Guideline on Wireless Security
|
|
|
- Marybeth Mason
- 10 years ago
- Views:
Transcription
1 CMSGu Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE Enhancing Cyber Security in Mauritius Guideline on Wireless Security National Computer Board Mauritius Version 1.1 June March Issue No. 43
2 Table of Contents 1.0 Introduction Purpose and Scope Audience Document Structure Background Wireless Devices and Network Threats General Wireless Security Threats Theft Denial of Service (DoS) Malicious Hackers Malicious Code Theft of Service Industrial and Foreign Espionage Home Wireless Threats Piggybacking Wardriving Unauthorised Computer Access Public Wireless Threats Evil Twin Attacks Wireless Sniffing Peer-to-Peer Connections Unauthorised Computer Access Shoulder Surfing Securing Wireless Networks Securing Your Organisation s Wireless Network Management Countermeasures Operational Countermeasures Technical Countermeasures Securing Your Home Wireless Network Make Your Wireless Network Invisible Rename Your Wireless Network Guideline on Wireless Security P a g e 2
3 4.2.3 Encrypt Your Network Traffic Change Your Administrator Password Use File Sharing with Caution Keep Your Access Point Software Patched and Up to Date Check Your Internet Provider s Wireless Security Options Using Wireless Networking Safely in Public Spaces Watch What You Do Online Disable File Sharing Be Aware of Your Surroundings Conclusion References Appendix A List of Acronyms Appendix B A. MyT Livebox Installation Ethernet Cable Installation Wifi Installation B. ADSL Installation Guideline on Wireless Security P a g e 3
4 Tables DISCLAIMER: This guideline is provided as is for informational purposes only. Information in this guideline, including references, is subject to change without notice. The products mentioned herein are the trademarks of their respective owners. Guideline on Wireless Security P a g e 4
5 1.0 Introduction 1.1 Purpose and Scope This guide, while generic in nature, is focused towards helping organisations secure their wireless networks while they are open to attacks and users stay safe while using wireless networks to surf at home and in public places. 1.2 Audience The target audience for this guide is organisations that make use of use wireless connections, wireless home users, including parents and teachers, and the public in general. 1.3 Document Structure This document is organised into the following sections: Section 1 includes the document s content, the targeted audience and the document s structure. Section 2 gives a background on wireless networking. Section 3 presents wireless devices and network threats. Section 4 discusses ways to secure wireless networks. Section 5 concludes the document. Section 6 comprises a list of references that have been used in this document. Appendix A defines a set of acronyms used in this document. Guideline on Wireless Security P a g e 5
6 2.0 Background Wireless networking enables computing devices with wireless capabilities to use computing resources without being physically connected to a network. The devices simply need to be within a certain range of the wireless network infrastructure. Wireless communications are mainly known for the benefits that they bring to users, namely portability, flexibility, increased productivity and lower installation costs. Wireless technologies cover a broad range of distinct capabilities adapting to different uses and needs. Wireless Local Area Network (WLAN) Wireless Local Area Networks (WLAN) for example; allow mobility of laptops within users office without the need for cables and wires without losing network connectivity. Ad Hoc Network Ad hoc networks, such as those enabled by Bluetooth, on the other hand, allow data synchronization with network systems and application sharing between devices. Bluetooth functionality eliminates cables for printer and other peripheral device connections. Handheld Devices Handheld devices such as personal digital assistants (PDA) and cell phones allow remote users to synchronize personal databases and provide access to network services such as wireless , Web browsing, and Internet access. The above technologies can offer enormous cost savings and new capabilities to diverse applications ranging from retail settings to manufacturing shop floors to first responders. However, risks are inherent in any wireless technology. Some of these risks are similar to those of wired networks; some are worsen by wireless connectivity; some are new. Perhaps the most significant source of risks in wireless networks is that the technology s underlying communications medium, the airwave, is open to intruders, making it the logical equivalent of an Ethernet port in the parking lot. Guideline on Wireless Security P a g e 6
