Computer Security - Quick Guide
Computer Security - Quick Guide
Why Security?
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all organizations and
individuals to protect their sensitive data or reputation. This is because of the numerous people and machines
accessing it. It is important to mention that the recent studies have shown a big danger is coming from internal
threats or from disappointed employees like the Edward Snowden case, another internal threat is that information
material can be easy accessible over the intranet.
One important indicator is the IT skills of a person that wants to hack or to breach your security has decreased
but the success rate of it has increased, this is because of three main factors −
Hacking tools that can be found very easily by everyone just by googling and they are endless.
Technology with the end-users has increased rapidly within these years, like internet bandwidth and
computer processing speeds.
All this can make even a school boy with the curiosity, a potential hacker for your organization.
Since locking down all networks is not an available option, the only response the security managers can give is to
harden their networks, applications and operating systems to a reasonable level of safety, and conducting a
business disaster recovery plan.
What I mean by this case is that even physical security is important in computer security, as most of us think it is
the last thing to take care of.
Now let’s go directly to the point of what all to secure in a computer environment −
First of all, is to check the physical security by setting control systems like motion alarms, door accessing
systems, humidity sensors, temperature sensors. All these components decrease the possibility of a
computer to be stolen or damaged by humans and environment itself.
People having access to computer systems should have their own user id with password protection.
Monitors should be screen saver protected to hide the information from being displayed when the user is
away or inactive.
Data that you use to store information which can be financial, or non-financial by encryption.
Information should be protected in all types of its representation in transmission by encrypting it.
See the following scenario which tells us what employees might end up doing without computer security
awareness −
So the benefits of computer security awareness are obvious as it directly minimizes the potential of you being
hacked off your identity, your computer, your organization.
Losing you data − If your computer has been hacked or infected, there is a big chance that all your stored
data might be taken by the attacker.
Bad usage of your computer resources − This means that your network or computer can go in overload
so you cannot access your genuine services or in a worst case scenario, it can be used by the hacker to
attack another machine or network.
Reputation loss − Just think if your Facebook account or business email has been owned by a social
engineering attack and it sends fake information to your friends, business partners. You will need time to
gain back your reputation.
Identity theft − This is a case where your identity is stolen (photo, name surname, address, and credit card)
and can be used for a crime like making false identity documents.
Basic Computer Security Checklist
There are some basic things that everyone of us in every operating system need to do −
Check if the operating system is being updated. In my case, I did a screenshot of my laptop which is a
Windows 7.
Check if the antivirus or antimalware is installed and updated. In my case, I have a Kaspersky antivirus being
updated.
Check for the unusual services running that consumes resources.
Confidentiality
Confidentiality is the concealment of information or resources. Also, there is a need to keep information secret
from other third parties that want to have access to it, so just the right people can access it.
Example in real life − Let’s say there are two people communicating via an encrypted email they know the
decryption keys of each other and they read the email by entering these keys into the email program. If someone
else can read these decryption keys when they are entered into the program, then the confidentiality of that email
is compromised.
Integrity
Integrity is the trustworthiness of data in the systems or resources by the point of view of preventing unauthorized
and improper changes. Generally, Integrity is composed of two sub-elements – data-integrity, which it has to do
with the content of the data and authentication which has to do with the origin of the data as such information has
values only if it is correct.
Example in real life − Let’s say you are doing an online payment of 5 USD, but your information is tampered
without your knowledge in a way by sending to the seller 500 USD, this would cost you too much.
In this case cryptography plays a very major role in ensuring data integrity. Commonly used methods to protect
data integrity includes hashing the data you receive and comparing it with the hash of the original message.
However, this means that the hash of the original data must be provided in a secure way.
Availability
Availability refers to the ability to access data of a resource when it is needed, as such the information has value
only if the authorized people can access at right time. Denying access to data nowadays has become a common
attack. Imagine a downtime of a live server how costly it can be.
Example in real life − Let’s say a hacker has compromised a webserver of a bank and put it down. You as an
authenticated user want to do an e-banking transfer but it is impossible to access it, the undone transfer is a
money lost for the bank.
