Mac" Security Bible

Total Page:16

File Type:pdf, Size:1020Kb

Mac Mac" Security Bible Joe Kissell WILEY Wiley Publishing, Inc. чСчйш&§аШ!а Part I: Mac Security Basics 1 Chapter 1: Mac Security Overview 3 Mac Security: Myth versus Fact 3 Is it true that Macs don't get viruses? 4 Can Macs spread viruses to Windows computers? 5 Is web browsing safe on a Mac? 5 Can someone eavesdrop on my network , if I use a Mac? 6 Are Mac servers more secure than Windows servers? 6 What's the biggest threat to Mac security? 7 Major Mac OS X Security Features 7 Open-source infrastructure 8 Access permissions 8 Keychain 8 Firewalls 8 Encrypted disk images 8 FileVault 9 VPN client 9 Firmware password protection 9 Download tagging 9 Application signing 9 Privacy versus Security 10 Weighing Convenience against Security 11 Understanding Your Risks 14 The Theory and Practice of Best Practices 15 Seven Things You Should Do Right Now 16 Update your software 16 Setup a standard user account 17 Change your keychain password 19 Turn off all unneeded sharing features 20 Turn on your firewall 22 Switch from WEP or nothing to WPA 23 Back up your Mac 25 Summary 26 xix Contents Chapter 2: Securing Your Mac against Theft 27 Security Cables and Locks 27 Laptop Lockers 29 Other Theft Deterrents 29 Laptop alarms (hardware) 29 Laptop alarms (software) 29 Login banners 30 Markinga Mac for Recovery 32 Tracking labels 32 Operation Identification 33 Tracking and Recovering Stolen Macs 33 Using tracking software and services 34 Using command-line software to track a Mac 38 Tracking a Mac with Back to My Mac 43 Summary 48 Chapter 3: Working with User Accounts 49 How Accounts Affect Security 49 The notion of accounts 49 What a Mac OS X account is 50 How accounts work 51 The principle of least privilege 51 Understanding POSIX Permissions 52 Read, write, and execute 52 User, group, and other 53 Viewing file permissions 53 Octal permissions 54 Modifying file permissions 55 Modifying file ownership 56 Using the Get Info window 56 Using the umask 58 The other permission bits 61 Types of Accounts 62 Administrator accounts 62 Standard accounts 64 Managed accounts with parental controls 64 Guest account 65 Sharing Only accounts 66 The root account 67 System accounts 68 Groups 68 Configuring an Account 69 Creating a new user 69 Setting user options 71 Creating groups 73 Adjusting Login Options 75 XX Contents Using Parental Controls 77 Using the Sudo Command 83 Howsudo works 84 Sudo syntax 84 Sudo limitations and risks 85 Modifying the sudoers file 86 Using Access Control Lists 87 ' What's an access control list? 87 Configuring access control lists 87 Access control list options 88 Summary 91 Chapter 4: Configuring Basic Security Settings 93 General Settings 93 Requiring a password to wake a computer 93 Disabling automatic login 95 Locking System Preferences 96 Setting automatic logout 98 Secure virtual memory 99 Location Services settings 100 Infrared receiver settings 100 FileVault 102 How File Vault works 102 Setting up FileVault 103 Firewall 105 MobileMe Settings 108 Account settings 109 Sync settings 110 iDisk settings Ill Back to My Mac settings 112 Energy Saver Settings 114 Setting computer, display, and disk sleep 115 Waking for network access 116 Spotlight Settings 118 AirPort Preferences 119 Assistive Device Access 121 Software Update 122 Terminal 125 Summary 125 Chapter 5: The Mac OS X Keychain 127 How Keychains Work 127 What Keychains Can Store 130 Passwords 130 Public keys, private keys, and certificates 130 Secure notes 131 xxi Contents Understanding Keychain Alerts 131 Request to use your keychain 132 Permission to use an existing item 132 Alert that an application has changed 133 Safari and the Keychain 134 Using Keychain Access 137 Customizing the view 137 Managing keychain items 139 Managing keychains 141 Using secure notes 144 Working with certificates 145 Repairing damaged keychains 149 Resetting a keychain 151 Summary 152 Chapter 6: Working with Passwords 153 Understanding Passwords 153 What makes a password secure? 