7 3.0 Wireless Devices and Network Threats 3.1 General Wireless Security Threats The major concerns for wireless communications are device theft, denial of service, malicious hackers, malicious code, theft of service, and industrial and foreign espionage Theft Theft is likely to occur with wireless devices because of their portability. Authorised and unauthorised users of the system may commit fraud and theft; however, authorised users are more likely to carry out such acts. Since users of a system may know what resources a system has and the system s security flaws, it is easier for them to commit fraud and theft Denial of Service (DoS) A DoS attack can occur unexpectedly, such as other electronic devices causing interference, or it can occur deliberately, such as an attacker sending large numbers of messages at a high rate to flood the wireless network Malicious Hackers Malicious hackers, sometimes called crackers, are individuals who break into a system without authorization, usually for personal gain or to do harm. Malicious hackers are generally individuals from outside of an organisation; however users within an organisation can also be a threat. Such hackers may gain access to the wireless network access point by eavesdropping on wireless device communications Malicious Code Malicious code involves viruses, worms, Trojan horses, logic bombs, or other unwanted software that is designed to damage files or shut down a system Theft of Service Theft of service occurs when an unauthorised user gains access to the network and consumes network resources Industrial and Foreign Espionage Industrial and foreign espionage involves gathering proprietary data from corporations or intelligence information from governments through eavesdropping. In wireless networks, the Guideline on Wireless Security P a g e 7
8 espionage threat stems from the relative ease with which eavesdropping can occur on radio transmissions. Attacks resulting from the abovementioned threats, if successful, place an organisation s systems and, more importantly, its data at risk. Ensuring confidentiality, integrity, authenticity, and availability are the prime objectives of all organisation security policies and practices. Risks in wireless networks practically equals to the risk of operating a wired network, in addition to the new risks introduced by weaknesses in wireless protocols. To mitigate these risks, organisations need to adopt security measures and practices that help bring their risks to a manageable level. For instance, they need to perform security assessments prior to implementation to determine the specific threats and vulnerabilities that wireless networks will introduce in their environments. In performing the assessment, they should consider existing security policies, known threats and vulnerabilities, legislation and regulations, safety, reliability, system performance, the life-cycle costs of security measures, and technical requirements. Once the risk assessment is complete, the organisation can begin planning and implementing the measures that it will put in place to safeguard its systems and lower its security risks to a manageable level. The organisation should periodically reassess the existing policies and measures because computer technologies and malicious threats are continually changing. 3.2 Home Wireless Threats By now, people should be aware of the need to secure traditional, wired internet connections. If you are planning to move to a wireless connection in your home, for instance, you should consider whether it will bring you more risks than benefits. Having wireless connection at home involves a device to your DSL or cable modem that broadcasts your internet connection through the air over a radio signal to your computers. If traditional wired connections are prey to security problems, you should think of the security problems that arise when you open your internet connection to the airwaves. The following sections describe some of the threats to home wireless networks. Guideline on Wireless Security P a g e 8
9 3.2.1 Piggybacking If your wireless network is not secured, anyone with a wireless-enabled computer within range of your wireless access point can access the internet over your wireless connection. The typical indoor broadcast range of an access point is feet. Outdoors, this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment, failure to secure your wireless network could potentially open your Internet connection to a surprising number of users. In so doing, you invite a number of problems: Service violations: You may exceed the number of connections permitted by your Internet service provider. Bandwidth shortages: Users piggybacking on your Internet connection might use up your bandwidth and slow your connection. Abuse by malicious users: Users piggybacking on your Internet connection might engage in illegal activity that will be traced to you. Monitoring of your activity: Malicious users may be able to monitor your Internet activity and steal passwords and other sensitive information. Direct attack on your computer: Malicious users may be able to access files on your computer, install spyware and other malicious programs, or take control of your computer Wardriving Wardriving is a specific kind of piggybacking. The broadcast range of a wireless access point can make internet connections possible outside your home, even as far away as your street. Savvy computer users know this, and some have made a hobby out of driving through neighbourhoods with a wireless-equipped computer, sometimes with a powerful antenna searching for unsecured wireless networks. This practice is known as wardriving. Wardrivers often note the location of unsecured wireless networks and publish this information on web sites. Malicious individuals wardrive to find a connection they can use to perpetrate illegal online activity using your connection to mask their identities. They may also directly attack your computer, as noted in the Piggybacking section above Unauthorised Computer Access An unsecured wireless network combined with unsecured file sharing can give rise to a disaster. Under these conditions, a malicious user could access any directories and files you have allowed for sharing. Guideline on Wireless Security P a g e 9