Unauthorized access − An unauthorized access is when someone gains access to a server, website, or
other sensitive data using someone else's account details.
Hacker − Is a Person who tries and exploits a computer system for a reason which can be money, a social
cause, fun etc.
Attack − Is an assault on the system security that is delivered by a person or a machine to a system. It
violates security.
Antivirus or Antimalware − Is a software that operates on different OS which is used to prevent from
malicious software.
Social Engineering − Is a technique that a hacker uses to stole data by a person for different for purposes
by psychological manipulation combined with social scenes.
Virus − It is a malicious software that installs on your computer without your consent for a bad purpose.
Firewall − It is a software or hardware which is used to filter network traffic based on rules.
Computer Application Whitelistening − The idea is to install just a restricted number of applications in
your computers, which are useful as well as are genuine.
Computer System Restore Solution − In case your computer is hacked and your files are damaged, you
should have the possibility to again have access to your files. An example is Windows System Restore or
Backup.
Computer and Network Authentication − The data that is accessed over the network is best to be
provided only to the authorized users. Use usernames and passwords!!!
File, Disk and Removable Media Encryption − Generally a good practice is to encrypt hard disks or
removable devices, the idea behind this is in case your laptop or your removable USB is stolen and it is
plugged in another machine it cannot be read. A good tool for this is Truecrypt.
Remote Access Authentication − Systems which are accessed over the network is best to be provided
only to the authorized users. Use usernames and passwords!!!
Network Folder Encryption − Again like the case of Network Authentication, if you have a network storage
or a network folder shared, it is good to be encrypted to prevent any unauthorized user who is listening to the
network to read the information.
Secure Boundary and End-To-End Messaging − Nowadays email or instant messaging is widely spread
and it is the number one tool to communicate. It is better that the communication to be encrypted between
the end users, a good tool for this is PGP Encryption Tool.
Use the licensed versions of Windows OS, not the cracked or pirated ones and activate them in order to take
genuine updates.
Disable Unused Users − To do this, Right Click on Computer – Manage – Local Users and Groups – Users, then
disable those users that are not required. In my case, I disabled the Guest and Administrator users and I created
a new non-default like Admin.
Disable unused shares − By default, Windows OS creates shares, please see the following screenshot. You
have to disable them and to do this, you follow −
Right Click on My Computer – Manage – Shared Folders – Right Click Stop Sharing.
The next step is to take updates regularly for Windows OS. It is reccomended to do them automatically and
periodically. To set this up, go to Control Panel – System and Security – Windows Updates – OK.
Put your Windows System Firewall up, this will block all the unauthorized services that make traffic. To set this up,
go to Control Panel – System and Security – Windows Firewall.
Install a licensed antivirus and take updates, in the coming sections we will cover in detail about antiviruses. It is
strongly recommended not to download from torrents and install cracked versions.
You should always Configure a password protected Screen Saver. To set this up, please follow this path −
Control Panel – All Control Panel Items – Personalize – Turn Screen Saver on or off – Check “On resume,
display logon Screen”.
Disable Autoplay for Removable Media. This blocks the viruses to run automatically from removable devices.
To disable it go to – Start – on Search box type Edit Group Policy –Administrative Templates – Windows
Components – Autoplay Policy – Turn off Autoplay – Enable – Ok.
Install only trusted internet explorer browsers like Internet explorer, Chrome or Mozilla Firefox and then update
them regularly. Missing the updates can lead to possible hacking.
Enable the BitLocker Drive Encryption to encrypt hard drives, but it is only available in Windows & Ultimate and
Upper Versions.
To enable it follow the path: Start – Control Panel – System and Security – BitLocker Drive Encryption.
Set Bios Password − This option differs based on different computer producers and we need to read
manufacturer guidelines, this option secures your computer one layer upper in the OS.
Guidelines for Mac OS X Security
Following are the list of guidelines for Mac OS X Security.
Use licensed versions of Mac OS X and never use the cracked or pirated ones. Once installed, activate them in
order to take up the genuine updates.
Set password for the root user and create a less privileged user. By default, the root user of the Mac OS X
doesn’t have a password, so you have to put one and then create a user with less privilege for daily usage.
