Small Office, Home Office (SOHO) Security

Download Report

Transcript Small Office, Home Office (SOHO) Security

Small Office/Home Office (SOHO)
Computer and Network Security
Sinclair
Community
College
CIS Department
Small Office/Home Office (SOHO)
Computer and Network Security
Bob Sherman
 Patty Gillilan
 Associate Professors, CIS Department
 Multiple Microsoft and Cisco
certifications

Why SOHO Computer and
Networking Security is Important
Personal information
 Private files
 Financial information
 Having your systems “high jacked”
 Invasion of privacy, e.g., Spyware
 Identity theft

Why SOHO Computer and
Networking Security is Important





Identity theft is a very large and growing
concern
Gartner Research Group estimates seven
million victims of ID theft in the US in the
past twelve months
http://www.consumer.gov/idtheft/
http://www.usdoj.gov/criminal/fraud/idtheft.
html
http://www.idtheftcenter.org/index.shtml
Why SOHO Computer and
Networking Security is Important
Spyware: a new and growing threat
 Spyware can…

 Manipulate
your system
 Record your habits
 Facilitate theft of your passwords, credit
card info and identity

Adware, key loggers and Trojan
horses
Why SOHO Computer and
Networking Security is Important

Signs of spyware on your PC
 Home
page changes
 New favorites appear
 System is noticeably slower
 New toolbars appear in IE
Why SOHO Computer and
Networking Security is Important

Spyware
 File
sharing services, e.g., Kazaa or
Grokster
 Clicking on pop-up ads
 Opening infected emails
Spy Sweeper
 http://www.webroot.com

Objectives

Familiarize the computer users with the
following:

What it means to be “online”

The door to the Internet swings both ways
What are common risks and vulnerabilities?
 How to protect against threats
 Maintaining vigilance by staying current

Nine Critical Steps in Securing
SOHO Computers and Networks
Install, use and update anti-virus
programs
 Treat all email attachments with
caution
 Keep current with operating system
updates
 Use host based Intrusion Detection
Systems

Nine Critical Steps in Securing
SOHO Computers and Networks

Use a firewall
 Host
based or dedicated firewall
Regularly backup your data
 Use an operating system with strong
authentication and passwords
 Use file access controls and data
encryption
 Make a recovery/boot disk

Nine Critical Steps in Securing
SOHO Computers and Networks
 Install,
use and update anti-virus
programs



Treat all email attachments with caution
Keep current with operating system updates
Use host based Intrusion Detection Systems
Install, use and update anti-virus
programs

The single most important thing you
can do to protect your system
 Most
common exposure
 Email
attachments
 Connections to web servers
 Make
sure the program you select
also protects against Worms and
Trojans
Install, use and update anti-virus
programs

Some popular antivirus products
 Symantec
 McAfee
 Computer



Associates
http://www.symantec.com/sabu/nis/nis_pe/
http://us.mcafee.com/default.asp
http://www.my-etrust.com
Install, use and update anti-virus
programs

Norton antivirus output and options
 System
status
 Reports
 Scheduled
system scan
Nine Critical Steps in Securing
SOHO Computers and Networks

Install, use and update anti-virus programs

Treat all email attachments with
caution

Keep current with operating system updates
Use host based Intrusion Detection Systems

Treat All Email Attachments with
Caution
Email Viruses are becoming more
prevalent all of the time
 If you haven't gotten an email virus,
chances are you will, if you don’t take
the appropriate steps
 Preventing email viruses begins with
common sense and ends with a virus
detection program

Treat All Email Attachments with
Caution

The Common sense approach:
 Make
sure you are familiar with the
sender of the email
 Note the names of the file attachments
 Do
they make sense to you?
 Some names are designed to entice you to
open the attachment
–
AnnaKournikova.jpg.vbs (Worm)
Treat All Email Attachments with
Caution

The common sense approach:
 If
the attachment has one of the following
file extensions, be very suspect
 .scr,
 Delete
.pif, .vb, .vbe, .vbs, exe
suspect attachments immediately
and empty the “Recycle Bin”
Nine Critical Steps in Securing
SOHO Computers and Networks


