Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
System Security

By
Mr. Amin Pathan

(M.Tech-CSE Pursuing, BE-IT)

Lecturer, MGM`s Polytechnic, Aurangabad.
Password Management

Password Security
The important protection against Intruders is the password system.
The password serves in used to authenticate the ID of the individual who logs on
to the system.
ID determines whether the user is authorized or unauthorized to gain access to a system.
ID determines the privileges according to the user.
ID is used as unrestricted access control.











Example

UNIX Operating System
User selects a password of up to eight printable characters in length.
This password is then converted into a 56 bit value that serves as the key input to an
encryption process based on DES.
DES Algorithm is modified using a 12 bit salt value.
This way, it prevents duplicate password.









Password Selection Strategies (Policies)

1. User Education



2. Computer Generated Password



3. Reactive password checking



4. Proactive password checking


1. User Education

Tell the importance of hard-to-guess password to the users & provide guidelines for
selecting strong password.
This strategy is unlikely to be successful at most installation, particularly where there is
a large user population.
Many users will simply ignore the guidelines, which may not be good judgement of what
is a strong password.






2. Computer Generated Password

Users will not be able to remember the computer generated password, even though the
password is pronounceable.
The passwords are reasonably random in nature.
So many times users write it down.






3. Reactive password Checking

The system periodically runs its own password cracker program to find out guessable
passwords.
If the system find any such a password then cancels it & notifies the user




4. Proactive password checking

User is allowed to select his/her own password.
At the time of selection, the system checks the password if the password is allowable
then allow otherwise reject it.




Components of Good password

As a password is meant to protect access and resources from intruders, it should not be
easy for some one else to guess.
Followings are the some guidelines to make a password more difficult to guess or obtain.
1. Password should be at least eight characters long
2. It should have at least three elements among following elements
(one or more uppercase, one or more lowercase, one or more numerals, one or
more special characters).
3. It should not consist of dictionary words.
4. It should not at all be the same as the users login name












Operating System Hardening

OS is the system software which handles input, output, display, memory management &
all highly tasks.
OS Example :Microsoft (95, 98, NT, 2000, ME, XP, Vista, 7, 8)
Apple Mac OS, Sun Solaris, UNIX
NOS includes additional functions and capabilities to help in connecting computers &
devices like printers to LAN
Example :- Windows Server 2003, Windows Server 2008.
OS Manufactures will not provide security but some recommendations or simplified
tools & settings to facilitate security of the system.














Operating System Hardening cont...

Removing unnecessary applications and utilities, disabling unnecessary services, setting
of appropriate permissions on files and updating the OS and application code to the
latest version.
This process of securing an OS is known as OS hardening and it is intended to make
the system more secure.




Step for securing Windows OS

1. Disable all unnecessary Service
2. Restrict permissions on files and access to the Registry
3. Remove unnecessary Programs.
4. Apply the latest patches and fix
5. Remove unnecessary user accounts and ensure password guidelines are in place










Weaknesses of Windows OS

MS Windows is not open source
Windows OS installation is insecure because it includes hidden shares, blank passwords
& it will not provide protection for known vulnerabilities.
It is difficult for administrator to understand how to properly use & configure the
software on various hardware setups.
It slows down after running 24 hours.
Many users don`t understand the security risk related to system while configuring it,
so this will cause for different attacks.
Less actual control over files.














UNIX OS Hardening

The process of securing UNIX OS to make the system more secure is called as
UNIX OS Hardening.
It means it disable unnecessary services, restrict permissions on files and directories,
apply password guidelines, remove unnecessary software, apply patches, and remove
unnecessary users.
UNIX system is very powerful and flexible.
This is all depending on the skill and knowledge of the system administrator because
so much control is placed in the administrators hand.
UNIX systems are easier to secure and baseline when they are providing a single
service or performing a single function, like acting as SMTP or web Server.












UNIX OS Hardening

Cont...

During installation process, it is easy to select which services and applications are
placed on the system.
On UNIX System by using the process status or by ps command, you can see which
processes, applications and services are running.
An administrator can identify the service by its unique process identifier or PID.
To stop a running service the process is identified by PID and then kill command id
used to stop the services.






Updates

To the standard user or system administrator is constant stream of updates designed to
correct problems, replace sections of code, or even add new features to an installed OS.
Vendors typically follows a hierarchy for software updates given below:1. Hotfix
2. Patch
3. Service Pack










Updates

Cont...

1. Hotfix
This term is given to small software update designed to address particular problem.
Hotfixes are typically developed in reaction to a discovered problem.
2. Patch
This term is given to large software updates designed to address particular problem.
Patches contain improvements or additional capabilities ans fixes for known bugs.
They are usually developed over a longer period of time.