To set it up follow: Apple menu – System Preferences – Click Users & Groups
Disable Auto Logon − By default, the Mac OS X is configured to automatically logon the first administrative user
that is created. Also it displays all valid usernames in the login windows.
To disable this, you have to: Open System Preferences – Accounts – User – Uncheck the Log in
automatically – Click on Login Options (tab) – Set “Display Login Windows as” = Name and Password.
Update Mac OS X − In order to secure our systems, we need to take our updates and patches of Mac OS X.
To do so we follow this path: Click on System Preferences –Software Update – Change the default “weekly”
to “daily” – Quit System Preferences.
You better do it weekly because it will not overload your networks, in case you have a large network.
Put your Mac OS X system firewall up. The go to System Preferences – Sharing –Firewall – Click on Start.
Configure Screen saver password protected: To set this up, follow this path – System Preferences – Screen
Effect – Activation – Set “Time until screen effect starts” = 5 Minutes – Set “Password to use when
waking the screen effect” = use my user –account password. It is recommended to be less than 5 minutes.
Put Open Firmware password − Double click the application icon to open it. Click on the "Change" button to
modify the security settings. If you are enabling the security features, enter a password into the – Password and
Verify boxes. Click OK. Enter your System Administrator Account.
Encrypt folders − Mac OS X has FileVault, which encrypts information in your home folder. You can see the
FileVault in the following screenshot.
Click Apple Menu – System Preferences – Security & Privacy – FileVault – Click the lock Icon to unlock it,
then enter an administrator name and password.
Disable Handoff − Handoff is a feature to keep your work in sync, but it needs to send some data to Apple to
work. It is suggested to disable it.
To do so: Click System Preferences – General – Uncheck “Allow Handoff between this Mac and your
iCloud devices”.
Allow only signed Apps − To reduce the surface of attack, it is suggested not to run untrusted code not signed
with a proper key.
To allow only apps signed by an authorized developer, you should follow the path – System Preferences –
Security & Privacy –General – Set “Allow apps download from” to “Mac App Store and identified
developers”.
Computer Security - Antiviruses
In the previous chapter, we saw how to secure our computers and one of the points was installing and updating
antivirus software. Without this software there is a high chance that your systems and networks will be hit and will
suffer hacking attacks and also can be affected by the various viruses.
It is important that the antivirus scan engine and virus signatures to be updated regularly, we do this because if
your system is hit by the latest malware it will be detected.
Scanning − When a new virus is detected in the cyberspace, antivirus producers start writing programs
(updates) that scans for similar signature strings.
Integrity Checking − This method generally checks for manipulated files in OS from the viruses.
Interception − This method is used basically to detect Trojans and it checks the request made by the
operating system for network access.
The following image shows the schema for an antivirus engines functionality.
Ans. It is a free and independent service. It uses multiple antivirus engines (41 anti-virus engines), so its result
will be showing for all the 41 engines. It updates the engines in real-time.
For further clarity, please see the following screenshot, wherein I uploaded a file with virus and the result is 33/41
(Detection Ratio), which means that it has virus and did not pass the class, so it should not be opened.
A good feature of this site is URL checking, before entering to a website you can enter the URL and it checks for
you if the site has infection and can harm you.
I did a test with a URL and it came out to be clean and that too 100%, so I can visit it without my computer being
infected.
The free versions of anti-viruses have nearly identical malware detection scores to the paid versions produced by
the same company, but the commercial antivirus makes a small difference in the performance of security and in
our case we are system administrators and we want maximum protection in the work environment.
From the PCMagazine (http://in.pcmag.com/ ) you can get a review which are the best top rated free
antiviruses at the moment. In the following URL you can check by yourself
http://www.pcmag.com/article2/0,2817,2388652,00.asp
Avast Antivirus
This antivirus has good scores in malware blocking and anti-phishing test scans, it can be downloaded from
https://www.avast.com/en-eu/index
AVG Antivirus
It can be downloaded from http://www.avg.com/us-en/free-antivirus-download . For server installation you need
to purchase the commercial version.
For server installation you will need to purchase the commercial version.
