Question

In: Computer Science

1. List the steps for securing a client device 2. Define application security 3. Explain how...

1. List the steps for securing a client device

2. Define application security

3. Explain how physical security can be used for protection

Book to use: Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition. (Chapter 9)

PLEASE ANSWER ALL QUESTIONS!!!

Solutions

Expert Solution

1. List the steps for securing a client device.

There are different steps for securing a client device.Whether you use your computer primarily for work tasks or personal use or both, it’s highly likely you want to keep it and its contents safe and secure. When it comes to computer security, a broad range of threats should be considered, including malicious attacks by hackers and people physically stealing your computer and the information it houses. So we need to take more care in using them.

The measures we need to keep the information safe will depend on several factors. For example, if wehave particularly sensitive information stored, then we might be willing to invest more time and resources protecting it. Similarly, if we think there’s a particularly high risk of someone wanting to hack into the system or steal the computer, we may want to go to extra lengths.

We can take different steps like use of strong password/Biometrics, Utilize VPN, Encrypt th device, Enable a firewall, Install an antivirus application, Update to the latest software, avoid turning on autofill, Logout etc...

Major mobile device firmware companies, such as Google Android and Apples iOS, roll out new updates from time to time. Most of those updates act as a security patch to known vulnerabilities on your device. You might set up updates to be manual or automatic.Another thing to watch out for is a fake update. These might be used by hackers to persuade you to click a link or enter credentials. You can avoid falling prey to these by doing a little research into the latest updates from the software company. Simply search for the latest version to see if the alert you received makes sense. Alternatively, you can plug the popup text in a search engine to find out if it’s a known scam.

The next thing to consider is enabling a firewall. A firewall acts as a barrier between your computer or network and the internet. It effectively closes the computer ports that prevent communication with your device. This protects your computer by stopping threats from entering the system and spreading between devices. It can also help prevent your data leaving your computer.

If your computer ports are open, anything coming into them could be processed. This is bad if it’s a malicious program sent by a hacker. While it’s possible to close ports manually, a firewall acts as a simple defence to close all ports. The firewall will open the ports only to trusted applications and external devices on an as needed basis.

The files you download and the apps you install on your mobile device might be packed with malicious code. Once launched, this code could send your data to hackers, thereby making you unsecured and robbing you of your privacy. To avoid that, installing a reputable antivirus application will guarantee your security.

Some antivirus applications also offer more functionalities, such as erasing your data if you lose your mobile device, tracking and blocking unknown callers who might be a threat, and telling you which applications are not safe.

In addition, they offer to clear your browsing history and delete cookies. Cookies are small software tokens that store your login information that might be leaked if someone malicious gets to them.

If you’re not sure about the security status of the network to which you’re connected, using VPN (Virtual Private Network) client is mandatory. A VPN will enable you to connect to a network securely. At the same time, any browsing activity you do on the public Wi-Fi will be shielded from prying eyes.

It is also useful when accessing sites that are less secure. Non-HTTPS sites are visible to anyone who knows how to use networking and vulnerability tools. These sites are prone to MITM (Man-in-the-middle) attacks, which pave a way to eavesdropping and password sniffing. You really need to have a new mindset when it comes to fighting cybercrime.

Teleworkers' PCs, laptops and handhelds should have the same local security controls as client devices for non-telework employees. For instance, remote devices should receive the same application and security devices as those found in government facilities. They should employ antivirus software and personal firewalls. Still, greater security steps must be taken because threats are greater outside government facilities than from within.

"For example," the NIST guide states, "if a personal firewall on a telework client device has a single policy for all environments, then it is likely to be too restrictive in some situations and not restrictive enough in others. Whenever possible, organizations should use personal firewalls capable of supporting multiple policies for their telework client devices and configure the firewalls properly for the enterprise environment and an external environment, at a minimum."

Most web-connected software that you install on your system requires login credentials. The most important thing here is not to use the same password across all applications. This makes it far too easy for someone to hack into all of your accounts and possibly steal your identity.

2. Define application security

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. It prevents data or code within the app from being stolen or hijacked.It encompasses measures taken to improve the security of an application.