Updates

Cont..

3. Service Pack
This term is given to a large collection of patches and hotfixes that are rolled into a single.
Service packs are designed to bring a system up to the latest known rather than
requiring the user or system administrator to download several of updates separately.






Thanks...!



More Related Content

What's hot

Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Program Threats
Program ThreatsProgram Threats
Program Threats
guestab0ee0
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
Meghaj Mallick
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
Deborah Obasogie
 
Ch11
Ch11Ch11
Goals of protection
Goals of protectionGoals of protection
Goals of protection
veena ali
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Secure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking ToolSecure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking Tool
iosrjce
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
 
File security system
File security systemFile security system
File security system
ÁŠHÍŸÂ ŹÂBÊÊÑ
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating System
Meghaj Mallick
 
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your Workstation
Brian Solomon, MBA
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
Sunipa Bera
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 
Presentation
PresentationPresentation
Presentation
HASSAN RAZA
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
Fahri Firdausillah
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
blusmurfydot1
 

What's hot (18)

Operating system security
Operating system securityOperating system security
Operating system security
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Ch11
Ch11Ch11
Ch11
 
Goals of protection
Goals of protectionGoals of protection
Goals of protection
 
system Security
system Security system Security
system Security
 
Secure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking ToolSecure System Password (SSP) Application for NT Editor Hacking Tool
Secure System Password (SSP) Application for NT Editor Hacking Tool
 
Operating system security
Operating system securityOperating system security
Operating system security
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
File security system
File security systemFile security system
File security system
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating System
 
Tips for Securing Your Workstation
Tips for Securing Your WorkstationTips for Securing Your Workstation
Tips for Securing Your Workstation
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Presentation
PresentationPresentation
Presentation
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 

Viewers also liked

Cspass
CspassCspass
Password Security
Password SecurityPassword Security
Password Security
Gisela Hippolt-Squair
 
Charles Dickens
Charles DickensCharles Dickens
Charles Dickens
DavidwuTAS
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
Rare Input
 
9 password security
9   password security9   password security
9 password security
drewz lin
 
Password Security
Password SecurityPassword Security
Password Security
Melissa Shaffer
 
Password Management
Password ManagementPassword Management
Password Management
Rick Chin
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security system
pragyajain53
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
securityxploded
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
BeyondTrust
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
Ajay Dhamija
 

Viewers also liked (11)

Cspass
CspassCspass
Cspass
 
Password Security
Password SecurityPassword Security
Password Security
 
Charles Dickens
Charles DickensCharles Dickens
Charles Dickens
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
9 password security
9   password security9   password security
9 password security
 
Password Security
Password SecurityPassword Security
Password Security
 
Password Management
Password ManagementPassword Management
Password Management
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security system
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 

Similar to System security by Amin Pathan

Ch10
Ch10Ch10
Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
Raja Waseem Akhtar
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
Raja Waseem Akhtar
 
Module 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applicationsModule 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applications
EwenBenana
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
Jennifer Lopez
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
Prudhvi668506
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
Timothy Chen
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara
 
2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)
Felipe Prado
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
ITExamAnswers.net
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
Information Technology
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
Information Technology
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
phanleson
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
SecurityTube.Net
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
qacaybagirovv
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
Cal Bryant
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
Steven Cahill
 
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingTop 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Paula Januszkiewicz
 

Similar to System security by Amin Pathan (20)

Ch10
Ch10Ch10
Ch10
 
Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Module 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applicationsModule 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applications
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingTop 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
 

More from aminpathan11

E wallet by amin
E wallet by aminE wallet by amin
E wallet by amin
aminpathan11
 
4 g technology by amin
4 g technology by amin4 g technology by amin
4 g technology by amin
aminpathan11
 
Cloud computing by amin
Cloud computing by aminCloud computing by amin
Cloud computing by amin
aminpathan11
 
Hololens
HololensHololens
Hololens
aminpathan11
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
aminpathan11
 
Access control by amin
Access control by aminAccess control by amin
Access control by amin
aminpathan11
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathan
aminpathan11
 
Human resource management by Amin
Human resource management by AminHuman resource management by Amin
Human resource management by Amin
aminpathan11
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
aminpathan11
 
ISDN
ISDNISDN
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
aminpathan11
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
aminpathan11
 
PSTN
PSTNPSTN
Management
ManagementManagement
Management
aminpathan11
 
Forms of ownerships in Management
Forms of ownerships in ManagementForms of ownerships in Management
Forms of ownerships in Management
aminpathan11
 