Bitdefender Antivirus
It can be downloaded from http://www.bitdefender.com/solutions/free.html A good feature in this antivirus is
that it can work entirely in the background. No configuration setting. For server installation you need to buy the
commercial version.
Microsoft Security Essentials
Even though it is not among the top-most free antiviruses owing to the Microsoft brand, it is worth a mention that
Microsoft itself offers you a free antivirus which is called as Microsoft Security Essentials.
Commercial Antivirus
I should mention that all the producers of free antiviruses offers their commercial versions too. Based on PC
magazine, the best commercial antiviruses are −
Kaspersky Anti-Virus
Bitdefender Antivirus Plus 2016
McAfee AntiVirus Plus (2016)
Webroot SecureAnywhere Antivirus (2015)
Please see the following link to check by yourself − http://www.pcmag.com/article2/0,2817,2372364,00.asp
Kaspersky Antivirus
It can be downloaded as a free trial from http://www.kaspersky.com/free-trials/anti-virus
It has an excellent score in anti-phishing. It also gives a useful bonus in security tools like credit card protection in
your computers.
It protects all the operating systems like Windows, Mac OS, Android, and iOS devices. very good malicious URL
blocking and anti-phishing.
Webroot SecureAnywhere Antivirus
It can be downloaded as a free trial from − http://www.webroot.com/us/en/home/products/av
They are self-replication programs that reproduce their own codes by attaching themselves to other executable
codes. They operate without the permissions or knowledge of the computer users. Viruses or malwares like in
real-life, in computers they contaminate other healthy files.
However, we should remember that viruses infect outside machines only with the assistance of a computer user
only. These can happen by clicking a file that comes attached with email from an unknown person, plugging a
USB without scanning, opening unsafe URLs for that reason. We as system administrators have to remove the
administrator permissions of users in these computers. We categorize malwares in three types −
Characteristics of a Virus
Following are a couple of characteristics of any virus that infects our computers.
They reside in a computer’s memory and activates themselves while the program that is attached starts
running.
For example − They attach themselves in general to the explorer.exe in windows OS because it is the
process that is running all the time, so you should be cautious when this process starts to consume too
much of your computer capacities.
They modify themselves after the infection phase like they source codes, extensions, new files, etc. so it is
harder for an antivirus to detect them.
They always try to hide themselves in the operating systems in the following ways −
Encrypts itself into cryptic symbols, and they decrypt themselves when they replicate or execute.
For example − You can see this in the following image for better understanding as in my computer I
found this file.
After finding this file, I opened it with a text editor and as thought the text was not understandable as shown in the
following screenshot.
After finding this, I tried it on a base64 decoder and I found that it was a Virus file.
It may perform tasks by triggering an event with itself. For example, this happens when in an infected
computer pop-up tables etc., show up automatically on the screen.
They are common in Windows and Mac OS because these operation systems do not have multiple file
permissions and are more spread out.
Start by themselves
Transmit themselves by using non-executable files
Infect other networks or computer
From the above conclusions, we should know that when some unusual processes or services are run by
themselves we should further investigate their relations with a possible virus. The investigation process is as
follows −
To investigate these processes, start with the use of the following tools −
fport.exe
pslist.exe
handle.exe
netstat.exe
The Listdll.exe shows all the dll files being used, while the netstat.exe with its variables shows all the
processes that are being run with their respective ports.
You can see the following example on how I mapped the process of Kaspersky antivirus which I used along with
the command netstat-ano to see the process numbers and task manager to see to which process belongs to this
number.
Then we should look for any modified, replaced or deleted files and the shared libraries should also be
checked. They generally infect executable program files with extension like .EXE, .DRV, .SYS, .COM, .BIN.
Malwares changes extension of genuine files, for example: File.TXT to File.TXT.VBS.
If you are a system administrator of a webserver, then you should be aware of another form of malware which is
called as webshell. It generally is in a .php extension but with strange file names and in an encrypted form. You
should delete them in case you detect them.
After that is done, we should update the antivirus program and rescan the computer again.
Error while the system is booting in bios stage, like Bios’s battery cell display, timer error display.