154 Exploring password threats 155 Identification versus security 158 Multifactor authentication 159 Managing your passwords 160 The Varieties of Mac OS X Passwords 161 User account passwords 161 File Vault master password 162 The root password 163 Keychain passwords 163 Firmware passwords 163 Wi-Fi passwords 163 Disk image passwords 164 Apple ID password 165 Network passwords 165 Creating Good Passwords 165 Avoiding easily guessed passwords 166 Password length and complexity 166 Password mnemonics 167 Using patterns safely 168 Reusing passwords 169 Using Password Assistant 170 Using Third-Party Password Utilities 172 Password generators 172 Password managers 173 Resetting an Administrator's Password 176 Using the original administrator account 176 Using a Mac OS X Install DVD 176 Using a Firmware Password 177 xxii Contents Using Smart Cards, Tokens, and Biometrie Authentication Devices 180 Smart cards and tokens 180 One-time password tokens 181 Biometrie devices 181 Summary 181 Chapter 7: Securely Sharing System Resources 183 Using Shared System Resources Wisely 183 DVD or CD Sharing 184 Screen Sharing 186 File Sharing 188 Activating File Sharing 188 Choosing file-sharing protocols 190 Changing which items are shared 191 Granting access to users and groups 192 Printer Sharing 193 Scanner Sharing 195 Web Sharing 198 Activating Web Sharing 198 Publishing web pages 198 Making your web server visible to the outside world 199 Web-sharing negatives 201 Remote Login 201 Remote Management 203 Remote Apple Events 206 Xgrid Sharing 208 Internet Sharing 210 Bluetooth Sharing 213 Sharing files via Bluetooth 214 Setting up Bluetooth Sharing 215 Sharing an Internet connection via Bluetooth 218 Summary 219 Chapter 8: Backing Up Your Mac 221 Backup Basics 221 What to back up 222 Which media to use 223 How often to backup 223 Versioned backups 224 Bootable duplicates 224 Offsite backups 225 Choosing Backup Software 225 How many computers are you backing up? 226 What type(s) of backup do you need? 227 What media will you use? 227 How should data be restored? 227 What other special features do you need? 228 Bottom-line recommendations 229 Using Time Machine 229 How Time Machine works 230 Choosing hardware for Time Machine 231 Configuring Time Machine 232 Managing Time Machine behavior 234 Restoring data from Time Machine 235 Creating Bootable Duplicates 238 What's a bootable duplicate? 238 Using SuperDuper! 239 Using Carbon Copy Cloner 242 Other options 245 Starting up from a bootable duplicate 246 Using Internet Backup Services 247 Internet backup basics 247 Choosing a provider 248 Managing Backup Media 250 Offsite backups 250 Keeping media comfortable 251 Testing and recopying media 251 RAID and Data Redundancy 251 Mirrored RAIDs and backup 252 Do you need a RAID? 252 Choosing a RAID system 253 Configuring a RAID with Disk Utility 254 Summary 256 Part II: Protecting Your Privacy 257 Chapter 9: Securing Email, Chat, and Voice over IP 259 Understanding Email Security 259 Using secure authentication 261 Using SSL for sending and receiving email 262 Signingemail messages 262 Encrypting email messages 263 Encrypting data on your disk 263 Logging In Securely 263 Secure logins in Mail 264 Secure logins in Entourage 265 Secure logins in Thunderbird 266 Using SSL for Incoming and Outgoing Mail 266 How SSL works for email 267 Configuring SSL for incoming mail 267 Configuring SSL for outgoing mail 271 Contents Using SSL for webmail 274 Gmail 275 Hotmail 275 MobileMe 275 Yahoo! Mail 275 Digitally Signing and Encrypting Email 276 When and why to encrypt your email 277 Using S/MIME in Apple Mail 278 Using PGP or GPG for encrypted email 286 Stopping Spam 290 Understanding spammers 290 Learning basic spam-filtering concepts 292 Configuring your email client's spam filter 295 Using third-party spam filters 301 Other spam-filtering strategies 302 Examining Message Headers and Source 303 Message headers 304 Message source 307 iChat Security 308 Adjusting iChat privacy settings 308 Using encryption for iChat 310 Securing Instant Messaging and Voice over IP with Third-Party Software 311 Skype 312 Zfone 312 Adium 313 Psi 313 Summary 313 Chapter 10: Browsing the Web Securely 315 The Challenges of Secure Browsing 316 Privacy 316 Fraud 317 Malware 318 Inappropriate content 318 Annoyances 319 Using SSL Encryption 320 Checkinga certificate 322 Responding to certificate warnings 322 Keeping Form Information Safe 325 Using your browser's