10 3.3 Public Wireless Threats A wireless-enabled laptop can make you more productive outside your office or home, but it can also expose you to numerous security threats. The following sections describe some of the security threats you face when using a public access point Evil Twin Attacks In an evil twin attack, the attacker gathers information about a public access point and then sets up his or her own system to impersonate the real access point. The attacker will use a broadcast signal stronger than the one generated by the real access point. Unsuspecting users will connect using the stronger, fake signal. As the victim is connecting to the Internet through the attacker s system, it is easy for the attacker to use specialised tools to read any data the victim sends over the internet. This data may include credit card numbers, username and password combinations, addresses, and other personal information Wireless Sniffing Many public access points are not secured, and the traffic they carry is not encrypted. This can put your sensitive communications or transactions at risk. Because your connection is being transmitted in cleartext, malicious users can use sniffing tools to obtain sensitive information such as passwords, bank account numbers, and credit card numbers Peer-to-Peer Connections Many laptop computers, particularly those equipped with type Wi-Fi wireless networking cards, can create ad hoc networks if they are within range of one another. These networks enable computer-to-computer connections, a situation that creates security concerns. An attacker with a network card configured for ad hoc mode and using the same settings as your computer may gain unauthorised access to your sensitive files. You should note that many PCs ship from the manufacturer with wireless cards set to ad-hoc mode by default Unauthorised Computer Access As is the case with unsecured home wireless networks, an unsecured public wireless network combined with unsecured file sharing can lead to disasters. Under these conditions, a malicious user could access any directories and files you have allowed for sharing. Guideline on Wireless Security P a g e 10
11 3.3.5 Shoulder Surfing In public wireless areas, the bad guys do not even need a computer to steal your sensitive information. The fact that you may be conducting personal business in a public space is opportunity enough for them. If close enough, they can simply glance over your shoulder as you type. Or, they could be peering through binoculars from an apartment window across the street. By simply watching you, they can steal all kinds of sensitive, personal information. Guideline on Wireless Security P a g e 11
12 4.0 Securing Wireless Networks 4.1 Securing Your Organisation s Wireless Network Management Countermeasures Risk Assessment Information security officers and network administrators should conduct a risk assessment before handheld devices are introduced into the organisation s computing environment. Education and Awareness The organisation should educate the users about the proper use of their handheld devices and the security risks introduced by their use by providing short training courses or educational materials to help users use these devices more productively and more securely. Security Policies Network administrators should establish and document security policies that address their use and the users responsibilities. The policy document should include: o The approved uses o The type of information that the devices may store o Software programs they can install o How to store the devices and associated modules when not in use o Proper password selection and use o How to report a lost or stolen PDA o Any disciplinary actions that may result from misuse Audit Organisations should also perform random audits to track whether devices have been lost or stolen Operational Countermeasures Due Diligence Operational countermeasures require handheld device users to exercise due diligence in protecting the handheld devices and the networks they access from unnecessary risks. Most operational countermeasures are common sense procedures that require Guideline on Wireless Security P a g e 12
13 voluntary compliance by the users. Operational countermeasures are intended to minimise the risk associated with the use of handheld devices by genuine users. Although a determined malicious user can find ways to intentionally disclose information to unauthorised sources, the handheld security policy and the organisation s operational countermeasures should make clear the user s responsibilities. Proper Labeling The back of the PDA device should always be labeled with the owning organisation s name, address, and phone number in case it is lost. Handheld device users should be provided with a secure area to store the device when not in use. A desk with drawers that lock or a file cabinet with locks are available in most offices and should provide sufficient physical security against theft from within the office environment. Cables and Locks Galvanized steel cables and locks should be used to secure handheld devices to the user s desktop if other physical controls are not available. Although these measures cannot ensure that a determined thief will not cut these cables or locks, it does prevent an opportunistic thief from walking away with an unattended handheld device. While employees are on travel, fireproof safes should be used to store handheld devices. Inventory Checks Security administrators should have a list of authorised handheld device users, to enable them to perform periodic inventory checks and security audits. Individuals that use their handheld devices for other than business uses should comply with the organisation s security policy or be restricted from accessing the organisation s network. Secure data on handheld devices In general, users should not store sensitive information on handheld devices. However, if sensitive information is stored on the handheld device, users should be encouraged to delete sensitive information when no longer needed. This information can be archived on the PC during synchronisation and transferred back to the PDA when needed. Guideline on Wireless Security P a g e 13
