Small Office/Home Office (SOHO) Computer and Network Security Sinclair Community College CIS Department Small Office/Home Office (SOHO) Computer and Network Security Bob Sherman Patty Gillilan Associate Professors, CIS Department Multiple Microsoft and Cisco certifications Why SOHO Computer and Networking Security is Important Personal information Private files Financial information Having your systems “high jacked” Invasion of privacy, e.g., Spyware Identity theft Why SOHO Computer and Networking Security is Important Identity theft is a very large and growing concern Gartner Research Group estimates seven million victims of ID theft in the US in the past twelve months http://www.consumer.gov/idtheft/ http://www.usdoj.gov/criminal/fraud/idtheft. html http://www.idtheftcenter.org/index.shtml Why SOHO Computer and Networking Security is Important Spyware: a new and growing threat Spyware can… Manipulate your system Record your habits Facilitate theft of your passwords, credit card info and identity Adware, key loggers and Trojan horses Why SOHO Computer and Networking Security is Important Signs of spyware on your PC Home page changes New favorites appear System is noticeably slower New toolbars appear in IE Why SOHO Computer and Networking Security is Important Spyware File sharing services, e.g., Kazaa or Grokster Clicking on pop-up ads Opening infected emails Spy Sweeper http://www.webroot.com Objectives Familiarize the computer users with the following: What it means to be “online” The door to the Internet swings both ways What are common risks and vulnerabilities? How to protect against threats Maintaining vigilance by staying current Nine Critical Steps in Securing SOHO Computers and Networks Install, use and update anti-virus programs Treat all email attachments with caution Keep current with operating system updates Use host based Intrusion Detection Systems Nine Critical Steps in Securing SOHO Computers and Networks Use a firewall Host based or dedicated firewall Regularly backup your data Use an operating system with strong authentication and passwords Use file access controls and data encryption Make a recovery/boot disk Nine Critical Steps in Securing SOHO Computers and Networks Install, use and update anti-virus programs Treat all email attachments with caution Keep current with operating system updates Use host based Intrusion Detection Systems Install, use and update anti-virus programs The single most important thing you can do to protect your system Most common exposure Email attachments Connections to web servers Make sure the program you select also protects against Worms and Trojans Install, use and update anti-virus programs Some popular antivirus products Symantec McAfee Computer Associates http://www.symantec.com/sabu/nis/nis_pe/ http://us.mcafee.com/default.asp http://www.my-etrust.com Install, use and update anti-virus programs Norton antivirus output and options System status Reports Scheduled system scan Nine Critical Steps in Securing SOHO Computers and Networks Install, use and update anti-virus programs Treat all email attachments with caution Keep current with operating system updates Use host based Intrusion Detection Systems Treat All Email Attachments with Caution Email Viruses are becoming more prevalent all of the time If you haven't gotten an email virus, chances are you will, if you don’t take the appropriate steps Preventing email viruses begins with common sense and ends with a virus detection program Treat All Email Attachments with Caution The Common sense approach: Make sure you are familiar with the sender of the email Note the names of the file attachments Do they make sense to you? Some names are designed to entice you to open the attachment – AnnaKournikova.jpg.vbs (Worm) Treat All Email Attachments with Caution The common sense approach: If the attachment has one of the following file extensions, be very suspect .scr, Delete .pif, .vb, .vbe, .vbs, exe suspect attachments immediately and empty the “Recycle Bin” Nine Critical Steps in Securing SOHO Computers and Networks Install, use and update anti-virus programs Treat all email attachments with caution Keep current with operating system updates Use host based Intrusion Detection Systems Keep current with operating system patches “A fix or modification to a program bug in the Operating System. A patch is an actual piece of object code that is inserted into (patched into) an executable program.” -- webopedia.com Many operating system patches are related to system security. Staying current can be automated on recent versions of Windows Keep current with operating system patches Windows operating systems are frequently “patched or updated” Windows Update Service Packs (SPs) are a collection of patches and updates Keep current with operating system patches Before updating a system make sure of the following The update is required for your system The update won’t harm your system or any applications running on it You can uninstall the update Get used to performing these updates Many security compromises are a result of unpatched systems Keep current with operating system patches Using the Windows Update feature Click the Start menu Then choose Windows Update http://v4.windowsupdate.microsoft.co m/en/default.asp Windows Update options in Windows 2000 Pro: Keep current with operating system patches First click Scan for Updates Then click Review and Install Updates Three categories of updates Critical updates and service packs Updates for your version of Windows Driver updates Keep current with operating system patches Click on Critical Updates and Service Packs Remove those updates not applicable to your system Click Install Now Some updates will require restarting your computer Keep current with operating system patches Configuring Automatic Updates Control Panel or System Properties Update options Only notify of updates Download and notify of updates Download and install on a specified schedule Keep current with operating system patches Software Update Service Available on more recent versions of Windows Creates a single point internally as the source of updates Conserves bandwidth Keep current with operating system patches Microsoft Technet Service Source for a variety of security and related details http://www.microsoft.com/technet/defa ult.asp Knowledge Base articles Keep current with operating system patches Blaster Worm Knowledge Base article #823980 Exploits a buffer overflow flaw in Windows Patch released by Microsoft on July 16, 2003 Updated August 25, 2003 Keep current with operating system patches State