Hardware errors, like beeps RAM burn, HDD, etc.
If a document fails to start normally like a corrupted file, but the other files can be opened accordingly.
Keyboard or mouse doesn’t answer to your commands, you have to check the plug-ins.
Monitor switching on and off too often, like blinking or vibrating, this is a hardware fault.
On the other hand, if you have the following signs in your system, you should check for malware.
Freezes frequently.
It slows down when a program or process starts.
Third parties complain that they are receiving invitation in social media or via email by you.
Files extensions changes appear or files are added to your system without your consent.
Internet Explorer freezes too often even though your internet speed is very good.
Your hard disk is accessed most of the time as you can see from the LED light on your computer case.
If your computer is consuming too much bandwidth or network resources this is the case of a computer
worm.
Hard disk space is occupied all the time, even when you are not taking any action, for example installing a
new program.
Files and program sizes changes comparing to its original version.
Don’t open any email attachment coming from unknown people or from known people that contain
suspicious text.
Don’t accept invitation from unknown people on social media.
Don’t open URL sent by unknown people or known people that are in any weird form.
Virus Information
If you have found a virus but you want to investigate further regarding its function. I would recommend you to
have a look at these virus databases, which are offered generally by antivirus vendors.
Kaspersky Virus Database − (http://www.kaspersky.com/viruswatchlite?hour_offset=-1 )
F-Secure − (https://www.f-secure.com/en/web/labs_global/threat-descriptions )
Symantec – Virus Encyclopedia − (https://www.symantec.com/security_response/landing/azlisting.jsp )
What is Encryption?
Encryption is a transformed type of genuine information where only the authorized parties know how to read it, so
in the worst case scenario if somebody has access to these files they would still not be able to understand the
message in it.
The bases of encryption are since the ancient times. A good example is the pigeon couriers, where the kings
used to send messages to their commandants in the battle field in a specific code, when the enemies caught
them, they could not read them, just that the message was lost, but if arrived at the destination commandant had
the decryption vocabulary so they could decrypt it.
We should mention that encryption is for good or bad purpose. The bad case is the scenario in which most of the
malware files are in an encrypted form, so it cannot be read by everyone accept the hacker.
Axcrypt − It is one of the best opensource encryption file softwares. It can be used in Windows OS, Mac OS
and Linux as well. This software can be downloaded from −
http://www.axantum.com/AxCrypt/Downloads.aspx
GnuPG − This is an opensource software again and it can be integrated with other softwares too (like email).
It can be downloaded from − https://www.gnupg.org/download/index.html
Windows BitLocker − It is a Windows integrated tool and its main functions is to secure and encrypt all the
hard disk volumes.
FileVault − It is a Mac OS integrated tool and it secures as well as encrypts all the hard disk volume.
Encryption Ways of Communication
System Administrators should use and offer to their staff a secure and encrypted channels of communication and
one of them is SSL (Secure Sockets Layer).This protocol helps to establish a secure and encrypted connection
between the clients and the servers. Generally, it is used for Web Servers, Mail Servers, FTP servers.
Another tool used by the system administrator is the SSH (Secure Shell). This is a secure replacement for the
telnet and other unencrypted utilities like rlogin, rcp, rsh.
It provides a secure channel encrypted in the communication host to host over internet. It reduces the man-in-the-
middle attacks. It can be downloaded from − http://www.putty.org/
Backup Devices
In this section we will see the backup devices from smaller to enterprise solutions. For a personal computer, they
are −
CD and DVD, Blue-Rays − They are used for home/personal usage where people can store their documents,
mainly personal or office related documents because they have small capacities varying from 750MB to 50GB.
Removable Devices − They are again for home usage (data, documents, music, photos, movies) which can be a
Removable USB or external hard disks. Their capacities lately have increased a lot, they vary from 2 GB to 2 TB.
Network attached storage (NAS) − They are generally devices that are used in small businesses for backup
purposes because they offer a centralized manner of backup. All the users can connect through the network to
access this device and save data.
They are lesser in cost when compared to other solutions and they also offer a good fault tolerance as they are
configured in RAID (redundant array of independent disks). They can be rack or non-rack mounted. They offer a
good level of authentication of users and web console managing.