14 Disable Infrared and Bluetooth Users are recommended to disable Infrared and Bluetooth ports during periods of inactivity to deter them from leaking information from their handheld devices Technical Countermeasures Technical countermeasures should address the security risks identified during the risk assessment and should ensure that the organisation s security policy is being enforced. Authentication Handheld device users must be able to authenticate themselves to the handheld device by providing a password, a token, or both. At the most basic level, organisations should require PDAs to be password protected. Password protection is already included with most handheld devices, but is usually not enabled in the default setting. Users should be prompted for a password when accessing the handheld device or the desktop PC synchronization software. Biometric user authentication technologies are also available for handheld devices. Fingerprint readers can be attached to the handheld devices through a serial or USB port and can be set to lock the whole device, to lock an individual application, or to connect to a remote database over a network or dial-up connection. Tamper-proof smart cards, which contain unique user identifying information such as a private key, can also be used to authenticate the user to the device. Encryption Encryption software can be used to protect the confidentiality of sensitive information stored on handheld devices and mirrored on the desktop PC. The information on addon backup storage modules should also be encrypted and the modules securely stored when not in use. This additional level of security can be added to provide an extra layer of defense to further protect sensitive information stored on handheld devices. Many software programs are freely available to help users encrypt these types of files for an added layer of security. Handheld device users may also choose to encrypt files and messages before the files and messages are transferred through a wireless port. Guideline on Wireless Security P a g e 14
15 Antivirus Software Antivirus software is another important security measure for handheld devices. All organisations, regardless of their security requirements, should incorporate PDA antivirus applications to scan and data files and to remove malware from files upon transmission to the device. The software should scan all entry ports (i.e., beaming, synchronizing, , and Internet downloading) as data is imported into the device, provide online signature update capabilities, and prompt the user before it deletes any suspicious files. The organisation should further require regular updates to the antivirus software and require associated workstations (i.e., the PCs with which users synchronize their PDAs) to have current, properly working virus-scanning software. Most major PC antivirus software vendors have handheld device antivirus software that can be downloaded directly from their Web sites. Public Key Infrastructure (PKI) Many handheld devices are beginning to offer support for PKI technologies. PKI is one of the best available methods for meeting confidentiality, integrity, and authenticity security requirements. A PKI uses an asymmetric encryption method, commonly known as the public/private key method, for encrypting and ensuring the integrity of documents and messages. A certificate authority issues digital certificates that authenticate the claimed identity of people and organisations over a public network such as the Internet. The PKI also establishes the encryption algorithms, levels of security, and the key distribution policy for users. PKI support is often integrated into common applications such as Web browsers and programs by validating certificates and signed messages. The PKI can also be implemented by an organisation for its own use to authenticate users that handle sensitive information. The use of PKI counters many threats associated with public networks, but also introduces management overhead and additional hardware and software costs that should be evaluated while performing the risk assessment and selecting the appropriate countermeasures to meet the organisation s security requirements. If PKI has already been deployed to provide security services in the wired network of an Guideline on Wireless Security P a g e 15
