SlideShare a Scribd company logo
Module 5 Desktop/Laptop Security Module 5
Module Objectives This module will familiarize you with the following: Encryption of Data Security Issues Loss of Laptop Remote connections (VPN) Issues Module 5
Laptop Theft Laptop theft is rampant. You have a 1 in 10 chance your shiny new laptop will be stolen. And the real shocker: according to the FBI 97% are never recovered. And, the U.S. Department of Justice stated in a recent report that the FBI lost 160 laptops in a 44 month period ending in September of 2005. If FBI agents have trouble keeping track of their laptops, imagine what the ordinary person is facing. The statistics are pretty grim. A laptop is stolen every 53 seconds. Ouch! With stats like those you have to do everything in your power to avoid becoming a victim of laptop theft. If you keep valuable personal or business information on your laptop the consequences can be even more gruesome and devastating. For laptop hardware can be easily replaced, but your valuable information may be lost forever.
Laptop Theft 10 Practical Ways to Protect Your Laptop Against Theft, Loss or Misplacement. 1. Keep Your Eyes On Your Laptop -  Be aware of your laptop at all times especially when traveling. You wouldn't leave a Thousand Dollar Bill lying around unattended would you? So watch your laptop closely. 2. Don't Use An Obvious Laptop Bag -  Carry your laptop in regular luggage that doesn't look like it has a laptop. Don't advertise your laptop to any would-be thieves. 3. Use Visual Locks And Restraints -  Use visual locks and restraints to secure your laptop and to act as a deterrent. It won't fool hardened thieves but most will opt for a less secure laptop. For example, you can use a product like STOP, this system works by attaching a specially-made security plate to your laptop. This plate is barcoded and registered. It also carries a warning label letting would-be cyber thieves know that the ownership of your laptop is permanently monitored. 4. Use Passwords And Encryption -  Use passwords and encryption to protect any sensitive information on your laptop. Again, unless you use very sophisticated encryption it won't fool the experienced hacker or hard-core digital thief but it will slow down and hinder the common criminal. Set a BIOS Password for your laptop. You have to take advantage of any security option that's on your laptop's OS or operating system. For those using Mac OS X you can encrypt your entire hard drive and set-up a master password in order to view it. Windows XP & Vista lets you encrypt files and folders. Just right click your data, select properties, open general tab and then advanced to check "Encrypt contents to secure data box". 5. Use Encryption -  Vital files can be encrypted and it can even turn your USB thumb drive or iPod into a key for unlocking your hard drive. 6. Use Anti-Theft Software -  Use anti-theft software that can track and locate your laptop or computer through the IP address once the stolen laptop is used to access the Internet. Use systems like "LoJack For Laptops".  7. Use Invisible Ultraviolet Markings -  Use invisible ultraviolet markings so that any recovered stolen laptops will be clearly marked as yours to the police. Keeping track of your laptop's serial number is also a good idea and have this number stored in a different place other than on your laptop. 8. Try Remote Data Deletion -  If you place important information on your laptop have a remotely controlled self-destruct solution in place. Then your highly sensitive information can be deleted remotely after your laptop is stolen. 9. Laptop Insurance  - Create company policies for management of your company's laptops. Have set procedures in place for tracking and reporting of any laptops stolen or misplaced. Buying laptop insurance is another option you should consider especially if you are a student or do a lot of business traveling with your laptop in tow. Be prepared for the inevitable. 10. Backup Backup Backup -  Regularly backup any vital information you have on your laptop. Most information will be useless to potential thieves but may be extremely important to you personally or for the running of your business.
Laptop Security Same as desktop security  PLUS : Physical Security Use cable or docking-station lock if left overnight in office Use padded case or bag while travelling Never leave visible, unsecured, and unattended    (e.g. on a parked car seat, table at restaurant) Data Security Use whole-disk encryption Use privacy screen/filter if routinely working in public Disable wireless antenna when not in use Use VPN to connect to organizational network
Encryption
EFS
 
