PerSEC_OVERVIEW_v1

advertisement

1

©2013-2015, Edward J. Glantz

Use the PerSEC_TEMPLATE document to track results, before submitting (copy/paste) text into Angel as directed.

PERSONAL COMPUTER SECURITY

It is inevitable that, at some point, all students will experience either an attack or system failure resulting in loss of data and access. For example, most hard drives carry only a two-year warranty. Other vulnerabilities include fire, theft, loss, and accidents. As one student who lost everything commented,

"this can really happen to anyone."

Thus, a system catastrophe is not a question of "if," but "when." Risk control strategies can help students stay operational, while protecting privacy and data.

From this point forward, no crisis email to any faculty that an assignment was lost due to a computer crash!

LEARNING OBJECTIVES

Upon completing this exercise, students should be able to:

1.

Analyze system components, including system hardware, operating system, applications, and data

2.

Formulate a disaster recovery plan for a complete hard drive failure

3.

Formulate a business continuity strategy to continuously archive critical data files

4.

Put into action an online security plan

©2013-2015, Edward J. Glantz

Refer to the PerSEC_OVERVIEW document for supporting tables and material

2

Working individually or (optionally) with ONE partner, safely save work in this template until MEMBER1 submits (copy/paste) answers into ANGEL.

SUBMIT

Complete the table below with names and email IDs for one submitter OR optionally with one partner (if no partner, type “n/a” in both partner cells)

FIRST & LASTNAME PSU Email ID (xyz123)

MEMBER1

[submitter]

MEMBER2

[optional partner]

REMINDER: If optional partner, Member2 must confirm team membership by completing separate form in Angel

NOTES:

1.

Complete Angel tutorial to practice copy/paste from Word to Angel to retain formatting.

2.

Do NOT copy/paste question with your response into

Angel. Only paste your response

3.

Follow tips on “completeness” such as length of answer.

Also, if you are not currently using a control, be sure to identify one to describe as “planned” (i.e., “n/a” is not a response!).

©2013-2015, Edward J. Glantz

SUBMIT

SYSTEM/HARDWARE

Manufacturer (Dell, Apple, etc.)

Model/Model Number (“self” if home made)

Processor (e.g., 3.06 GHz Intel Core 2 Duo)

RAM Memory (e.g., 4 GB 800 MHz DDR2 SDRAM)

Graphics Video Controller (e.g., NVIDIA GeForce

8800 GS 512 MB)

Hard Drive Storage (e.g., 2 TB SATA, 500GB 5400

RPM)

NETWORK

Wired Ethernet Adaptor (if present, e.g., Marvell

Yukon Gigabit Adapter)

Wireless Network Adaptor (if present, e.g.,

Airport Extreme, 802.11 a/b/g/n)

Public IP Address

(only display digits following last two dots e.g.,

**.***.121.239)

3

©2013-2015, Edward J. Glantz

In this section, you will describe hardware and software system components.

Although the details of these components are often taken for granted, awareness is necessary to develop a system security plan that adjusts vulnerabilities and anticipates replacement.

SUBMIT

Operating System (e.g., Windows 8.1, OS X

10.8.2)

OPERATING SYSTEM

Operating System Bits (e.g., 32, 64)

Application Name (e.g.,

Mozilla Firefox v.7.0.1)

1.

2.

3.

APPLICATIONS (THREE FREQUENTLY USED)

Installed Path (e.g., C:\Program Files\Mozilla

Firefox, Mac24/Applications/Firefox)

License Type (e.g.,

Commercial, Freeware, Open

Source, Shareware)

APPLICATION DATA (TWO LARGEST)

Data Path (e.g., C:\Documents\My Pictures,

Mac24/Documents/MyMusic)

Data Size (e.g., 2 GB) Data Type (e.g., music, photos, Word documents)

1.

2.

4

5

©2013-2015, Edward J. Glantz

Formulate a disaster recovery plan in response to a complete hard drive failure.

Recovering from a complete hard drive crash, including a malware attack, is complicated because the operating system, applications, and data must be recovered and reinstalled, and the hardware possibly replaced.