More from aminpathan11 (15)

E wallet by amin
E wallet by aminE wallet by amin
E wallet by amin
 
4 g technology by amin
4 g technology by amin4 g technology by amin
4 g technology by amin
 
Cloud computing by amin
Cloud computing by aminCloud computing by amin
Cloud computing by amin
 
Hololens
HololensHololens
Hololens
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Access control by amin
Access control by aminAccess control by amin
Access control by amin
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathan
 
Human resource management by Amin
Human resource management by AminHuman resource management by Amin
Human resource management by Amin
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
 
ISDN
ISDNISDN
ISDN
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
PSTN
PSTNPSTN
PSTN
 
Management
ManagementManagement
Management
 
Forms of ownerships in Management
Forms of ownerships in ManagementForms of ownerships in Management
Forms of ownerships in Management
 

Recently uploaded

Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Murugan Solaiyappan
 
Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?
Rakesh Jalan
 
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
PECB
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 
Traces of the Holocaust in our communities in Levice Sovakia and Constanta Ro...
Traces of the Holocaust in our communities in Levice Sovakia and Constanta Ro...Traces of the Holocaust in our communities in Levice Sovakia and Constanta Ro...
Traces of the Holocaust in our communities in Levice Sovakia and Constanta Ro...
Zuzana Mészárosová
 
Webinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional SkillsWebinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional Skills
EduSkills OECD
 
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptxBRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
kambal1234567890
 
Beyond the Advance Presentation for By the Book 9
Beyond the Advance Presentation for By the Book 9Beyond the Advance Presentation for By the Book 9
Beyond the Advance Presentation for By the Book 9
John Rodzvilla
 
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISINGSYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
Dr Vijay Vishwakarma
 
Final ebook Keeping the Memory @live.pdf
Final ebook Keeping the Memory @live.pdfFinal ebook Keeping the Memory @live.pdf
Final ebook Keeping the Memory @live.pdf
Zuzana Mészárosová
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
MJDuyan
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
Elizabeth Walsh
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
 
Righteous among Nations - eTwinning e-book (1).pdf
Righteous among Nations - eTwinning e-book (1).pdfRighteous among Nations - eTwinning e-book (1).pdf
Righteous among Nations - eTwinning e-book (1).pdf
Zuzana Mészárosová
 
The membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERPThe membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERP
Celine George
 
How to Install Theme in the Odoo 17 ERP
How to  Install Theme in the Odoo 17 ERPHow to  Install Theme in the Odoo 17 ERP
How to Install Theme in the Odoo 17 ERP
Celine George
 
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesArdra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Astro Pathshala
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
ibtesaam huma
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
heathfieldcps1
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Liyana Rozaini
 

Recently uploaded (20)

Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
 
Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?
 
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 
Traces of the Holocaust in our communities in Levice Sovakia and Constanta Ro...
Traces of the Holocaust in our communities in Levice Sovakia and Constanta Ro...Traces of the Holocaust in our communities in Levice Sovakia and Constanta Ro...
Traces of the Holocaust in our communities in Levice Sovakia and Constanta Ro...
 
Webinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional SkillsWebinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional Skills
 
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptxBRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
 
Beyond the Advance Presentation for By the Book 9
Beyond the Advance Presentation for By the Book 9Beyond the Advance Presentation for By the Book 9
Beyond the Advance Presentation for By the Book 9
 
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISINGSYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
 
Final ebook Keeping the Memory @live.pdf
Final ebook Keeping the Memory @live.pdfFinal ebook Keeping the Memory @live.pdf
Final ebook Keeping the Memory @live.pdf
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
 
Righteous among Nations - eTwinning e-book (1).pdf
Righteous among Nations - eTwinning e-book (1).pdfRighteous among Nations - eTwinning e-book (1).pdf
Righteous among Nations - eTwinning e-book (1).pdf
 
The membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERPThe membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERP
 
How to Install Theme in the Odoo 17 ERP
How to  Install Theme in the Odoo 17 ERPHow to  Install Theme in the Odoo 17 ERP
How to Install Theme in the Odoo 17 ERP
 
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesArdra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
 