Decryption
Decrypting
Encryption Goals of cryptography Authentication Encryption Cryptographic Systems Conventional (Symmetric) Non-Conventional (Asymmetric)
Encryption Characteristics Data Modifications Transposition Substitution Keys Used Symmetric (same-key) Asymmetric (complimentary keys) Process Block cipher Stream cipher
Conventional Encryption Hello Hello KEY KEY $*(*&^YGCI&^*&Y
Conventional Problem How do I get the secret key to all parties securely?
Asymmetric Encryption
Asymmetric Risks Key Authenticity Verisign, Thawte, Other CAs Key Loss Brute Force Attack Man-in-the Middle Attack Social Engineering Verisign / Microsoft
Encryption Challenges Key Validity User Awareness Combination Techniques Encryption Methods
Encryption Trends Hard Disk Encryption Digital Signatures Steganography Other Encryptable Devices
Hard Disk Encryption Type of encryption File Encryption (EFS) Problems with multiple vulnerabilities Whole Drive Encryption Entire Drive Encryption Vendors WinMagic / PointSec / Guardian Samsung Momentus Technology Locks entire drive Makes troubleshooting difficult Demo
Hard Disk Encryption
 
Public-Key Cryptography - Encryption
Public-Key Cryptography - Authentication
Encryption Implementations IPSec VPN SSL SSH RADIUS E-mail - S/MIME or PGP Kerberos
VPN VPN’s are Attractive Targets Carry Sensitive Information Remote Access to Secure Networks Invisible to Detection Systems Increased Security in other areas
E-mail Most heavily used network based application Architecture independent Security has become a concern, two schemes have come to the forefront: PGP (Pretty Good Privacy) S/MIME (Secure/Multipurpose Internet Mail Exchange)
 
Combining Public Key &  Symmetric Key Encryption Plaintext Plaintext Hi Bob Alice Hi Bob Alice X2c67afGkz78 Session Key xaF4m 78dKm Alice Bob Ciphertext Hi Bob Alice Session  Key Encrypt 1. Message B's private key Decrypt 3. Session Key Decrypt 4. Message B's public key Encrypt 2. Session Key
Digital Signature with a Message Digest Plaintext Plaintext Alice Bob Hi Bob Alice Hi Bob Alice Hi Bob Alice Encrypted MD (“signature”) Unencrypted message =? A's public key Decrypt 1764890238 3. Decrypt Alice’s  Message Digest 1764890238 MD 4. Compute the MD MD 1764890238 Digest 1. Message  Digest A’s private key 2. Encrypt  the MD

More Related Content

PPTX
Computing remotely in a secure manner
PPTX
Secure Your Mobile Apps
PDF
Datashur Presentation pin flash drive - Kingfin
PDF
STH-TopFiveSecuritySteps-TipsSheet
PPT
Adult Internet Safety
PDF
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
PPTX
Protection
PPTX
Cyber pledge infoMagnum
Computing remotely in a secure manner
Secure Your Mobile Apps
Datashur Presentation pin flash drive - Kingfin
STH-TopFiveSecuritySteps-TipsSheet
Adult Internet Safety
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Protection
Cyber pledge infoMagnum

What's hot (19)

PPTX
Pure retail training non animation
PPTX
Pure retail training presentation
PPTX
Pure retail training presentation v2
PDF
IoT security
PDF
Introduction to Personal Privacy and Security
PDF
Mobile Penetration Testing: Episode 1 - The Forensic Menace
PPTX
Senior Technology Education
PPTX
online and offline computer security
PPTX
Computing on the Move - Mobile Security
PPT
Heartbleed
PDF
Securing blockchain assets
PPT
10 Things to help you be less dump at computers
PPTX
How to keep your laptop & mobile safe
PDF
Swisscom: Smart Homes & Security Risks
PPTX
VenkaSure Total Security+
PDF
Eranda me
PDF
Thailand Threat Telemetry 2016 by Fortinet Thailand
PDF
Understanding Keylogger
PPTX
Intel McAfee DeepSAFE Technology
Pure retail training non animation
Pure retail training presentation
Pure retail training presentation v2
IoT security
Introduction to Personal Privacy and Security
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Senior Technology Education
online and offline computer security
Computing on the Move - Mobile Security
Heartbleed
Securing blockchain assets
10 Things to help you be less dump at computers
How to keep your laptop & mobile safe
Swisscom: Smart Homes & Security Risks
VenkaSure Total Security+
Eranda me
Thailand Threat Telemetry 2016 by Fortinet Thailand
Understanding Keylogger
Intel McAfee DeepSAFE Technology
Ad

