Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
Information which are stored in electronic form are always under risk. Business have an array of tools and technologies for securing systems and data ,ensuring system availability .and ensuring software quality. An understanding of risk and the application of risk assessment is essential for effectively and efficiently to create and secure a computing system. This is still a challenge due to 1.Change in technology 2.Relatively recent advent 3.Explosive growth of internet and prevalence of attitude that assessing risk and identifying return on investment.
2. Firewalls
a. Packet filtering b. Network address translation (NAT) C. Application proxy filtering
3. Intrusion detection system 4. Antivirus and antispyware software 5. Unified treat management systems
ACCESS CONTROLS
It consist of all policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders.
LIMITATIONS
1.Users use poor passwords which are easy to guess. 2.Password systems are too rigorous which hinder employee productivity 3.Passwords can be sniffed by social engineering
TOKEN
It is a physical device ,similar to an identification card , that is designed to prove the identity of a single user.
SMART CARD
It is a device about the size of a credit card that contains a chip formatted with access permission and other data .A reader device interprets the data on the smart card and allows or denies access.
BIOMETRIC AUTHENTICATION
It uses systems that read and interpret individual human traits, such as fingerprints , irises, and voices in order to grant or deny access. It is based on the measurement of a physical or behavioral trait that makes each individual unique. it compares the persons unique characterisitics and the stored profile. If both profiles matches then access is granted. Finger print and facial recognition technologies are just beginning to be used for security applications. PC laptops are starting to be equipped with fingerprint identification devices
FIREWALLS
This prevents unauthorized users from accessing private networks. This is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
It is generally placed between organizations private internal networks and distrusted external networks .It acts like a gatekeeper who examines each users credentials before access is granted to a network. It identifies names, IP addresses ,applications etc.
In large organizations ,the firewall often resides on a specially designated computer separate from the rest of the network , so no incoming request directly accesses private network resources. There are number of firewall screening technologies .they are frequently used in combination to provide firewall protection.
PACKET FILTERING
It examines selected fields in the headers of data packers flowing back and forth between the trusted network and the internet, examining individual packets in isolation .
This filtering technology can miss many types of attacks. Stateful inspections provide additional security by determining whether packets are part of an ongoing dialogue between a sender and a receiver.
Packets are accepted or rejected based on whether they are part of an approved conversation or whether they are attempting to establish a legitimate connection.
APPLICATION PROXY
It examines the application content of packets.
A proxy server stops data packets originating outside the organization , inspects them and passes a proxy to the other side of the firewall.
If a user outside the company wants to communicate with a user inside the organization, the outside user first talks to the proxy application and the proxy application communicates with the firms internal computer.
To create a good firewall ,an administrator must maintain detailed internal rules identifying the people ,applications, or addresses that are allowed or rejected. Firewalls can deter,but not completely prevent , network penetration by outsiders and should be viewed as one element in a n overall security plan.
Leading UTM vendors are crossbeam ,fortinent and secure computing and network vendors such as cisco systems and juniper networks provide UTM capablities in their equipment.