3. Explain how physical security can be used for protection

Physical security refers to the protection of personnel, hardware, software, networks, data information from terrorism, vandalism, theft, man-made catastrophes, natural disasters and accidental damage.There are different methods ensure physical security like using passwor protection, back up files, use tracking software to help get your stolen device back, encrypt sensitive data etc...

While it sounds obvious, if anyone steals your device they will have to defeat your password to get at your data and accounts, which will significantly slow attackers. Although it is not impossible to defeat password protection on a digital device, it adds a useful layer of protection, buying you time to locate and recover the device.

Alarm systems can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including perimeter sensors, motion sensors, contact sensors, and glass break detectors.[11]

However, alarms are only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system.

Even if you can’t recover a stolen device that does not mean you have to lose all your information and software. Regular backups are the ultimate defense against theft of your files. There are plenty of options for backup these days including online backup.

Getting your stolen device back is not impossible, particularly if the device itself can tell you where it is and you can communicate with it using a sort of “remote control” via SMS or other methods. You may even be able to communicate with the person who has it.

These security measures should be introduced in accordance with a broader plan designed to protect your equipment, resources and any other assets within a production facility or office space. All these measures, working in tandem, make up your physical security strategy.


Related Solutions

Define and discuss Web Site Security and also Define and discuss Web Application Security.
Define and discuss Web Site Security and also Define and discuss Web Application Security.
1.15. Errors inherent in the device itself are called? 1) Application error 2) Characteristic error 3)...
1.15. Errors inherent in the device itself are called? 1) Application error 2) Characteristic error 3) Dynamic error 4) Sensitivity error
1. Define and explain attorney-client privilege. 2.Discuss accountant-client privilege and explain in which circumstances this privilege...
1. Define and explain attorney-client privilege. 2.Discuss accountant-client privilege and explain in which circumstances this privilege is honored. 3. Explain Benford’s law and in what types of situations this technique is used. 4. Evaluate how computer evidence must be handled to be admissible in court. Be specific. 5. Analyze the validity of this statement: “Each state has a licensing board for forensic document examiners.” 6. Explain how forensic accountants can use the so-called COFEE device. Be specific.
Define and discuss the following decision-making steps 1. Define the problem. 2. Identify the alternatives. 3....
Define and discuss the following decision-making steps 1. Define the problem. 2. Identify the alternatives. 3. Determine the criteria. 4. Evaluate the alternatives. 5. Choose an alternative.
explain Securing a Prior authorization and discuss the process steps involved in the Medical assistant or...
explain Securing a Prior authorization and discuss the process steps involved in the Medical assistant or other health care provider with the task. Respond to two students who posted a discussion on a topic different from the one that you selected. Responses must be substantial. Read all discussion.
1. Explain in a list of steps how the development of pesticide resistance in agricultural pests...
1. Explain in a list of steps how the development of pesticide resistance in agricultural pests (weeds, for example) occurs. List all the steps in the process, showing how this is an example of evolution by natural selection. Be as thorough and detailed as possible. 2.Briefly propose a policy or a practice that would reduce the problem of pesticide resistance (and still allow the use of pesticides). 3. Briefly (in 1-3 sentences) explain in biological evolutionary terms, why the policy...
find articles that deal with application or mobile device security and those types of attacks. You...
find articles that deal with application or mobile device security and those types of attacks. You should have a large depository of these kinds of articles, especially in the mobile device security arena. Where are the biggest issues?
1. what specific steps of muscle contraction cycle cost energy? list relevant steps 2. how are...
1. what specific steps of muscle contraction cycle cost energy? list relevant steps 2. how are the processes leading to muscle cramps associated with intense activity in rigor mortis related?
1. List and define 10 responsibilities of a Project Manager 2. List and define the characteristics...
1. List and define 10 responsibilities of a Project Manager 2. List and define the characteristics of a Project Management 3. Explain the concept of work break down structure(WBS). (10 points)
Define, explain use/why and list benefits and disadvatages of Convertible Security, Warrants, and Derivatives
Define, explain use/why and list benefits and disadvatages of Convertible Security, Warrants, and Derivatives
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT