This malware is usually associated with viruses, worms, trozen , spyware, route kits, Dishonest Adwares.  Malware Categories:- These are classified based on damaged costto your system. Virus: - replication of files To protect this virus we have antivirus software programs.  Virus Symptoms:- i. Virus affects on CMOS and BIOS ROM : - You will get display problem. ii. Memory Resident Virus: - Memory related issues iii. Booting Virus iv. Partition or volume Virus :- Delete all partition v. File Virus: - Modify the content, increase and decrease file size and replicate the files. vi. Software errors vii. Problem related to hardware devices
  • 16. 16 viii. Network connectivity problems ix. Corrupted files x. Abnormal Error messages xi. Blue Screen Errors xii. Missing files  To avoid virus of malware you should follow these steps: - 1. Don’t install unknown software/unlicensed software. 2. Don’t open strange email. 3. Don’t click on hyperlinks which provides free services 4. Don’t visit to survey websites 5. Don’t install freeware software  WINDOWS UPDATE: - It is a process ofincluding fix, patches, service packs, updating device drivers. To run it go to controlpanel -> open windows -> click on update now. Fig.4.3 Windows Update
  • 17. 17  3 Types of UPDATES: - i. Important Updates ii. Recommended Updates iii. Optional Updates  With the concernwith issues window update candeliver the following: - i. Security Update (related to antiviruses) ii. Critical Updates (errors or bugs related to system) iii. Service Packs (adds features to OS)  PHISHING AND PHARMING:- Phishing: - Phishing is a technique to attack individual using fake websites or fake data and collecting personal information and attempting to cause a threat. Done by using Social Engineering methods e.g. collecting Gmail or Facebookdata. Pharming: - Pharming is technique aimed website traffic to a fake website.  PROTECTING SERVER: - i. Placing the server : - related to physical location ii. Hardening the server: - implementing firewalls, security services, and antivirus protection. iii. Disaster Solution  MBSA (Microsoft Base Line Security Analyzer): -It is a tool you can check missing security updates and other security components
  • 18. 18 CONCLUSION The computer provides a great accuracy, speed and increasing volume of data which accelerate the work of that department .Computer is a central element in an organization, despite the fact that the computer is nothing more than a tool for processing data, but its real role is to provide information for decision and for planning and controlling operation.In present world, life is going very fast and everybody wants a good and correct implementation in very short time. Along with this everyone needs security against various attacks and thus security tools are developed in order to save one’s identity and data.
  • 19. 19 REFERENCES  MOAC SECURITYFUNDAMENTALS 98-369  http://ayurveda.hubpages.com  http://www.tech-faq.com