topic 5A: Server security Flashcards
Servers and Host computers
- SERVERS : software/computers that provide services to other computers or software
the computers and software that utilize these services are called CLIENTS
software servers are usually hosted on the computer servers
software servers = servers
computer services = host computers
Types of servers
- domain name server (DNS)
- web server
- application server
- email server
- database server
- file server
Securing the host computer
1) protecting the physical device
- physical access to equipment
- secure equipment
2) securing the operating system
- five-step process
3) using security-based software
- antivirus, firewall
4) access control
Protecting the physical device (physical access)
- prevent unauthorized physical access to equipment : prevent tampering and destruction
- secure equipment : prevent removal/theft
What would happen if an attacker has physical access to the host computer? (physical access)
1) risk of DoS attack (shut down, disconnect the network etc)
2) system could be held for ransom (stolen and held for ransom, install ransomware)
3) reconfigure to boot from a floppy disk and erase the hard drives (to remove all the information and data in the computer)
4) copy/steal the hard drives, install on own computer and read it
5) copy hard drive, install on own , boot up and conduct brute-force password guessing
6) install a keylogger (hardware or software) to spy on login credentials and other information
7) install malware to provide backdoor access or perform other malicious tasks
8) install wireless device
9) physical destruction
Physical access control (physical access)
- secured doors
- fencing
- camera surveillance
- access list (only people on the list are allowed to access)
- mantrap :
> room with 2 doors, only one can open at a time
> each door may require different authentication to open - proximity tags and readers :
> access is allowed only if a shortrange wireless (RFID, Bluetooth) tag is nearby and detected by a reader
> only authorized people possess the tags
Secure equipment (physical access)
1) portable devices have steel brackets, security slots or cable locks
2) notebook PCs may be places in a safe
3) locking cabinets
What is an operating system (OS)? (securing OS)
- a software that functions as an interface between the user and the computer
- allows user to use the computer by :
- MANAGING RESOURCES of a computer such as the printer, mouse, keyboard etc
- PROVIDNG USER INTERFACE, graphical user interface (GUI) makes it very easy to use
- RUNNING APPLICATIONS the ability to multitask by running many applications at once
- SUPPORT FOR BUILT-IN UTILITY PROGRAMS, eg find and fix errors in the operating system
Types of OS (securing OS)
1) host computers (Unix, windows server)
2) personal computers (Microsoft windows, macOS, chrome OS)
3) mobile phones (android, IOS)
4) for all kinds of devices, like IOT, network devices etc
Securing the operating system (securing OS)
Five-step process for protecting operating system :
1) develop the security policy
2) perform host software baselining
3) configure operating system’s security and settings
4) deploy the settings
5) implement patch management
1) Developing the security policy
- acceptable use
- anti-virus
- password management
- email and retention
- wireless communication
- disposal and destruction
2) Perform host software baselining
1) baselining
- create a checklist against which an operating system can be evaluated to implement an effective and efficient security infrastructure
2) Microsoft baseline security analyzer (MBSA)
- performs an audit check on Windows operating system to reveal security vulnerabilities and recommend settings for hardening the operating system
some check that MBSA conducts :
- missing security updates
- file system type on hard drives
- guest accounts are disabled
- number of local administrator accounts
- for blank or simple local user account passwords
- if unnecessary services are running
3) Configure security and settings
1) change insecure default settings
- restrict permissions on files and directories
- remove and disable guest accounts
- apply password guidelines
2) eliminate unnecessary software, devices, services and protocols
3) enable security features such as Windows firewall
4) Deploy the settings
- a security template is created and deployed for all computers
- use tools to automate the process to each computer
- in Microsoft, a security template is a collection of security configuration settings that includes the following :
1. account policies
2. user rights
3. event log settings
4. system services
5. file permissions
6. registry permissions
5) Implement patch management
- software vendors usually deploy software fixes to address the vulnerabilities in operating systems that are uncovered after the software has been released
> patch : broadly released software security update intended to cover vulnerabilities that have been discovered
hotfix : addresses a specific customer situation, often not distributed outside that customer’s organization
service pack : a cumulative package of all hotfixes, patches and updates