form-filling feature 326 Third-party web form password tools 331 Protecting Yourself from Harmful Downloads 334 Protecting Yourself from Phishing Schemes 338 Checking source URLs 338 Using Extended Validation certificates 339 XXV Contents Using a password manager to fill in data 340 Using third-party anti-phishing software 340 Covering Your Browsing Tracks 340 The browsing records your Mac stores 341 Prevention versus cleanup 342 Managing cookies 343 Using Safari's Private Browsing feature 351 Using Safari's data removal features 352 Handling private data with Firefox 354 Using third-party web privacy software 356 Cleaning up other browsing traces 360 Browsing Anonymously 363 What information you normally reveal 364 Hiding your IP address by using anonymous proxy servers 365 Hiding your IP address by using onion routing 369 Masking other browser details 370 Blocking Ads, Pop-up Windows, and Flash 371 Using browser settings 372 Using Hostal 374 Using other ad-blocking software 375 Blocking Other Undesirable Content 377 Summary 378 Chapter 11: Securely Accessing Other Computers 379 Transferring Files 379 FTP, SCP, SFTP,
Recommended publications
  • Flextivity Getting Started Guide
    Getting Started Guide Before you set up your account, you may want to spend a few minutes thinking about what you want to get out of Flextivity. Of course, Flextivity helps you successfully manage basic security such as Anti-Malware protection and a powerful Network Firewall across the computers in your organization. However, Flextivity goes beyond this. We have included a few tools to help you get the most out of your deployment. Acceptable Use Policies Most employees really want to do a good job and be productive. Nonetheless, personal Internet use has been found to be one of the number one time wasters at work. Experiments have shown that people who are able to successfully resist the temptation to surf at work make more mistakes than they would if there were no temptation[1]. It’s harder for them to learn new skills, too. The practical implication of this is that employers shouldn’t have rules against surfing and then leave access to the web wide open. Instead, it’s best to allow internet access only when it is appropriate. Intego Flextivity gives you the flexibility to manage your acceptable use policy the way that works for you. Do you want to limit use on your office wifi, but let employees surf as they please when they take laptops home? With Flextivity, you can do that. Do you want to put reasonable limits on social media surfing in the office – say, 30 minutes over the course of a day? You can do that too. Intego Flextivity helps you balance trust and team morale while putting common sense checks in place.
    [Show full text]
  • Os X Block Application from Internet Access
    Os X Block Application From Internet Access ionopause!Photographic Cupolated Rickard fibDru some grumbled guacharos sanctimoniously. and microfilm his determent so promisingly! Overviolent and malfunctioning Pasquale never balloted his Then, using Vallum, you can set bandwidth limits for each process, independently. IE by calling this without checking the console exists first. We have strong opinions about controlling where kids use their tech. Murus makes use of anchors to separate inbound and outbound filtering rules from options rules, redirection, translation and dummynet rules. Safari says that it cannot locate the website host; it does not say I am not connected to the Internet. Managed Services views, and assigning groups to such services. Do you see anything new you could remove so you can try again? Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. An inclusive firewall does the reverse. As a quick update it seems that is you are not using an account with admin privileges, you may need supply admin credentials for the first time you download an app to install it, which may solve some of the problem. OS X Server offers options for managing this, but you can also do the same in the client version of the OS. Talk with your children so they know what is acceptable, who they are allowed to text, sites they should stay away from, for example. Then everything else is blocked. Dropbox syncing newly changed files, and so on.