Similar to Module5 desktop-laptop-security-b (20)

PPTX
Laptop physical security
PPT
PPTX
Security Awareness 101
PDF
Laptop theft statistics
PPTX
Article
PDF
Laptop Computers Protecting Confidential Clt Info
PPTX
Security Awareness 9 10 09 V4 Protect Equip
PPTX
Basic_computerHygiene
PDF
Covid 19 guide how to secure your data while working away from office
PDF
Covid 19 guide how to secure your data while working away from office
PPTX
Laptop Security
PDF
Security Tips To Keep Your Laptop Safe
PPT
Computer Security
PDF
Ce hv6 module 46 securing laptop computers
PPTX
Day 3
PDF
Building a culture of security
PPTX
Intro to web 2.0 Security
PDF
Small Business Guide to Information Security
PPTX
Security Awareness 9-10-09 v5 Protect Equipment
PPT
Security in 10 slides
Laptop physical security
Security Awareness 101
Laptop theft statistics
Article
Laptop Computers Protecting Confidential Clt Info
Security Awareness 9 10 09 V4 Protect Equip
Basic_computerHygiene
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
Laptop Security
Security Tips To Keep Your Laptop Safe
Computer Security
Ce hv6 module 46 securing laptop computers
Day 3
Building a culture of security
Intro to web 2.0 Security
Small Business Guide to Information Security
Security Awareness 9-10-09 v5 Protect Equipment
Security in 10 slides
Ad

More from BbAOC (6)

PPT
Module7 wireless security-b
PPT
Module6 secure internet-b
PPT
Module0&1 intro-foundations-b
PPT
Module4 policies&procedures-b
PPT
Module 3 social engineering-b
PPT
Module 2 threats-b
Module7 wireless security-b
Module6 secure internet-b
Module0&1 intro-foundations-b
Module4 policies&procedures-b
Module 3 social engineering-b
Module 2 threats-b