of Maryland BMV shut down on August 13, 2003 Many other large networks affected http://www.microsoft.com/technet/tree view/?url=/technet/security/bulletin/M S03-026.asp Keep current with operating system patches Sasser Worm and multiple variations over several weeks in April 2004 Knowledge Base articles # 835732 to prevent future infections # 841720 to clean infected systems Windows 2000 and Windows XP only Keep current with operating system patches Test patches first, then install Removing patches and operating system updates Control Panel Add/Remove Programs Applications and patches all listed here Select the desired item, click Remove Nine Critical Steps in Securing the Home Network Install, use and update anti-virus programs Treat all email attachments with caution Keep current with operating system updates Use host based Intrusion Detection Systems Use Host Based Intrusion Detection Systems Most intrusion detection systems (IDS) take either a network or a hostbased approach IDS looks for attack signatures, i.e., specific network traffic patterns that may indicate an attack Host based is appropriate for SOHO environments Use Host Based Intrusion Detection Systems Host based intrusion detection analyzes all incoming and outgoing network information for data patterns typical of an attack Host based intrusion detection uses the writing to log files or audit files Logs changes made to the system Use Host Based Intrusion Detection Systems The information the IDS collects is based on the monitoring of operating system, application software and security events. Built-in capabilities Event Viewer in Windows Must review log files regularly Nine Critical Steps in Securing SOHO Computers and Networks Use a firewall Host based or dedicated firewall Regularly backup your data Use an operating system with strong authentication and passwords Use file access controls and data encryption Make a boot disk to recover the system Use a Firewall Firewalls are used to filter network traffic Allow or block traffic based on criteria selected Well known ports Port 80 for HTTP Port 443 for HTTPS Ports 20/21 for FTP Port 25 for Mail Use a Firewall Firewalls can be implemented at the host network interface or on an intermediary system such as a router Firewalls implemented at the host are software based Firewalls implemented at a router are hardware based You can use either or both Use a Firewall Firewalls can be implemented at the host network interface or on an intermediary system such as a router SOHO router products from Linksys, D-Link and others All allow for configuring to meet your needs Nine Critical Steps in Securing SOHO Computers and Networks Use a firewall Host based or dedicated firewall Regularly backup your data Use an operating system with strong authentication and passwords Use file access controls and data encryption Make a boot disk to recover the system Regularly Backup Your Data Back up your files regularly Backing up means to copy data files from a local hard drive to another device Tape, external hard drive, CD/DVD, ZIP drive Application software can be restored from the original media Regularly Backup Your Data Most operating systems include a backup and restore utility Numerous third party products available Veritas, Computer Associates Hard drives have a finite life span and will eventually fail Regularly Backup Your Data If your system is compromised by malicious acts or physical failure data backup is your only solution Multiple copies of the backup media stored on-site and off-site Multiple media sets Regularly Backup Your Data Restoring or recovering the data is equally important Practice These data restores don’t have to be full-blown system restores but restoring sample data files Nine Critical Steps in Securing SOHO Computers and Networks Use a firewall Host based or dedicated firewall Regularly backup your data Use an operating system with strong authentication and passwords Use file access controls and data encryption Make a boot disk to recover the system Use an operating system with strong user authentication and passwords Choose operating systems such as Win XP, Win2000 Pro or Linux Rename the administrator or root account Require long and strong passwords Change passwords over time Use an operating system with strong user authentication and passwords Manage passwords by policy Local security policy or Group Policy Some tools Password cracking tools Microsoft Baseline Security Analysis tool http://www.microsoft.com/downloads/ details.aspx?FamilyID=9a88e63b92e3-4f97-80e78bc9ff836742&DisplayLang=en Nine Critical Steps in Securing SOHO Computers and Networks Use a firewall Host based or dedicated firewall Regularly backup your data Use an operating system with strong authentication and passwords Use file access controls and data encryption Make a boot disk to recover the system Use File Access Controls, Data Encryption Set permissions on data files of importance Permissions define “who” can do “what” with a folder or file Permissions are also called Access Control Lists (ACLs) Use File Access Controls, Data Encryption You can also encrypt files for an additional layer of file access protection Encryption is built-in to the NTFS file system Found only with NT, W2K and XP Can use third party tools Nine Critical Steps in Securing SOHO Computers and Networks Use a firewall Host based or dedicated firewall Regularly backup your data Use an operating system with strong authentication and passwords Use file access controls and data encryption Make a boot disk to recover the system Make a Boot Disk to Recover the System Create a system boot disk How to create one depends on the Operating System Useful in resolving start up problems due to corrupt or missing files Update the boot disk regularly Summary Install, use and update antivirus programs Treat email attachments with caution Keep current with operating system patches Use host based intrusion detection systems Use a host based or dedicated firewall Summary Regularly backup your data Use an operating system with strong user authentication and passwords Use file access controls and data encryption Make a boot disk for system recovery References The CERT® Coordination Center (CERT/CC) is a center of Internet security expertise at the Software Engineering Institute, a federally funded center operated by Carnegie Mellon University www.cert.org Conclusion Thanks for your attendance Commit yourself and your organization to secure your networks and computers Expect more from Sinclair Community College on these topics in the months to come
© Copyright 2024