    [Show full text]
  • Personal Firewalls Are a Necessity for Solo Users
    Personal firewalls are a necessity for solo users COMPANY PRODUCT PLATFORM NOTES PRICE Aladdin Knowledge Systems Ltd. SeSafe Desktop Windows Combines antivirus with content filtering, blocking and $72 Arlington Heights, Ill. monitoring 847-808-0300 www.ealaddin.com Agnitum Inc. Outpost Firewall Pro Windows Blocks ads, sites, programs; limits access by specific times $40 Nicosia, Cyprus www.agnitum.com Computer Associates International Inc. eTrust EZ Firewall Windows Basic firewall available only by download $40/year Islandia, N.Y. 631-342-6000 my-etrust.com Deerfield Canada VisNetic Firewall Windows Stateful, packet-level firewall for workstations, mobile $101 (Canadian) St. Thomas, Ontario for Workstations users or telecommuters 519-633-3403 www.deerfieldcanada.ca Glucose Development Corp. Impasse Mac OS X Full-featured firewall with real-time logging display $10 Sunnyvale, Calif. www.glu.com Intego Corp. NetBarrier Personal Firewall Windows Full-featured firewall with cookie and ad blocking $50 Miami 512-637-0700 NetBarrier 10.1 Mac OS X Full-featured firewall $60 www.intego.com NetBarrier 2.1 Mac OS 8 and 9 Full-featured firewall $60 Internet Security Systems Inc. BlackIce Windows Consumer-oriented PC firewall $30 Atlanta 404-236-2600 RealSecure Desktop Windows Enterprise-grade firewall system for remote, mobile and wireless users Varies blackice.iss.net/ Kerio Technologies Inc. Kerio Personal Firewall Windows Bidirectional, stateful firewall with encrypted remote-management option $39 Santa Clara, Calif. 408-496-4500 www.kerio.com Lava Software Pty. Ltd. AdWare Plus Windows Antispyware blocks some advertiser monitoring but isn't $27 Falköping, Sweden intended to block surveillance utilities 46-0-515-530-14 www.lavasoft.de Network Associates Inc.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Malware List.Numbers
    CLASS A - Tested once a month (and as significant updates and samples are available) (95% or higher detection rate) CLASS B - Tested every two months (and if many new samples or significant updates are available) (95 - 85% detection rate) CLASS C - Tested every three months (85-75% detection rate) CLASS D - Tested every six months (75% or lower detection rates) For Comparison, not an actual Antivirus CLASS F - Excluded from future testing (read notes) Notes, comments, remarks, FAQ and everything else. McAfee Endpoint Protection for Malware Family (by year) # Malware Sample Type MD5 Hash Avast 9.0 Intego VirusBarrier X8 10.8 Norman 3.0.7664 ESET 6.0 Sophos 9 F-Secure 1.0 Kaspersky Security 14 G Data AntiVirus for Mac Dr Web 9.0.0 Avira ClamXav 2.6.4 (web version) Norton 12.6 (26) Comodo Webroot 8 Thirtyseven4 Total Security eScan 5.5-7 iAntivirus 1.1.4 (282) ProtectMac 1.3.2 - 1.4 BitDefender 2.30 - 3.0.6681 McAfee Internet Security for Mac* AVG AntiVirus for Mac Dr Web Light 6.0.6 (201207050) Max Secure Antivirus MacBooster X-Protect Gatekeeper Intego VirusBarrier 2013 10.7 Intego VirusBarrier X6 VirusBarrier Express 1.1.6 (79) Panda Antivirus 1.6 Bitdefender (App Store) 2.21 MacKeeper 2.5.1 - 2.8 (476) Panda Antivirus 10.7.6 Trend Micro Titanium 3.0 McAfee Security 1.2.0 (1549) Norton 11.1.1 (2) Trend Micro Smart Sur. 1.6.1101 McAfee VirusScan for Mac 8.6.1 FortiClient 5.0.6.131 Quick Heal Total Sec 1.0 MacScan 2.9.4 McAfee Virex 7.7 (163) Magician 1.4.3 Vipre 1.0.51 Mac Malware Remover 1.1.6 MD5 Hash Mac 1 Price -> Free $39.99 (Internet
    [Show full text]