Install, use and update anti-virus programs
Treat all email attachments with caution
 Keep
current with operating
system updates

Use host based Intrusion Detection Systems
Keep current with operating
system patches
“A fix or modification to a program
bug in the Operating System. A patch
is an actual piece of object code that
is inserted into (patched into) an
executable program.” -- webopedia.com
 Many operating system patches are
related to system security.
 Staying current can be automated on
recent versions of Windows

Keep current with operating
system patches
Windows operating systems are
frequently “patched or updated”
 Windows Update
 Service Packs (SPs) are a collection of
patches and updates

Keep current with operating system
patches

Before updating a system make sure
of the following
 The
update is required for your system
 The update won’t harm your system or
any applications running on it
 You can uninstall the update

Get used to performing these updates
 Many
security compromises are a result
of unpatched systems
Keep current with operating
system patches
Using the Windows Update feature
 Click the Start menu

 Then

choose Windows Update
http://v4.windowsupdate.microsoft.co
m/en/default.asp
Windows Update options in Windows 2000 Pro:
Keep current with operating
system patches
First click Scan for Updates
 Then click Review and Install Updates
 Three categories of updates

 Critical
updates and service packs
 Updates for your version of Windows
 Driver updates
Keep current with operating
system patches
Click on Critical Updates and Service
Packs
 Remove those updates not applicable
to your system
 Click Install Now
 Some updates will require restarting
your computer

Keep current with operating
system patches
Configuring Automatic Updates
 Control Panel or System Properties
 Update options

Only notify of updates
 Download and notify of updates
 Download and install on a specified schedule

Keep current with operating
system patches
Software Update Service
 Available on more recent versions of
Windows
 Creates a single point internally as the
source of updates
 Conserves bandwidth

Keep current with operating
system patches
Microsoft Technet Service
 Source for a variety of security and
related details
 http://www.microsoft.com/technet/defa
ult.asp
 Knowledge Base articles

Keep current with operating
system patches
Blaster Worm
 Knowledge Base article #823980
 Exploits a buffer overflow flaw in
Windows
 Patch released by Microsoft on July
16, 2003
 Updated August 25, 2003

Keep current with operating
system patches
State of Maryland BMV shut down on
August 13, 2003
 Many other large networks affected
 http://www.microsoft.com/technet/tree
view/?url=/technet/security/bulletin/M
S03-026.asp

Keep current with operating system
patches
Sasser Worm and multiple variations
over several weeks in April 2004
 Knowledge Base articles

#
835732 to prevent future infections
 # 841720 to clean infected systems

Windows 2000 and Windows XP only
Keep current with operating
system patches
Test patches first, then install
 Removing patches and operating
system updates

 Control
Panel
 Add/Remove Programs
 Applications and patches all listed here
 Select the desired item, click Remove
Nine Critical Steps in Securing the
Home Network




Install, use and update anti-virus programs
Treat all email attachments with caution
Keep current with operating system updates
Use host based Intrusion Detection
Systems
Use Host Based Intrusion Detection
Systems
Most intrusion detection systems
(IDS) take either a network or a hostbased approach
 IDS looks for attack signatures, i.e.,
specific network traffic patterns that
may indicate an attack
 Host based is appropriate for SOHO
environments

Use Host Based Intrusion Detection
Systems
Host based intrusion detection
analyzes all incoming and outgoing
network information for data patterns
typical of an attack
 Host based intrusion detection uses
the writing to log files or audit files
 Logs changes made to the system

Use Host Based Intrusion Detection
Systems
The information the IDS collects is
based on the monitoring of operating
system, application software and
security events.
 Built-in capabilities

 Event

Viewer in Windows
Must review log files regularly
Nine Critical Steps in Securing
SOHO Computers and Networks

Use a firewall
 Host




based or dedicated firewall
Regularly backup your data
Use an operating system with strong authentication
and passwords
Use file access controls and data encryption
Make a boot disk to recover the system
Use a Firewall
Firewalls are used to filter network
traffic
 Allow or block traffic based on criteria
selected
 Well known ports

