Chapters 11 and 22 Security and Service Monitoring

Chapters 11 and 22 Security and Service Monitoring - IST...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
IST 346 Security Service Monitoring Chapters 11 & 22
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Goals of Security Keep data safe Keep data accurate Keep systems operational Keep systems accurate
Background image of page 2
What are you trying to protect The user’s identity – login account Network bandwidth – denial of service, bot-nets Storage / Disk space - warez Data – the most important asset of them all Reputation – one incident can ruin a reputation. Bad default, or weak passwords . Unused services with open ports. Un-patched software vulnerabilities. Transmitting data in clear text. Open networks (modems, wired, or wireles Physical access to systems. The users themselves. Financial motives Identity theft, Phishing, Spam ,Extortion, Botnets Political motives Personal motives Just for fun. Insider revenge.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Patterns in Security Policy Two basic policies Perimeter Protect your systems at the edge or at the internet boundary. Don’t allow questionable traffic through. Uses a firewall. Think of it as a castle with a large wall. Advantages: easy to understand and modify
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 16

Chapters 11 and 22 Security and Service Monitoring - IST...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online