Lec 4
Lec 4
Lec 4
Chapter 4
Host, Application, and Data
Security
a) Barriers
o Fencing - usually a tall, permanent structure.
o Modern perimeter fences are equipped with other
deterrents such as proper lighting and signage.
o Barricade - large concrete ones should be used.
b) Guards
o Human guards are considered active security
elements.
o Video surveillance uses cameras to transmit a signal
to a specific and limited set of receivers called closed circuit
television (CCTV).
c) Motion Detection
o Determining an object’s change in position in relation
to its surroundings.
o This movement usually generates an audible alarm.
CCTV
Securing devices
Magnetic Sensor
Seismic Sensor
Securing devices
1. Hardware locks
– Standard keyed entry lock provides minimal security.
– Deadbolt locks provide additional security and
require that a key be used to both open and lock the door.
– Cipher locks are combination locks that use buttons that must
be pushed in the proper sequence.
• Can be programmed to allow a certain individual’s
code to be valid on specific dates and times.
3. Access list
– A record of individuals who have permission to enter
secure area.
– Records time they entered and left.
4. Mantrap
– Separates a secured from a nonsecured area.
– Device monitors and controls two interlocking doors.
• Only one door may open at any time
3. Hardware Security
• Hardware security
– The physical security protecting host system
hardware.
– Most portable devices have steel bracket security slot
• A cable lock inserted into slot and secured to device
• A cable connected to lock secured to desk or immobile
object.
• Locking cabinets
– Can be prewired for power and network connections.
– Allow devices to charge while stored.
Antivirus
Anti-Spam
Host-Based Firewalls
• Firewall
– Designed to prevent malicious packets from entering
or leaving computers.
– Sometimes called a packet filter.
– May be hardware or software-based
• Host-based software firewall - runs as a program on
local system to protect it.
– Application-based.
• Application hardening
– Intended to prevent attackers from exploiting
vulnerabilities in software applications.