Module5 desktop-laptop-security-b

  • 1. Module 5 Desktop/Laptop Security Module 5
  • 2. Module Objectives This module will familiarize you with the following: Encryption of Data Security Issues Loss of Laptop Remote connections (VPN) Issues Module 5
  • 3. Laptop Theft Laptop theft is rampant. You have a 1 in 10 chance your shiny new laptop will be stolen. And the real shocker: according to the FBI 97% are never recovered. And, the U.S. Department of Justice stated in a recent report that the FBI lost 160 laptops in a 44 month period ending in September of 2005. If FBI agents have trouble keeping track of their laptops, imagine what the ordinary person is facing. The statistics are pretty grim. A laptop is stolen every 53 seconds. Ouch! With stats like those you have to do everything in your power to avoid becoming a victim of laptop theft. If you keep valuable personal or business information on your laptop the consequences can be even more gruesome and devastating. For laptop hardware can be easily replaced, but your valuable information may be lost forever.
  • 4. Laptop Theft 10 Practical Ways to Protect Your Laptop Against Theft, Loss or Misplacement. 1. Keep Your Eyes On Your Laptop - Be aware of your laptop at all times especially when traveling. You wouldn't leave a Thousand Dollar Bill lying around unattended would you? So watch your laptop closely. 2. Don't Use An Obvious Laptop Bag - Carry your laptop in regular luggage that doesn't look like it has a laptop. Don't advertise your laptop to any would-be thieves. 3. Use Visual Locks And Restraints - Use visual locks and restraints to secure your laptop and to act as a deterrent. It won't fool hardened thieves but most will opt for a less secure laptop. For example, you can use a product like STOP, this system works by attaching a specially-made security plate to your laptop. This plate is barcoded and registered. It also carries a warning label letting would-be cyber thieves know that the ownership of your laptop is permanently monitored. 4. Use Passwords And Encryption - Use passwords and encryption to protect any sensitive information on your laptop. Again, unless you use very sophisticated encryption it won't fool the experienced hacker or hard-core digital thief but it will slow down and hinder the common criminal. Set a BIOS Password for your laptop. You have to take advantage of any security option that's on your laptop's OS or operating system. For those using Mac OS X you can encrypt your entire hard drive and set-up a master password in order to view it. Windows XP & Vista lets you encrypt files and folders. Just right click your data, select properties, open general tab and then advanced to check "Encrypt contents to secure data box". 5. Use Encryption - Vital files can be encrypted and it can even turn your USB thumb drive or iPod into a key for unlocking your hard drive. 6. Use Anti-Theft Software - Use anti-theft software that can track and locate your laptop or computer through the IP address once the stolen laptop is used to access the Internet. Use systems like "LoJack For Laptops". 7. Use Invisible Ultraviolet Markings - Use invisible ultraviolet markings so that any recovered stolen laptops will be clearly marked as yours to the police. Keeping track of your laptop's serial number is also a good idea and have this number stored in a different place other than on your laptop. 8. Try Remote Data Deletion - If you place important information on your laptop have a remotely controlled self-destruct solution in place. Then your highly sensitive information can be deleted remotely after your laptop is stolen. 9. Laptop Insurance - Create company policies for management of your company's laptops. Have set procedures in place for tracking and reporting of any laptops stolen or misplaced. Buying laptop insurance is another option you should consider especially if you are a student or do a lot of business traveling with your laptop in tow. Be prepared for the inevitable. 10. Backup Backup Backup - Regularly backup any vital information you have on your laptop. Most information will be useless to potential thieves but may be extremely important to you personally or for the running of your business.
  • 5. Laptop Security Same as desktop security PLUS : Physical Security Use cable or docking-station lock if left overnight in office Use padded case or bag while travelling Never leave visible, unsecured, and unattended (e.g. on a parked car seat, table at restaurant) Data Security Use whole-disk encryption Use privacy screen/filter if routinely working in public Disable wireless antenna when not in use Use VPN to connect to organizational network
  • 7. EFS
  • 8.  
  • 11. Encryption Goals of cryptography Authentication Encryption Cryptographic Systems Conventional (Symmetric) Non-Conventional (Asymmetric)
  • 12. Encryption Characteristics Data Modifications Transposition Substitution Keys Used Symmetric (same-key) Asymmetric (complimentary keys) Process Block cipher Stream cipher
  • 13. Conventional Encryption Hello Hello KEY KEY $*(*&^YGCI&^*&Y
  • 14. Conventional Problem How do I get the secret key to all parties securely?
  • 16. Asymmetric Risks Key Authenticity Verisign, Thawte, Other CAs Key Loss Brute Force Attack Man-in-the Middle Attack Social Engineering Verisign / Microsoft
  • 17. Encryption Challenges Key Validity User Awareness Combination Techniques Encryption Methods
  • 18. Encryption Trends Hard Disk Encryption Digital Signatures Steganography Other Encryptable Devices
  • 19. Hard Disk Encryption Type of encryption File Encryption (EFS) Problems with multiple vulnerabilities Whole Drive Encryption Entire Drive Encryption Vendors WinMagic / PointSec / Guardian Samsung Momentus Technology Locks entire drive Makes troubleshooting difficult Demo
  • 21.  
  • 23. Public-Key Cryptography - Authentication
  • 24. Encryption Implementations IPSec VPN SSL SSH RADIUS E-mail - S/MIME or PGP Kerberos
  • 25. VPN VPN’s are Attractive Targets Carry Sensitive Information Remote Access to Secure Networks Invisible to Detection Systems Increased Security in other areas
  • 26. E-mail Most heavily used network based application Architecture independent Security has become a concern, two schemes have come to the forefront: PGP (Pretty Good Privacy) S/MIME (Secure/Multipurpose Internet Mail Exchange)
  • 27.  
  • 28. Combining Public Key & Symmetric Key Encryption Plaintext Plaintext Hi Bob Alice Hi Bob Alice X2c67afGkz78 Session Key xaF4m 78dKm Alice Bob Ciphertext Hi Bob Alice Session Key Encrypt 1. Message B's private key Decrypt 3. Session Key Decrypt 4. Message B's public key Encrypt 2. Session Key
  • 29. Digital Signature with a Message Digest Plaintext Plaintext Alice Bob Hi Bob Alice Hi Bob Alice Hi Bob Alice Encrypted MD (“signature”) Unencrypted message =? A's public key Decrypt 1764890238 3. Decrypt Alice’s Message Digest 1764890238 MD 4. Compute the MD MD 1764890238 Digest 1. Message Digest A’s private key 2. Encrypt the MD