A disaster recovery plan anticipates unplanned interruption of normal business processes

(hardware, software, data, networks, and people), and is a subset of business continuity planning. This plan includes restoring the operating system, applications, and data that resided on the failed drive.

SUBMIT

A.

In one or two sentences, describe how frequently your computer’s files will be/is archived (i.e., describe the longest period of time you are willing to lose data, in the event of a complete storage drive failure). Explain why you feel this period of vulnerability between backups is acceptable.

For example, "If my storage drive was to fail, I would be willing to lose ____________ (e.g., hours, days, weeks) of data and applications, including the operating system. I believe this is reasonable because _______________.”

B.

In two or three sentences, describe a backup software brand and process you would use/are using, and cost (examples at http://download.cnet.com). For example: "Since I use a PC, my backup software is ___________. I would set this to run backups every ________ (e.g., hours, days, weeks). The cost for this is ________. My storage drive backup is/will be located__________." (i.e., note that storage drive backup should not be co-located with the original drive)

C.

In one or two sentences, describe the process you would use/are using to recover your applications (e.g., MS Office) and operating system in the event of storage drive failure. Explain

why you selected this process (e.g., price, size, speed, warranty, rating). For example: "If my application and operating system files were destroyed, I would restore them by __________ (i.e., noting where original software are stored/obtained). I chose this method because _________."

6

©2013-2015, Edward J. Glantz

Formulate a business continuity strategy to continuously archive critical data files, creating a fault tolerance process for critical files. This process can be combined with the previous disaster recovery plan to prevent any data loss of important files.

SUBMIT

A.

List whether your solution involves local or cloud storage, or both. For example: "My critical data backups are located __________." (Note: backups may either be located on a separate drive adjacent to your system, or in a remote location such as PSU PASS Space, Dropbox, iCloud, Flickr, etc.)

B.

Describe in one or two brief paragraphs, each four to five sentences in length, the strategy you will use/are using to protect critical files used for our course assignments. For example: "If my system were to fail, my plan to continue working is __________." "If my DATA files on my system were to be destroyed, I would replace them by __________."

7

©2013-2015, Edward J. Glantz

SUBMIT

1.

Security Tools: Please list the Anti-Spyware, Anti-Virus, and Firewall software you would use/ are using.

For example:

 Anti-spyware: __________________

 Anti-Virus: __________________

 Firewall: __________________

2.

Security Tool Configuration: Describe, in at least one paragraph, current or planned online security practices. Choose ONE question below, and include, followed by your answer:

 How often do you run, or should you run, full scans compared to partial scans?

 Describe customized settings used on your tools. If you don't have any, what are some customized settings that you could look into?

 Does your firewall block specific content? If not, what specific content do you think should be blocked? What content could be hazardous to your system?

 Do you receive alerts when browsing potentially hazardous sites? If not, what sites do you think would be potentially hazardous? Do you plan to set up an alert system for your browser?

©2013-2015, Edward J. Glantz

SUBMIT

3.

Tool Update Source: Describe, in at least one paragraph, current or planned online security practices. Choose ONE question below, and include, followed by your answer:

 Do you download updates from the product's Web site or directly from the application?

 What process is used to update tools (manual, automatic updates, update when alerted, etc.)?

Do you think your update process is best? Why or why not?

 If you do not use any updates, research the benefits of updating tools, and provide the links.

8

SUBMIT

4.

Tool Upgrades: Describe, in at least one paragraph, current or planned online security practices.

Choose ONE question below, and include, followed by your answer:

 How often do you upgrade your tools? Is this frequent enough?

 Research how often you should upgrade your tools, and provide the links.

SUBMIT

5.

Tool Support: Describe, in at least one paragraph, current or planned online security practices.

Choose ONE question below, and include, followed by your answer:

 What Web sites provide effective tool support? Provide the links.

 Research successful tutorials for tool support, and provide the links.

 Who should you contact for customer support for the tools on your system?

