Securing Computers
- Threats
- The term “security” encompasses host- and network-based security, and physical security.
- Common threats include man-in-the-middle attacks, DoS, and DDoS attacks.
- Symptoms of such attacks (Flags!) include renamed system files, missing files, & more.
- DoS–Denial of Service; DDoS–Distributed Denial of Service.
- Zero Day–a new threat that no one has seen before.
- Dealing With Threats
- Host-based security includes patching, anti-malware, and a firewall.
- Network-based security includes IDS, IPS, & firewalls.
- UTM (Unified Threat Management) includes IDS/IPS, firewalls, and anti-malware; available in the cloud.
- IDS–Intrusion Detection Systmes
- IPS–Intrusion Prevention Systems; these systems are more active!
- Endpoint Management
- Physical Security
- Physical security includes perimeter security, room locks, and individual device security.
- Security guards and mantraps help perimeter security.
- Locks, badges, smart cards, and biometrics enable room-level security.
- Device security devices include server locks, USB locks & screen filters.
- Key fobs
- Hardware tokens
- Passwords & Authentication
- Modern password security relies on passwords and hashes.
- Methods for cracking passwords and hashes include brute force, dictionary attacks, and rainbow tables.
- Protect with best password practices, such as upper- and lower-case letters, numbers, and non-alphanumeric passwords; long passwords help too.
- Malware
- Worms propagate via networking.
- Trojan horses masquerade as benign programs, but carry a payload for later.
- Ransomware attacks/locks down systems in exchange for money.
- Malware infestations manifest as browser redirection, application crashes, update failures, & more.
- Anti-Malware Practices
- Prepare for malware attacks with good backups, end-user education, and firewalls.
- Use secure DNS options, such as a trusted third-party site & encryption.
- Memorize the CompTIA A+ seven-step malware-recovery process.
- 1). Identify and research malware symptoms.
- 2). Quarantine the infected systems.
- 3). Disable System Restore (in Windows).
- 4). Remediate the infected systems.
- 4a). Update the anti-malware software.
- 4b). Scan & use removal techniques (safe mode, pre-installation environment)
- 5). Schedule scans & run updates.
- 6). Enable System restore; also and create a restore point (in Windows).
- 7). Educate the end user.
- Social Engineering
- Social engineering enables bad people to use information from people inside to gain access to sensitive information.
- Social engineering attacks include telephone scams, tailgating, shoulder surfing, and dumpster diving.
- Phishing and spear phishing attacks seek personal or financial information with targeted scams.
- Phishing is directed towards anybody; spear-phishing is directed towards a specific person, usually large, corporate types.
- Social engineering is the use of deception to get people to give away info that they normally wouldn’t give away.
- Licensing
- EULA describes what users can do with licensed software.
- DRM controls what users can do with some content.
- Producers retain all rights to commercial software.
- Open-source software enables users to change or modify the software.
- “An Open Letter to Hobbyists” -Bill Gates, 1976
- Required licensing fee for the BASIC programming language.
- GNU GPL–GNU General Personal License
- Incident Response
- Techs need to understand & implement proper incident response.
- Know your responsibilities
- Identify the problem through reporting, preservation, and documentation.
- Exercise proper chain-of-custody procedures.
- Environmental Controls
- Check the MSDS (Materials Safety Data Sheet), for any spills or problems with equipment.
- Monitor temperature & humidity levels.
- Ensure proper ventilation.
- Employ surge suppressors & UPS backup devices.
- Clean systems with compressed air & specialized vacuums (anti-static vacuums).
Getting Organized
- Documents You Need To Know
- Document network assets through logical & physical diagrams.
- Access good online sources for information, such as the Microsoft Knowledge Base, AWS Documentation, Cisco.com for their documentation, etc.
- Organizations follow rules for regulatory compliance.
- Know these terms:
- Network topology diagrams (how you document computers, routers, switches, printers, etc.)
- Logical diagrams
- Physical diagrams (i.e. floor plans)
- A.U.P. (Accepted Use Policy)
- Password Policies
- Inventory Management–asset tags, barcodes, etc.
- Data You Need To Know
- Protect P.I.I. (Personally Identifiable Information) such as social security numbers, address, & so on.
- Strict laws govern what organizations can do with P.H.I. (Personal Health Info) such as medical records.
- The GDPR (General Data Protection Regulation) in the European Union specifies how & what data online organizations can get from visitors.
- The payment card industry follows the PCI DSS (Payment Card Industry Data Security Standard) to ensure security of financial interactions.
- Change Management
- Change Management enables organizations to update systems safely & methodically.
- CompTIA A+ techs understand the change management process.
- Change management follows clear steps, from the change board to enacting changes to documenting all changes.
- The Zen of Backup
- Disaster recovery starts & ends with restorable backups.
- File-level backups provide good protections for data.
- Image-level backups enable full system recovery quickly.
- Recycling & Data Destruction
- Take old computing parts, like toner cartridge & monitors, to recycling centers.
- Reset all smartphones & tablets before reselling or donating.
- Run drive-wiping software or physically destroy all mass media drives when disposing of them.