Site hosted by Angelfire.com: Build your free website today!

Class notes for ED 503


For finding acronyms use Acronyms.

Three levels of management.

  1. Low level does the work
  2. Middle level defines what is necessary to protect and how to protect it
  3. High level decides on policy and allocates funding
Due care - procedureal - put it in or the initial setup Due diligence - monitoring and updating
For the IT staff, level one is the hands-on people. They do desktop support and handle some small problems. Level two are still hands-on but function at a higher level. Level three are specialists. Teir one gathers information Teir two sees trends Port 25 is mail Port 80 is html and internet network topology see Webopedia Wireless - radio frequency or RF and InfraRed (light) IR line of sight required war driving, war chalking, net stumbler, jigle wireless
SSID service set identification
WEP wired equivalent privacy 802.11 encryption protocol
Three parts of security - Types of control - technical, operation, managerial
technical - firewall, IDS, cameras, content filtering, proxy, encryption
operational - user training, how to make sure things work properly - actually making the plan work
management - written policies, acceptable use, HR, warning banner
Three states of Data
  1. storage
  2. transmission
  3. processing
BC Wipe non-classified wipe of machine
Storage - offsite and encrypted
SMARTCARD electronic memory and possibly an integrated circuit
DMZ demilitaried zone - semi-trusted area put your web, mail, ftp - proxy server
PORTS http 80 smtp 25 https 443 pop 110 ftp 21 dns 53
DAPE denigh all permit by exception
2 X 65,535 ports TCP/UDP
VPN - virtual private network - encrypted tunnel across untrusted network
VPN goes through firewall
RAS - remote access service - comes in behind firewall
CIA - confidentiality, Integrity, availability
AAA
Authentication - are you who you say you are? Three types - have(SMARTCARD), know(password), are(fingerprint)
Authorization - can see various resources RSA SecureID
Accounting - when did you see this and what did you do (activity logs)
Security devices on a network
Firewall, Proxy, Router(ACL- Access Control List), content filtering, authentication
OSI model explained online OSI
OSI model quick explanationQuick OSI

TCP connection oriented UDP connectionless

NAT - network address translation - take non-routable addresses and translates to routable addresses.
10.0.0.1 to 215.222.322.040.
Signal Flooding - SYN ACK - TCP
Malicious code - virus, worms, trojan horse, javacode, ActiveX
Viruses - boot, macro, file, network
Worms
Trojan horse
Buffer overflow
Spoofing
Man in the Middle
Social Engineering
BruteForce Attack
Dictionary Attack
Instant messaging - sharing files
DDoS handler and zombies
Birthday attack - logical random numbers matching factors
RAS - remote access service
telnet, identification (no MAC No IP) authenticating
Wardialer
802.1 EAP extensive authentication protocol - biometric and smartcards
Extranet - across Internet to tie into the intranet - assigns IP address

Encryption

KERBERO - MIT centralized server that can then authenticate to encrypted and then you get an authorized key for a certain period - ticket is given
Secure shell - encryption (tunnel encapulation)
IPsecurity = is a whole suite with encryption and keys
Public key and Private key
Two kinds of keys
Symetrical - shared key, is fast, key management and how to transmit key
Assymetrical - two keys (private and public) slower
Digital certificates - Assymetrical with two keys
VLAN virtual local area network software divides up a LAN
Honeypot - something that is attractive - can be a trap

Email is like a postcard in pencil
Clear text or plain text protocol
telnet, SMTP, PoP,HTTP, SNMP, IMAP,br>
Instant messaging
Problem with file sharing
File sharing - Kazaa,eDonkey sites
Physical Security - locked room, no windows, good environment (groundskeeping staff, janitors)
Computer Incident Incident Response IR Handling
P - preparation (toolkit) and clothes
I - identification - id there has been an incident - id if the event is an incident
C - contain - take pictures of screen, cables and important items - only use still photos no video camera
E - eradication - run antivirus (load OS if necessary - whatever is required)
R - recovery - file shares, printer, programs - machine should return to whatever condition it was before
F - followup - go back and make sure the problem is still gone
Management Controls - Policies and they must be written

Component of Security Plan

Backups - types of sites Disposal and Destruction policy
Human Resource POlicy - Employee hiring, termination, code of ethics
Privlege Management - roles, rules, system access
User training
Configuration management - configuration control board

Risk Analysis and Assessment
What is there? What are we trying to protect? How important is the data to us?
Quantitative - financial considerations - how much will this cost us?
Qualitative - embarrassment - quality of life impact - much harder to do - opinion oriented


Teachers Hoaxes Viruses Security Policies
Security Information Hacking Glossary Certifications

Created by Kelly S. Wright, July 2003
Shenandoah University
Systems Security ED 503
Send comments to: Kelly Wright