Btech It Security Fundamentals

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Higher Institute of Business Management and Republic of Cameroon

Technology (HIBMAT) Peace-Work-fatherland


BTECH
Course outline for IT Security Fundamentals
Course Instructor: Dr. Nde D Nguti
Tel: 67507 9262
email: dnguti@yahoo.co.uk
Lecture Schedule: Sarturday 07:00 – 09:00

Objectives
 Computer and Network Security Principles
 Network and Server Security
 Cryptography
 Authentication
 Authorization and Access Control
 Securing Network Transmission
 Remote Access and Wireless Security
 Server Roles and Security
 Protecting Against Malware
 Ongoing Security Management
 Fault Tolerance and Disaster Recovery
 Intrusion Detection and Response

Week Topic Detail


1 Computer and Network Security  Computer and Network Security Principles, intro-
Principles  duces basic terminology and concepts related to
security and gets
 the student thinking about why it is important to
take security mea-
 sures to protect a network and its resources. The
chapter begins with
 an overview of different types of attacks. Next it
discusses the three
 key aspects of security: confidentiality, integrity,
and authentication.
 From there it moves on to discuss risk analysis,
including identify-
 ing and ranking assets, threats, and vulnerabilities.
The chapter con-
 cludes with an overview of security policies and
standards.
Week Topic Detail
2 Network and Server Security  Network and Server Security, discusses some best
prac-
 tices and techniques for mitigating the risk to
servers on your net-
 work. It begins with a review of the Open Systems
Interconnection
 (OSI) model to ensure that students are familiar with
various proto-
 cols and the layers at which they operate. From
there it moves on to
 discuss some best practices when securing a
network: security by
 design and defense in depth. Next it presents some
techniques for
 reducing the attack surface of a server. The chapter
concludes with a
 look at perimeter security, including firewalls and
Network Address
 Translation (NAT).
3 Cryptography  Cryptography, introduces the fundamental principles
 of cryptography and discusses various ways it is
used to provide net-
 work and computer security. The chapter begins
with a brief history
 of cryptography and introduces the cast of
characters commonly used
 to describe cryptographic scenarios. Next it
discusses symmetric
 encryption and introduces the problem of how to
share symmetric
 keys. From there it moves on to discuss asymmetric
encryption and
 one of its common uses, digital signatures. Next it
looks at the role
 of hashes. The chapter then brings the cryptographic
techniques
 together to examine how they can be used to
provide confidentiality,
 integrity, and authentication. The chapter concludes
with an overview
 of public key infrastructure (PKI), using
Microsoft®’s Certificate Ser-
 vices as an example of how you can implement a
PKI.
Week Topic Detail
4 Authentication  Authentication, discusses the importance of
authenti-
 cation and how credentials can be used to prove the
identity of a user
 or computer. The student is first introduced to some
key authentica-
 tion and concepts, including the entities that must be
authenticated,
 single sign-on, and mutual authentication. Next the
chapter examines
 the types of credentials that can be used to prove the
identity of a
 user or computer. The chapter then looks at some
protocols used for
 network authentication. The chapter concludes with
a look at best
 practices, including using strong passwords and
limiting the times
 during which or locations from which a user can log
on
5 Authorization and Access Control  Authorization and Access Control, introduces
students
 to concepts and procedures related to limiting who
can access
 resources on a network. The chapter begins by
discussing types of
 access control that have been used historically and
that are used today,
 including mandatory access control (MAC),
discretionary access con-
 trol (DAC), and role-based access control (RBAC).
Next it examines
 how access control is managed on a Windows®
network. The chapter
 concludes with a look at access control in a Unix®
or Linux envi-
 ronment.
Week Topic Detail
6 Securing Network Transmission  Securing Network Transmission, focuses on
securing net-
 work perimeters and data in transit on the network.
The chapter begins
 with a look at some attacks that target network
services and packets on
 the network. Next it examines some strategies for
segmenting a network
 and securing network perimeters. It concludes with
a look at some pro-
 tocols that can be used to encrypt data on the
network, including Secure
 Sockets Layer (SSL), Transport Layer Security
(TLS), and IP security
 (IPsec).
7 Remote Access and Wireless Security  Remote Access and Wireless Security, deals with
 security considerations for a network that extends
past the tradi-
 tional WAN. It begins with a discussion of the
dangers of modems
 and how to secure a network that allows dial-in
access. Next it
 looks at virtual private networks (VPNs). From
there it moves on
 to discuss how Remote Authentication Dial-in User
Service
 (RADIUS) or Terminal Access Controller Access
Control System
 (TACACS) can be used to centralize authentication
for remote
 access clients. The chapter concludes by examining
the threats
 introduced through wireless networking and steps
you can take to
 mitigate those threats.
Week Topic Detail
8 Server Roles and Security  Server Roles and Security, examines the different
roles
 servers play on a network and discusses ways to
mitigate the threats
 associated with specific server roles. The chapter
begins by dis-
 cussing establishing a security baseline for the
servers on a network.
 Next it examines risks specific to infrastructure
servers, including
 domain name system (DNS), Dynamic Host
Configuration Protocol
 (DHCP), and Windows Internet Name Service
(WINS) servers, and
 how to mitigate them. It then discusses steps to take
to secure
 domain controllers. Next it looks at considerations
for securing file
 and print servers. The chapter concludes with a look
at security
 issues specific to application servers, such as web
and database
 servers.
9 Protecting Against Malware  Protecting Against Malware, looks at various types
of
 malware and steps to take to protect computers
against viruses,
 worms, spyware, and other types of malicious code.
The chapter
 begins by defining the types of malware that
typically pose a threat
 to computers. Next it discusses anti-malware
programs and the
 importance of user education in preventing attacks.
The chapter then
 discusses issues related to securely browsing web
sites. The chapter
 concludes with a look at risks specific to email and
how to mitigate
 them.
Week Topic Detail
10 Ongoing Security Management  Ongoing Security Management, examines some key
 considerations for keeping a network secure. It
begins with a discussion of strategies for ensuring
that operating systems and applications are
 kept up-to-date with the latest security patches.
Next, it discusses the
 importance of auditing and ongoing monitoring.
Finally, the chapter
 examines strategies for both in-band and out-of-
band remote man-
 agement.
11 Fault Tolerance and Disaster  Disaster Recovery and Fault Tolerance, examines
Recovery the
 importance of planning for the worst. It begins by
discussing three
 types of plans a company should have in place to
define recovery pro-
 cedures when a disaster or attack occurs. Next, it
covers the impor-
 tance of backups. The chapter concludes with a look
at fault tolerance
 technologies, include Redundant Array of
Independent Disks (RAID)
 and failover configurations.
12 Intrusion Detection and Response  Intrusion Detection and Forensics, introduces stu-
 dents to techniques used to detect a potential attack
and analyze the
 nature of an attack. The chapter begins with a look
at intrusion
 detection systems (IDS) and how they can be used
to provide
 advance warning of an impending attack. Next, it
looks at how hon-
 eypots can be used to analyze an attacker’s methods.
The chapter
 concludes with a look at forensics, including
procedures for pre-
 serving evidence and investigating the extent and
methods used in
 an attack.

Books: Network Security Fundamentals by:


Eric Cole, Ronald L. Krutz, James W. Conley, Brian Reisman, Mitch Ruebush, and Dieter Gollmann
Soft copy available

You might also like