©2013-2015, Edward J. Glantz

APPENDIX

TIPS: IDENTIFYING CURRENT SYSTEM COMPONENTS

Windows and MAC tips to find:

 System Components

 Public IP Address

 Operating System Bits

GLOSSARY OF TERMS

Terms used in this assignment, including:

 Software License (Freeware, Shareware, Commercial)

 Business Continuity

 Risk Management

9

©2013-2015, Edward J. Glantz

Windows System information video

[1] http://www.youtube.com/watch?v=SVp9wbn_E-4&feature=player_embedded [2]

Follow link for the video at the bottom of the page if you need help with steps 1 – 5.

1.

Navigate to the Start/Windows button

2.

Go to “All Programs”

3.

Go to “Accessories”

4.

Go to “System Tools”

5.

Go to “System Information”

6.

From the main screen (Figure 2), you should be able to determine:

 Operating System (OS Name)

 Manufacturer

 Model

 Processor

 RAM

10

Figure 2 - Main Screen of System Information

©2013-2015, Edward J. Glantz

7.

Go to Components -> Display in order to find out your Video Interface (Graphics Card) (Figure 3)

11


 Figure 3 – Graphics card Name

8.

Go to Components -> Sound Device in order to find your Audio Interface (Sound Card) (Figure 4)


 Figure 4 – Audio Card Name

12

©2013-2015, Edward J. Glantz

9.

Go to Components -> Network -> Adapter. You will be looking for the word “Ethernet” under the

“Adapter Type” line. This may be in the list multiple times, however the ones that you are looking

10.

for will have either the name of an adapter (for hard-lined internet), or for the wireless adapter it will have the words wireless in product type. (Figure 5)


 Figure 5 - Network Adapter

13

©2013-2015, Edward J. Glantz

OPTIONAL: WINDOWS SYSTEM INFORMATION USING BELARC ADVISOR

Belarc Advisor will audit your computing system and display it for you through your Internet browser. It is compatible with Windows 7, Vista, and XP. You can download the program at http://www.belarc.com/free_download.html

[3]. All of the information created by Belarc Advisor is kept private and is not relayed over the Internet to any third party services.

Follow these steps to find your hardware information:

1.

Follow the link above to download and install Belarc Advisor

2.

Follow the steps and allow Belarc Advisor to create a profile of your system

3.

Your Operating System, System Model, and Processor will be the first line under their respective sections.

4.

The Display section will be your Graphics Card.

5.

The Multimedia section will be your Audio Card.

6.

RAM information will be found under Memory Modules.

7.

Under the Communications section (Figure 6) you can find both your hard line network card and wireless network card (if your computer is capable of wireless). Your hard line network card should have “Ethernet Controller” in the name. Your wireless card will have “Wireless” in its name.

Figure 6 - Network Card Information

©2013-2015, Edward J. Glantz

MAC SYSTEM INFORMATION

-

video


 [4] http://www.youtube.com/watch?v=W-XOR_v_nq8 
 [4]

1.

Click on the “Apple Icon”

2.

Go to “About this MAC” (Figure 7). In bold letters, under the Apple logo will be the Operating System.

14

Figure 7 - "About this MAC" Screen with MAC Operation System

3.

Now click “More info…” and you will be taken to a screen with the title of “Hardware Overview” (Figure

10) This will give you:

 Model

 Processor

 Memory (RAM)

Figure 8 - MAC Model, Processor, and Memory

©2013-2015, Edward J. Glantz

4.

Go to Hardware -> Audio in order to find your Audio Interface (Sound Card), which will be in bold letters at the top (Figure 9).

15

Figure 9 - Audio Card

5.

Go to Hardware ->Graphics/Display in order to find your Video Interface (Graphics Card), which will be in bold letters at the top (Figure 10).

Figure 10 - Graphics Card

6.

Go to Network -> ------ Card (In this example there is an AirPort Card, however your system may differ).

The information for your card will be under “Card Type” (Figure 11)

Figure 11 - Network Card

OPTIONAL: MAC SYSTEM INFORMATION USING APPLE TECH SPECS

Enter your Mac’s serial number in the “ Search Tech Specs ” field at http://support.apple.com/specs [5] and press Enter to display detailed technical specifications for your machine.