System security by Amin Pathan

  • 1. System Security By Mr. Amin Pathan (M.Tech-CSE Pursuing, BE-IT) Lecturer, MGM`s Polytechnic, Aurangabad.
  • 2. Password Management Password Security The important protection against Intruders is the password system. The password serves in used to authenticate the ID of the individual who logs on to the system. ID determines whether the user is authorized or unauthorized to gain access to a system. ID determines the privileges according to the user. ID is used as unrestricted access control.      
  • 3. Example UNIX Operating System User selects a password of up to eight printable characters in length. This password is then converted into a 56 bit value that serves as the key input to an encryption process based on DES. DES Algorithm is modified using a 12 bit salt value. This way, it prevents duplicate password.     
  • 4. Password Selection Strategies (Policies) 1. User Education  2. Computer Generated Password  3. Reactive password checking  4. Proactive password checking 
  • 5. 1. User Education Tell the importance of hard-to-guess password to the users & provide guidelines for selecting strong password. This strategy is unlikely to be successful at most installation, particularly where there is a large user population. Many users will simply ignore the guidelines, which may not be good judgement of what is a strong password.   
  • 6. 2. Computer Generated Password Users will not be able to remember the computer generated password, even though the password is pronounceable. The passwords are reasonably random in nature. So many times users write it down.   
  • 7. 3. Reactive password Checking The system periodically runs its own password cracker program to find out guessable passwords. If the system find any such a password then cancels it & notifies the user  
  • 8. 4. Proactive password checking User is allowed to select his/her own password. At the time of selection, the system checks the password if the password is allowable then allow otherwise reject it.  
  • 9. Components of Good password As a password is meant to protect access and resources from intruders, it should not be easy for some one else to guess. Followings are the some guidelines to make a password more difficult to guess or obtain. 1. Password should be at least eight characters long 2. It should have at least three elements among following elements (one or more uppercase, one or more lowercase, one or more numerals, one or more special characters). 3. It should not consist of dictionary words. 4. It should not at all be the same as the users login name      
  • 10. Operating System Hardening OS is the system software which handles input, output, display, memory management & all highly tasks. OS Example :Microsoft (95, 98, NT, 2000, ME, XP, Vista, 7, 8) Apple Mac OS, Sun Solaris, UNIX NOS includes additional functions and capabilities to help in connecting computers & devices like printers to LAN Example :- Windows Server 2003, Windows Server 2008. OS Manufactures will not provide security but some recommendations or simplified tools & settings to facilitate security of the system.       
  • 11. Operating System Hardening cont... Removing unnecessary applications and utilities, disabling unnecessary services, setting of appropriate permissions on files and updating the OS and application code to the latest version. This process of securing an OS is known as OS hardening and it is intended to make the system more secure.  
  • 12. Step for securing Windows OS 1. Disable all unnecessary Service 2. Restrict permissions on files and access to the Registry 3. Remove unnecessary Programs. 4. Apply the latest patches and fix 5. Remove unnecessary user accounts and ensure password guidelines are in place     
  • 13. Weaknesses of Windows OS MS Windows is not open source Windows OS installation is insecure because it includes hidden shares, blank passwords & it will not provide protection for known vulnerabilities. It is difficult for administrator to understand how to properly use & configure the software on various hardware setups. It slows down after running 24 hours. Many users don`t understand the security risk related to system while configuring it, so this will cause for different attacks. Less actual control over files.       
  • 14. UNIX OS Hardening The process of securing UNIX OS to make the system more secure is called as UNIX OS Hardening. It means it disable unnecessary services, restrict permissions on files and directories, apply password guidelines, remove unnecessary software, apply patches, and remove unnecessary users. UNIX system is very powerful and flexible. This is all depending on the skill and knowledge of the system administrator because so much control is placed in the administrators hand. UNIX systems are easier to secure and baseline when they are providing a single service or performing a single function, like acting as SMTP or web Server.      
  • 15. UNIX OS Hardening Cont... During installation process, it is easy to select which services and applications are placed on the system. On UNIX System by using the process status or by ps command, you can see which processes, applications and services are running. An administrator can identify the service by its unique process identifier or PID. To stop a running service the process is identified by PID and then kill command id used to stop the services.   
  • 16. Updates To the standard user or system administrator is constant stream of updates designed to correct problems, replace sections of code, or even add new features to an installed OS. Vendors typically follows a hierarchy for software updates given below:1. Hotfix 2. Patch 3. Service Pack     
  • 17. Updates Cont... 1. Hotfix This term is given to small software update designed to address particular problem. Hotfixes are typically developed in reaction to a discovered problem. 2. Patch This term is given to large software updates designed to address particular problem. Patches contain improvements or additional capabilities ans fixes for known bugs. They are usually developed over a longer period of time.      
  • 18. Updates Cont.. 3. Service Pack This term is given to a large collection of patches and hotfixes that are rolled into a single. Service packs are designed to bring a system up to the latest known rather than requiring the user or system administrator to download several of updates separately.   