16 organisation, users compromise of the enterprise data in the event of a lost or stolen PDA. VPN and Firewalls Handheld devices are beginning to offer support for personal firewalls and VPN technologies and to offer network administrators effective countermeasures against threats to the confidentiality, integrity, and authenticity of the information being transferred. A packet filter firewall, for example, screens Internet traffic based on packet header information such as the type of application ( , ftp, Web, etc.) and by the service port number. A VPN creates a virtual private network between the handheld device and the organisation s network by sharing the public network infrastructure. VPN technology offers the security of a private network through access control and encryption, while taking advantage of the economies of scale and built-in management facilities of large public networks. Network administrators should look for the following features when purchasing VPN technologies: interoperability with existing infrastructure, support for wireless and dial-up networking, packet-filtering or stateful-inspection firewall, automatic security updates, and a centralized management console. Enterprise Solutions Enterprise handheld device management software allows network administrators to discover handheld devices, install and remove applications, backup and restore data, collect inventory information, synchronize data with corporate servers and databases, and perform various configuration management functions from a central location. Enterprise security solutions have been introduced that allow the organisation to set policies on all handheld devices under the organisation s control. Some of the options that are available include defining the type of encryption to use, which application databases to encrypt, password protection, and port protection. 4.2 Securing Your Home Wireless Network While the security problems associated with wireless networking are serious, there are steps you can take to protect yourself. The following sections describe these steps. Guideline on Wireless Security P a g e 16
17 4.2.1 Make Your Wireless Network Invisible Wireless access points can announce their presence to wireless-enabled computers. This is referred to as identifier broadcasting. In certain situations, identifier broadcasting is desirable. For instance, an internet cafe would want its customers to easily find its access point, so it would leave identifier broadcasting enabled. However, you are the only one who needs to know you have a wireless network at home. To make your network invisible to others, see your access point s user manual for instructions on disabling identifier broadcasting. While this kind of security through obscurity is never guaranteed, it is a starting point for securing your wireless network Rename Your Wireless Network Many wireless access point devices come with a default name. This name is referred to as the service set identifier (SSID) or extended service set identifier (ESSID). The default names used by various manufacturers are widely known and can be used to gain unauthorised access to your network. When you rename your network, you should choose a name that will not be easily guessed by others Encrypt Your Network Traffic Your wireless access point device should allow you to encrypt traffic passing between the device and your computers. By encrypting wireless traffic, you are converting it to a code that can only be understood by computers with the correct key to that code Change Your Administrator Password Your wireless access point device likely shipped with a default password. Default passwords for various manufacturers are widely known and can be used to gain unauthorised access to your network. Be sure to change your administrator password to one that is long, contains a combination alphanumeric and special characters (such as #, $, and &), and does not contain personal information (such as your birth date). If your wireless access point does not have a default password, be sure to create one and use it to protect your device Use File Sharing with Caution If you do not need to share directories and files over your network, you should disable file sharing on your computers. You may want to consider creating a dedicated directory for file Guideline on Wireless Security P a g e 17
18 sharing, and move or copy files to that directory for sharing. In addition, you should password protect anything you share, and use a strong password. Never open an entire hard drive for file sharing Keep Your Access Point Software Patched and Up to Date From time to time, the manufacturer of your wireless access point will release updates to the device software or patches to repair bugs. Be sure to check the manufacturer s web site regularly for any updates or patches for your device s software Check Your Internet Provider s Wireless Security Options Your Internet Service Provider may provide information about securing your home wireless network. Check the customer support area of your provider s web site or contact your provider s customer support team. 4.3 Using Wireless Networking Safely in Public Spaces Accessing the Internet via a public wireless access point involves serious security threats you should guard against. These threats are compounded by your inability to control the security setup of the wireless network. Furthermore, you are often in range of numerous wirelessenabled computers operated by people you do not necessarily know. The following sections describe steps you can take to protect yourself Watch What You Do Online You are likely to have an unsecured, unencrypted network connection when you use a public wireless access point, so you should be careful about what you do online. There is always the chance that another user on the network could be monitoring your online activities, such as: Online Banking Online Shopping Sending Typing passwords or credit card numbers Disable File Sharing File sharing in public wireless spaces is even more dangerous than it is on your home wireless network. This is because you and your wireless-enabled laptop are likely to be even closer to other wireless computers operated by people you do not know. Also, many public Guideline on Wireless Security P a g e 18