16

©2013-2015, Edward J. Glantz

PUBLIC INTERNET PROTOCOL (IP) ADDRESS

Similar to a unique address for mailing letters, every device connected to the Internet must have a unique

IP address to send email and download content from servers. For the Internet to function, packets can only be exchanged with the specific device making the request.

Attackers can also take advantage of your unique IP address to probe vulnerable Internet ports on your computer. Thus, many computers hide the true IP address by having a firewall or proxy server use network address translation (NAT) to mask the “true” IP address with a “public” IP address.

For our exercise, identify your “public” IP Address by simply typing “IP ADDRESS” into Google. You may also use web tools (Figure 12), such as What is my IP at http://whatismyip.com [6].

Figure 12 – Public IP Address

As a separate exercise, you may also evaluate your system to discover its true IP address in the operating system’s Control Panel. In addition, you may test your system for open vulnerable Internet ports (File

Sharing, Common Ports, All Service Ports, Messenger Spam, and Browser Headings), such as ShieldsUP!

at http://grc.com [7]. To read more about port probing see PC Magazine’s Probe My Ports!

at http://bit.ly/V7upbL [8]

OPERATING SYSTEM BITS

Users often need to know if the operating system is 32 or 64-bit for software compliance. See tips to

Determine 64-bit Compliance : http://www.stata.com/support/faqs/windows/64-bit-compliance/ [9]

LINK LIST

[1] http://www.youtube.com/watch?v=SVp9wbn_E-4&feature=player_embedded 


[2] http://www.youtube.com/watch?v=SVp9wbn_E-4&feature=player_embedded

[3] http://www.belarc.com/free_download.html

[4] http://www.youtube.com/watch?v=W-XOR_v_nq8 


[5] http://support.apple.com/specs

[6] http://whatismyip.com

[7] http://grc.com

[8] http://www.pcmag.com/article2/0,2817,1231761,00.asp

©2013-2015, Edward J. Glantz

[9] http://www.stata.com/support/faqs/windows/64-bit-compliance/

17

18

©2013-2015, Edward J. Glantz

GLOSSARY

Term

Business

Continuity Plan

(BCP)

Commercial

Software

Data

Disaster-

Recovery (DR)

Fault Tolerance

Freeware

Software

Hardware

IP Address

Open Source

Software

Operating

System

RAM

Risk

Management

InfoSec SDLC

Shareware

Software

Software

Definition

Process of developing advanced arrangements and procedures that enable an organization to respond to an event such that mission critical services continue with acceptable levels of interruption or essential change

Copyrighted application licensed to users at a price (i.e. “Payware”), e.g., MS Office

Personal files a user creates using an application, or uses with an application (i.e. Word documents, MP3 files, photos, etc.)

Unplanned interruption of normal business processes (hardware, software, data, networks and people); subset of Business Continuity

System or process design allowing an operation to continue, possibly at a reduced level, when part of the system fails.

Copyrighted application licensed to users at no cost or optional donation, e.g.,

Macrium

Reflect Free,

Spybot - Search & Destroy, Apple iTunes, Google Picasa, Google Chrome

Physical equipment directly involved in the performance of data-processing or communications functions. Includes memory (RAM), CPU, hard drives, CD/ DVD drives, etc.

A unique numeric network identifier for each computing device connected to a network.

Software application licensed to users at no cost with source code available, e.g., Apache

OpenOffice, Google Chromium, Mozilla Firefox, Linux

Hardware-specific software layer (i.e. Windows 7, Mac OS 10.6.3, etc.) that runs between computer applications and computer hardware. Allows a user to easily access hardware from an application, such as a printer when using MS Word.

Stands for random access memory, one of the fastest primary storage devices and best known hardware forms of computer memory

Process of identifying vulnerabilities in an information system and taking carefully reasoned steps to ensure Confidentiality, Integrity, and Availability (i.e. CIA) of all system components.

Information Security System Development Life Cycle is a progressive methodology addressing the security of information assets in a system.

Copyrighted application licensed to users at a modest price, often including either a free trial period, or try-before-you-buy version with reduced features, e.g., Carbon Copy Cloner for Mac

Programs designed to perform specific tasks. Major software categories include 1)

Applications (i.e. web browsing, word processing, etc.), and 2) Operating Systems.

Download