 Port
80 for HTTP
 Port 443 for HTTPS
 Ports 20/21 for FTP
 Port 25 for Mail
Use a Firewall
Firewalls can be implemented at the
host network interface or on an
intermediary system such as a router
 Firewalls implemented at the host are
software based
 Firewalls implemented at a router are
hardware based

 You
can use either or both
Use a Firewall
Firewalls can be implemented at the
host network interface or on an
intermediary system such as a router
 SOHO router products from Linksys,
D-Link and others
 All allow for configuring to meet your
needs

Nine Critical Steps in Securing
SOHO Computers and Networks

Use a firewall
 Host based or dedicated firewall
 Regularly



backup your data
Use an operating system with strong authentication
and passwords
Use file access controls and data encryption
Make a boot disk to recover the system
Regularly Backup Your Data
Back up your files regularly
 Backing up means to copy data files
from a local hard drive to another
device

 Tape,
external hard drive, CD/DVD, ZIP
drive

Application software can be restored
from the original media
Regularly Backup Your Data
Most operating systems include a
backup and restore utility
 Numerous third party products
available

 Veritas,

Computer Associates
Hard drives have a finite life span and
will eventually fail
Regularly Backup Your Data
If your system is compromised by
malicious acts or physical failure data
backup is your only solution
 Multiple copies of the backup media
stored on-site and off-site
 Multiple media sets

Regularly Backup Your Data

Restoring or recovering the data is
equally important
 Practice
 These
data restores
don’t have to be full-blown system
restores but restoring sample data files
Nine Critical Steps in Securing
SOHO Computers and Networks


Use a firewall
 Host based or dedicated firewall
Regularly backup your data

Use an operating system with strong
authentication and passwords

Use file access controls and data encryption
Make a boot disk to recover the system

Use an operating system with strong
user authentication and passwords
Choose operating systems such as
Win XP, Win2000 Pro or Linux
 Rename the administrator or root
account
 Require long and strong passwords
 Change passwords over time

Use an operating system with strong
user authentication and passwords
Manage passwords by policy
 Local security policy or Group Policy
 Some tools

 Password
cracking tools
 Microsoft Baseline Security Analysis tool

http://www.microsoft.com/downloads/
details.aspx?FamilyID=9a88e63b92e3-4f97-80e78bc9ff836742&DisplayLang=en
Nine Critical Steps in Securing
SOHO Computers and Networks



Use a firewall
 Host based or dedicated firewall
Regularly backup your data
Use an operating system with strong authentication
and passwords

Use file access controls and data
encryption

Make a boot disk to recover the system
Use File Access Controls, Data
Encryption
Set permissions on data files of
importance
 Permissions define “who” can do
“what” with a folder or file
 Permissions are also called Access
Control Lists (ACLs)

Use File Access Controls, Data
Encryption

You can also encrypt files for an
additional layer of file access
protection
 Encryption
is built-in to the NTFS file
system
 Found
only with NT, W2K and XP
 Can use third party tools
Nine Critical Steps in Securing
SOHO Computers and Networks





Use a firewall
 Host based or dedicated firewall
Regularly backup your data
Use an operating system with strong authentication
and passwords
Use file access controls and data encryption
Make a boot disk to recover the
system
Make a Boot Disk to Recover the
System
Create a system boot disk
 How to create one depends on the
Operating System
 Useful in resolving start up problems
due to corrupt or missing files
 Update the boot disk regularly

Summary
Install, use and update antivirus
programs
 Treat email attachments with caution
 Keep current with operating system
patches
 Use host based intrusion detection
systems
 Use a host based or dedicated firewall

Summary
Regularly backup your data
 Use an operating system with strong
user authentication and passwords
 Use file access controls and data
encryption
 Make a boot disk for system recovery

References
The CERT® Coordination Center
(CERT/CC) is a center of Internet
security expertise at the Software
Engineering Institute, a federally
funded center operated by Carnegie
Mellon University
 www.cert.org

Conclusion
Thanks for your attendance
 Commit yourself and your
organization to secure your networks
and computers
 Expect more from Sinclair Community
College on these topics in the months
to come