19 wireless networks feature peer-to-peer networking in which other computers will attempt to connect directly to yours. To leave file shares open in this kind of environment is to attract risks. To prevent attackers from gaining access to your sensitive files, you should disable file sharing when connecting to a public wireless access point. Consult the help file for your operating system to learn how to disable file sharing Be Aware of Your Surroundings When using a public wireless access point, you should be aware of what is happening around you. Ask yourself the following questions: Are others using their computers in close proximity to you? Can others view your screen? Are you sitting near a window through which someone, using binoculars, could get a view of your screen? If you answered yes to any of the above questions, your sensitive data might be at risk. Consider whether it is essential to connect to the Internet. If an Internet connection is not essential, you are recommended to disable wireless networking. If you do need to connect, use caution and follow the steps noted above. Guideline on Wireless Security P a g e 19
20 5.0 Conclusion Wireless security faces a number of hurdles, especially the challenge of adapting wired technologies to the wireless world, which has more constrained resources. Hence, it is important that organisations put in place realistic policies and measures to that their employees do not expose internal information to potential threats. It is also essential that home users follow some safety principles on their wireless networks and that they be very cautious when connecting to public wireless networks to access sensitive information. Guideline on Wireless Security P a g e 20
21 6.0 References Wireless Network Security, , Bluetooth and Handheld Devices, NIST Using Wireless Technology Securely, US-CERT Guidelines for Securing Wireless Local Area Networks (WLANs), NIST Guideline on Wireless Security P a g e 21
22 Appendix A List of Acronyms DoS ESSID PDA PKI SSID VPN Wi-Fi WLAN Denial of Service Extended Service Set Identifier Personal Digital Assistant Public Key Infrastructure Service Set Identifier Virtual Private Network Wireless Fidelity Wireless Local Area Network Guideline on Wireless Security P a g e 22
23 Appendix B A. MyT Livebox Installation Ethernet Cable Installation 1. For installation by Ethernet/Network Cable, verify that you have a free Ethernet port on your computer. 2. Check if you have all the required tools and cables in the installation pack. 3. Insert the installation CD in your CD drive and follow the instructions until installation is complete. 4. A window will appear if you are using Windows Vista. Click on Home 5. Click on continue 6. Finally, click on close. 7. Wait until the installation is complete and you will then be able to access the Internet. Wifi Installation 1. For wifi connection, go to Network and Sharing Centre 2. Click on connect to a network 3. Choose your Livebox name 4. Enter your network key (at the back of your router) 5. You should now be able to connect to the Internet via wifi B. ADSL Installation 1. Run installation CD 2. Connect your telephone cable to your modem 3. Enter your username and password 4. You will then be able to connect to the internet. Guideline on Wireless Security P a g e 23
Using Wireless Technology Securely
Using Wireless Technology Securely US-CERT In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Frequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:
1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus
Cyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
ENISA s ten security awareness good practices July 09
July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
MUNICIPAL WIRELESS NETWORK
MUNICIPAL WIRELESS NETWORK May 2009 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
WIRELESS NETWORKING SECURITY
WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
Business ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500
INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
NETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Frequently Asked Questions
FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?
CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.
Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
Network Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
Wireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
How To Manage A Network Safely
ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first
Go Wireless. Open up new possibilities for work and play
Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
Why is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
WLAN Security Networking with Confidence
WLAN Security Networking with Confidence Introduction So you ve just installed a new wireless local area network (WLAN) in your small business or home. The access point is on and connected, the client
INFORMATION TECHNOLOGY. Revised May 07. Home Networking Guide
INFORMATION TECHNOLOGY Revised May 07 Home Networking Guide Contents Introduction... 3 Intent... 3 Disclaimer... 3 Rexnord Support limitations... 3 Remotely Connecting to the Rexnord Data Network... 3
Cybersecurity Best Practices
Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