Storage Area Network (SAN) − These are generally devices that are used for big businesses for backup
purposes. They offer a high speed of network for storage the biggest producers are EMC Corporation, DELL.
Local Backups
Online Backups
Generally local backups store the data in a CD, NA Storages, etc. as there can be a simple copying of files or by
using any third party software. One of them in the server is the Windows backup which is included in the
Windows Server Edition License.
Another one is Acronis which is one of the best in the market − http://www.acronis.com/en-eu/
Online Backup or Cloud Storage
One of the biggest trend is online storage where the companies and users can store their data somewhere in the
cloud, and it is cheaper as well rather than doing it all by yourself. There is also no need for any backup
infrastructure and maintenance.
For a personal user it is offered for free by the biggest vendors like Microsoft. It offers OneDrive and you can
store up to 5GB in their cloud and it has an interface for different Operating Systems.
The second is the Google Drive, which is a product by google, wherein the files synchronizes automatically.
The biggest vendors offering such service are Microsoft with AZURE solution − https://azure.microsoft.com/en-
us/documentation/scenarios/storage-backup-recovery/ which is offering a very high performance and
scalability for this solution.
The other is Amazon with it product S3 details about this product can be found on −
http://aws.amazon.com/s3/
Computer Security - Disaster Recovery
Disaster recovery is generally a planning process and it produces a document which ensures businesses to solve
critical events that affect their activities. Such events can be a natural disaster (earthquakes, flood, etc.), cyber–
attack or hardware failure like servers or routers.
As such having a document in place it will reduce the down time of business process from the technology and
infrastructure side. This document is generally combined with Business Continuity Plan which makes the
analyses of all the processes and prioritizes them according to the importance of the businesses. In case of a
massive disruption it shows which process should be recovered firstly and what should be the downtime. It also
minimizes the application service interruption. It helps us to recover data in the organized process and help the
staff to have a clear view about what should be done in case of a disaster.
Payroll Server We take backup Restore the backups in Fix the primary server and
8 hours
system damaged daily the Backup Server restore up to date data
You should prepare a list of all contacts of your partners and service providers, like ISP contact and data, license
that you have purchased and where they are purchased. Documenting all your Network which should include IP
schemas, usernames and password of servers.
These are more for prevention. You can refer the following image.
At the server level, RAID systems should always be used and there should always be a spare Hard Disk in
the server room.
You should have backups in place, this is generally recommended for local and off-site backup, so a NAS
should be in your server room.
The connectivity to internet is another issue and it is recommended that the headquarters should have one
or more internet lines. One primary and one secondary with a device that offers redundancy.
If you are an enterprise, you should have a disaster recovery site which generally is located out of the city of
the main site. The main purpose is to be as a stand-by as in any case of a disaster, it replicates and backs
up the data.
For example − We are system administrators of a large chain of super markets, but our company wants to go
online by launching an online selling platform. We have done the configuration and the system is up and working,
but after a week we hear that the platform was hacked.
We ask a question to ourselves – What did we do wrong? We skipped the security of the network which is as
important as the set up because this hacking can directly influence the company’s reputation resulting in
decrease of sales and market value.
They also can work as packet filters this means that the firewall takes the decisions to forward or not the packet
based on source and destination addresses and ports.
It is software based, but is an opensource so it is free and easy to configure. It has a real time signature based
network – IDS, which notifies the system administrators or attacks like port scanners, DDOS attacks, CGI attacks,
backdoors, OS finger printing.
The other IDS are −
BlackICE Defender
CyberCop Monitor
Check point RealSecure
Cisco Secure IDS
Vanguard Enforcer
Lucent RealSecure.
An example is a connection between two ASA 5505 firewalls as shown in the following image.
Computer Security - Policies
In this chapter we will explain security policies which are the basis of security for the technology infrastructure of
your company.
In a way they are the regulatory of the behaviors of your employees towards the use of technology in the
workplace, that can minimize the risk of being hacked, information leak, internet bad usage and it also ensures
safeguarding of company resources.
In real life you will notice the employees of your organization will always tend to click on bad or virus infected
URL’s or email attachments with viruses.