  • Carbon Copy Cloner Documentation: English
    Carbon Copy Cloner Documentation: English Getting started with CCC System Requirements, Installing, Updating, and Uninstalling CCC CCC License, Registration, and Trial FAQs Trouble Applying Your Registration Information? Establishing an initial backup Preparing your backup disk for a backup of Mac OS X Restoring data from your backup What's new in CCC Features of CCC specific to Lion and greater Release History Carbon Copy Cloner's Transition to a Commercial Product: Frequently Asked Questions Credits Example backup scenarios I want to clone my entire hard drive to a new hard drive or a new machine I want to backup my important data to another Macintosh on my network I want to backup multiple machines or hard drives to the same hard drive I want my backup task to run automatically on a scheduled basis Backing up to/from network volumes and other non-HFS volumes I want to back up my whole Mac to a Time Capsule or other network volume I want to defragment my hard drive Backup and archiving settings Excluding files and folders from a backup task Protecting data that is already on your destination volume Managing previous versions of your files Automated maintenance of CCC archives Advanced Settings Some files and folders are automatically excluded from a backup task The Block-Level Copy Scheduling Backup Tasks Scheduling a task and basic settings Performing actions Before and After the backup task Deferring and skipping scheduled tasks Frequently asked questions about scheduled tasks Email and Growl notifications Backing Up to Disk Images
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]
  • Ethical Hacking and Countermeasures Version 6
    Ethical Hacking and Countermeasures Version 6 Modu le LX Firewall Technologies News Source: http://www.internetnews.com/ Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective This modu le will fam iliar ize you wihith: • Firewalls • Hardware Firewalls • Software Firewalls • Mac OS X Firewall • LINUX Firewall • Windows Firewall Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Firewalls Mac OS X Firewall Hardware Firewalls LINUX Firewall Software Firewalls Windows Firewall Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Firewalls: Introduction A firewall is a program or hardware device that protects the resources of a private netw ork from users of other networks It is responsible for the traffic to be allowed to pass, block, or refuse Firewall also works with the proxy server It helps in the protection of the private network from the users of the different network Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hardware Firewalls Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hardware Firewall Har dware Firewa lls are place d in the perime ter of the networ k It employs a technique of packet filtering It reads the header of a packet to find out the source and destination address The information is then compared with the set of predefined and/orand/ or user created rules that determine whether the packet is forwarded or dropped Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Netgear Firewall Features: • ItInterne t shar ing broa dbddband router and 4-port switch • 2x the speed and 4x times the coverage of a Wireless-G router • Configurable for private networks and public hotspots • Double Firewall protection from external hackers attacks • Touchless WiFi Security makes it easy to secure your network Copyright © by EC-Council EC-Council All Rights Reserved.
