Friday, 15 September 2017

COMPUTER NETWORK SECURITY PART 4

COMPUTER NETWORK SECURITY PART 4

Back again in the network security article we just discussed for part 4

IV. SECURING INFORMATION SYSTEMS
In general, security can be categorized into two types: prevention (preventive) and treatment (recovery). Prevention efforts are done so that the information system does not have a security hole, while the treatment efforts are done if the security hole has been exploited. Setting Access (Access Control). One common way used to secure information is to regulate access to information through the mechanism of "authentication" and "access control".
Implementation of this mechanism is by using "password". Unused Service Closing Often systems (hardware and / or software) are provided with some services running as default. For example, in UNIX systems the following services are often installed from the vendor: finger, telnet, ftp, smtp, pop, echo, and so on. Not all services are needed. To secure the system, unnecessary services on the server (computer) should be turned off. Install Protection. To further enhance the security of information systems, protection can be added. This protection can be a filter (in general) and more specifically a firewall. Filters can be used to filter e-mail, information, access, or even within the packet level.FirewallFirewall is a device that is placed between the Internet and the internal network.Information coming out or incoming must go through this firewall. The main purpose of a firewall is to keep (prevent) access to (unauthorized access) from unauthorized persons. Monitoring of attacks.

Monitoring system (monitoring system) is used to determine the presence of uninvited guests (intruder) or the attack (attack). Another name of this system is the "intruder detection system" (IDS). This system can notify administrators via e-mail or through other mechanisms such as through pager. System integrity monitor The system integrity monitor is run periodically to test the system integrity. One example of a program commonly used in UNIX systems is the Tripwire program. The Tripwire package program can be used to monitor changes to the file. Audit: Observing Logs Files All (most) system usage events can be recorded in files that are usually called "logfile" or "log" only. This log file is useful for observing the deviations that occur. Failure to log into the system (login), for example, is stored in the log file. For that the administrators are required to diligently maintain and analyze log files ownedBackup routinelyBut often intruder guests into the system and damage the system by removing the files that can be found. If this intruder successfully breaks down the system and logs in as a super administrator (administrator), then it is possible he can delete the entire file. Use of Encryption to increase securityOne satau mechanism to improve security is to use encryption technology.
The data you submit is modified in such a way that it is not easily tapped. Many services on the Internet still use "plain text" for authentication, such as the use of a userid and password pair. This information can be viewed easily by a bug or sniffer program. WWW Server Security The WWW server security is usually an administrator issue. By installing a WWW server on your system, you open access (though limited) to outsiders. If your server is connected to the Internet and your WWW server is prepared for the public, then you should be more careful because you open access doors around the world. Restrict access through Access Control As a provider of information (in the form of files), it is often desirable to restrict access . For example, it is desirable that only certain people can access certain files (information).In principle this is the problem of access control.Protection of pages by using passwordOne of the mechanisms of regulating access is to use the userid pairs (user identification) and password. For Apache-based Web servers [6], access to a page (or set of files located in a directory on a Unix system) can be set using the ".htaccess" file.

 Knowing the Server Type Information about the web server used can be exploited by the destroyer for launches attacks according to the server type and operating system used. CGICommon Gateway Interface (CGI) Program Security is used to connect WWW systems with other software on the web server.The existence of CGI allows an interactive relationship between the user and the web server. WWW client security In the previous section discussed issues related to the WWW server. In this section will be discussed issues related to security of WWW client, that is user (visitor) usual. Security on the client side is usually associated with privacy issues and the insertion of viruses or Trojan horses.

Set access control
One common way to secure information is to manage access to information through "authentication" and "access control" mechanisms.Implementation of this mechanism, among others, by using "password".

Changing User Properties
Click the Properties button to view the properties of the user. There are 2 main options in addition to the 8 group members selections:

1. Standard User (Power User)
Users can change some system files, install programs that have no effect on windows system files

2. Restricted User (User Groups)
Users can use the computer and save the document but can not install the program and change the windows system settings.

User Settings (continued)
Passwords and .NET Passwords are used as a facility to manage user password data that can use computer and email. Advanced user management is used to manage user groups and users in more detail.

Password creation criteria
- Do not use login names, first or last names and their variations and names of spouses or  children.
- Do not use other easily available information about you like No tel, Date of Birth.
- Use a password that is a combination of capital letters and lowercase letters and numbers.
- Use special "32 ALT characters", typed by holding the Alt key while typing numbers between 128      and 255 on the numeric keypad with the Num Lock on indicator.
- Use easy typed passwords, without looking at the keyboard.

Closes unused service
- Often systems (hardware and / or software) are provided with some services run as default. for           example, on UNIX systems the following services are often installed from the vendor: finger, telnet,   ftp, smtp, pop, echo, and so on.
- The service is not all needed. To secure the system, unnecessary services on the server (computer)        should be turned off.

Installing Protection
- To further improve the security of information systems, protection can be added. This protection can   be a filter (in general) and more specifically a firewall. Filters can be used to filter e-mail,  information, access, or even packet level.
- For example, on UNIX systems there is a "tcpwrapper" program package that can be used to restrict access to certain services or applications. For example, a service for "telnet" may be restricted to systems that have a certain IP number, or have a specific domain.
- While firewalls can be used to filter generally.
Disqus Comments