User policies
IT policies.
User policies generally define the limit of the users towards the computer resources in a workplace. For example,
what are they allowed to install in their computer, if they can use removable storages.
Whereas, IT policies are designed for IT department, to secure the procedures and functions of IT fields.
General Policies − This is the policy which defines the rights of the staff and access level to the systems.
Generally, it is included even in the communication protocol as a preventive measure in case there are any
disasters.
Server Policies − This defines who should have access to the specific server and with what rights. Which
software’s should be installed, level of access to internet, how they should be updated.
Firewall Access and Configuration Policies − It defines who should have access to the firewall and what
type of access, like monitoring, rules change. Which ports and services should be allowed and if it should be
inbound or outbound.
Backup Policies − It defines who is the responsible person for backup, what should be the backup, where it
should be backed up, how long it should be kept and the frequency of the backup.
VPN Policies − These policies generally go with the firewall policy, it defines those users who should have a
VPN access and with what rights. For site-to-site connections with partners, it defines the access level of the
partner to your network, type of encryption to be set.
Types of Policies
In this section we will see the most important types of policies.
Permissive Policy − It is a medium restriction policy where we as an administrator block just some well-
known ports of malware regarding internet access and just some exploits are taken in consideration.
Prudent Policy − This is a high restriction policy where everything is blocked regarding the internet access,
just a small list of websites are allowed, and now extra services are allowed in computers to be installed and
logs are maintained for every user.
Acceptance User Policy − This policy regulates the behavior of the users towards a system or network or
even a webpage, so it is explicitly said what a user can do and cannot in a system. Like are they allowed to
share access codes, can they share resources, etc.
User Account Policy − This policy defines what a user should do in order to have or maintain another user
in a specific system. For example, accessing an e-commerce webpage. To create this policy, you should
answer some questions such as −
Information Protection Policy − This policy is to regulate access to information, hot to process information,
how to store and how it should be transferred.
Remote Access Policy − This policy is mainly for big companies where the user and their branches are
outside their headquarters. It tells what should the users access, when they can work and on which software
like SSH, VPN, RDP.
Firewall Management Policy − This policy has explicitly to do with its management, which ports should be
blocked, what updates should be taken, how to make changes in the firewall, how long should be the logs be
kept.
Special Access Policy − This policy is intended to keep people under control and monitor the special
privileges in their systems and the purpose as to why they have it. These employees can be team leaders,
managers, senior managers, system administrators, and such high designation based people.
Network Policy − This policy is to restrict the access of anyone towards the network resource and make
clear who all will access the network. It will also ensure whether that person should be authenticated or not.
This policy also includes other aspects like, who will authorize the new devices that will be connected with
network? The documentation of network changes. Web filters and the levels of access. Who should have
wireless connection and the type of authentication, validity of connection session?
Email Usage Policy − This is one of the most important policies that should be done because many users
use the work email for personal purposes as well. As a result information can leak outside. Some of the key
points of this policy are the employees should know the importance of this system that they have the
privilege to use. They should not open any attachments that look suspicious. Private and confidential data
should not be sent via any encrypted email.
Software Security Policy − This policy has to do with the software’s installed in the user computer and what
they should have. Some of the key points of this policy are Software of the company should not be given to
third parties. Only the white list of software’s should be allowed, no other software’s should be installed in the
computer. Warez and pirated software’s should not be allowed.
Based on all the chapters and especially on the security policies, the following table has a list of checklist that
touches most of the components that have been discussed in this tutorial.
Checklist Status of task
Server Room
Documentation is up to date
Redundant lines
Information Systems
Information Security
Human Factor
General
Network Security
Network Management
FERC Compliance
This compliance is important because it deals with energy industry. Businesses should implement policies and
procedures to not only protect key electronic assets, but also to report and recover when a cyber-attack occurs.
Further information on this can be found on the following link −
http://www.ferc.gov/enforcement/compliance.asp
We have discussed most of the important compliances that have a bigger impact, also it is worth to mention that
Legal compliances can change according to countries but these major ones which we mentioned are almost
similar in every country.
Print Page