    [Show full text]
  • 4. Offensive and Defensive Network Security Cryptoworks21 • July 15, 2021
    Fundamentals of Network Security 4. Offensive and defensive network security CryptoWorks21 • July 15, 2021 Dr Douglas Stebila https://www.douglas.stebila.ca/teaching/cryptoworks21 Fundamentals of Network Security • Basics of Information Security – Security architecture and infrastructure; security goals (confidentiality, integrity, availability, and authenticity); threats/vulnerabilities/attacks; risk management • Cryptographic Building Blocks – Symmetric crypto: ciphers (stream, block), hash functions, message authentication codes, pseudorandom functions – Public key crypto: public key encryption, digital signatures, key agreement • Network Security Protocols & Standards – Overview of networking and PKI – Transport Layer Security (TLS) protocol – Overview: SSH, IPsec, Wireless (Tool: Wireshark) • Offensive and defensive network security – Offensive: Pen-tester/attack sequence: reconnaissance; gaining access; maintaining access (Tool: nmap) • Supplemental material: denial of service attacks – Defensive: Firewalls and intrusion detection • Access Control & Authentication; Web Application Security – Access control: discretionary/mandatory/role-based; phases – Authentication: something you know/have/are/somewhere you are – Web security: cookies, SQL injection – Supplemental material: Passwords 3 Assignment 2 2a) Offensive network 2b) Defensive network security security • Use nmap to scan • Set up firewall rules in services running on your Kali to prevent your computer certain types of – Will be scanning from outbound traffic (egress guest
    [Show full text]
  • Advanced Administration Guide – Endpoint Protection
    Advanced Administration Guide – Endpoint Protection Advanced administration guide 1 Advanced Administration Guide – Endpoint Protection Tabla de contenidos 1. INTRODUCTION ..............................................................................................................12 1.1. WHAT'S NEW IN THIS VERSION ...........................................................................................13 1.2. WHAT IS ENDPOINT PROTECTION? ......................................................................................14 THE PROTECTION .................................................................................................................. 14 WHICH PROTECTIONS ARE AVAILABLE? ..................................................................................... 14 INSTALLATION ....................................................................................................................... 14 1.3. PROTECTION TECHNOLOGIES ..............................................................................................15 ANTI-EXPLOIT TECHNOLOGY .................................................................................................... 15 SECURITY FROM THE CLOUD AND COLLECTIVE INTELLIGENCE ......................................................... 15 1.4. INFORMATION, QUERIES AND SERVICES .................................................................................16 USEFUL LINKS ....................................................................................................................... 16 ENDPOINT
    [Show full text]
  • J I Truste Ne Ork
    Internet Security A Jumpstart for Systems Administrators and IT Managers Tim Speed Juanita Ellis Digital Press An imprint of Elsevier Science Amsterdam, Boston • London • New York o Oxford • Paris • San Diego San Francisco • Singapore • Sydney • Tokyo Digital Press is an imprint of Elsevier Science. Copyright © 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Recognizing the importance of preserving what has been written, Elsevier Science prints its books on acid-free paper whenever possible. Library of Congress Cataloging-in-Publication Data ISBN 1-55558-298-2 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. The publisher offers special discounts on bulk orders of this book. For information, please contact: Manager of Special Sales Elsevier Science 200 Wheeler Road Burlington, MA 01803 Tel: 781-313-4700 Fax: 781-313-4882 For information on all Digital Press publications available, contact our World Wide Web home page at: http://www.digitalpress.com or http://www.bh.com/digitalpress 1098765432 1 Printed in the United States of America To Linda Speed~my split apart. -T.S. To my dad, Charles Ellis. -J.E. This Page Intentionally Left Blank Contents Foreword ix Acknowledgments xi Introduction xiii The Internet and Security I. I The
    [Show full text]
  • Free Antivirus Software No Creditcard Required
    Free Antivirus Software No Creditcard Required proclaimerRube remains depilates largest scorching? after Tomkin Unteachable becharm hieroglyphically Spiros flume his or falconers shatters anydismantled capa. Is mistily. Thurstan windswept or sunlit when scripts some And young to 1 million dollar coverage for lawyers and experts if needed for all plans. Avast Free Antivirus gives you more on many competing commercial products On top village excellent antivirus protection it adds a network security scanner a password manager browser protection and wheat It's an amazing collection of security features considering that this product is free. 3 best free antivirus software determine your PC Saga. And intrusion detection Secure traffic with Anti-virus malware protection Secure endpoints with patch management. With Frontier virus protection security software your devices are protected. Offers protection for a PC PC antivirus software installs easily understand it can be old to. Do I need Need Antivirus If I Browse Carefully and coherent Common. Try duty free F-Secure. The challenge software scans your you for malware destroying any infections it to find. Best Antivirus Software for 2021 eSecurityPlanet. Internet security free download. Cloud hosted anti-spam and antivirus protection for domain owners stop email born. There are some good free antivirus packages that are available against no leash to download and use. Cameras literally require the iPad to melt within 6'I'm willing to showcase a year on. Their editors gave three Avast Free Antivirus AVG Anti-Virus Free Edition and ThreatFire AntiVirus Free Edition five axis of. 7 best antivirus for Windows 7 to desktop after support ends.
    [Show full text]