Security

1. Firewall 2. Anti-Malware 3. Anti-Spyware
 * 3 Security Software **

Data exists in three states]: 1) __stored__, 2) __transmitted__, 3) __processed__

The **__Network Interface Controller (NIC) __** is connected to a client. **__ Packet sniffers __** intercept and log traffic passing over a network. **__ Packet switching __** is a method that groups all transmitted data: **__ Transmission Control Protocol (TCP) __**__- __ corrects the errors and **__ Internet __ __Protocol (IP)__ ** finds the address.

**__ Tracert (tracing route __**) is used to show the route taken by packets across an IP network. **__ Time to Live (TTL) __** packets is a limit on the period of time or number of iterations or transmissions in a computer and computer network technology that a unit of data (a packet) can experience before it should be discarded. **__ Media Access Control (MAC) __** belongs to the hardware. IP Address belongs to the software.   ** 3 Characteristics of Information Protection (CIA) ** **1. ****Confidentiality ** · Authorization i.e login & password · Access Controls o Privileges : things you are allowed to do on the computer o Privilege escalation: coming in under a restriction set and gaining higher privileges (“pwn” or own) o Mandatory Access Control: To set up Control o Identity Based Access Controls (IBAC) : controls set for individual users o Role Based Access Controls (RBAC): Taking the identity controls and adding them to the group · Authenticate o Single Factor (i.e. only have a password) o Two factors (card + code) o Multiple Factors o Token cards o Dongles o Biometrics (finger prints, facial markers, retina scan) 2. **Integrity **: Making sure Information is correct · Entered Correctly · Processed Correctly (software bugs) · Stored Correctly · Not modified without authentication 3. **Availability ** : Information is where it’s needed so when it is needs you can get to it in the form you need it. · Redundancy: fail safe systems · Safe from DDS attacks

** 3 Stages ** 1. Prevent · loss of data/loss of services 2. Mitigate · Segments, backups, redundancy 3. Recover · Forensics