Time
56 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

Host Security Today's lesson covers Host Security and the tools and techniques used to manage security for host resources on the network. You'll learn about Anti-malware, Anti-spam, pop up blockers, and other tools such as host-based firewalls, how they work, how they should be configured to mitigate these types of network intrusion attacks. [toggle_content title="Transcript"] coming soon... [/toggle_content]

Video Transcription

00:04
Welcome to Cyber Radar. I t. My name is Jonah Lake, a subject matter expert for the security plus certification. Today we're dealing with section four points to
00:14
this takes care of
00:17
carry out appropriate procedures to establish horse security. We started by looking at anti malware.
00:24
Malicious software would always find their way to our computers. Whether we connect online or we share media with other uses. You could share USB devices, floppy devices, external hard drives on. There's a possibility your system gets infected. So how do you correct that we use anti malware?
00:42
I'm time I'll read. Will take care of
00:45
viruses. Warms on Trojans. These software are being especially designed toe. Find the specific signatures
00:55
off the mall where the warms Trojans or viruses,
01:00
Um, the vendors that produces anti malware. They've done their research to find the specific signature so that the software given to users could be suffering. Install on host systems could
01:14
truck
01:15
the malware,
01:15
identify them on, um,
01:19
deactivate the malware, so viruses warms and trojans will be taken care off. Using anti malware, we must ensure we regularly updated the signature files, the definition files. Otherwise, the anti malware is not effective for anti spam organizations will use spam filters
01:40
to ensure that
01:41
on solicited messages, e mails are prevented from getting to the user's inbox. This way we're able to prevent or limits
01:49
congesting the user's inbox by putting in the fuel cells that can identify
01:57
emails that I've bean
01:59
flood by the users so that subsequent emails sent from Alicia's persons or variants off the email addresses could not be accepted through the firewalls. So anti problem is used to protect service from over congestion by
02:17
also the seated messages targeted at the end users on the Enterprise
02:23
for Anti Spyware, We have spyware software with which your activities will be trapped on the Internet.
02:30
You know, usually cookies are pushed to your system. When you visit a website cookie is pushed to your system. Could you simply a text file
02:38
that is pushed to a system to register your
02:42
user preferences stuff you have been looking at.
02:46
However, malicious persons could also track your activities online by review your cookies. They can tell what sites you visited. They can tell what you're looking at,
02:54
so your activities and this could be an invasion into our privacy. So, using anti spyware. It is possible to eradicate this tracking cookies from your system.
03:07
This talking cookies are very effective in that they would find all the tracking cookies
03:13
on. Remove those cookies from your system. If you want to leave this to use us so amuse us, we'll forget. Some users don't even know where to find the cookies or how to remove the cookies. So it's best we use the anti spiral. There are many off these on the market on
03:30
Super Antispyware is one very effective one
03:35
for papa blockers.
03:37
Usually we get pop ups.
03:38
This is what we call hardware, that what originates from the world. Two words. Advertising software. So you visit setting websites. They want to advertise to you, and they're pushing pop ups to your system. So how do we enable papa blockers if you click on start
03:55
on the system, you click on Start you go to control panel on dhe on Internet options. You cook on Internet options on the privacy top.
04:05
You can scroll down the page. You'll see it says
04:09
block pop ups. So you block pop ups. You told unpopular blockers on the Internet
04:15
options page. If you turn on papa blockers. What this means is that every site you visit,
04:21
no pop ups could be pushed their systems. However,
04:26
when you visit some websites, they let you know to best use their website. You must enable Papa bloke. So now we're the dilemma we want to tell off. Papa tell a proper blockers. Some sites are required for Papa Block has been turned off. So what do we do? Well, there's a solution to this
04:44
on the same page on the Internet options. We can just be coincidence when we could consider it allows us to populate that page with specific websites we want any boo
04:56
pop up for. So if you visit such sites, you get the pop ups. But other websites pop ups are blocked from getting to a computer, so organizations will do this and enable this across the enterprise using group policy on their systems, such that users could allow specific sites, assume a schism
05:16
as this site,
05:17
meet the policies that require four Popes
05:21
for host bills line
05:24
Who's best firewalls? Ah, host bids. Firewall is a firewall
05:30
on the host machine itself. These are usually software based firewall. We will find them in control panel click on start
05:39
control panel on usually the last section in the control panel, and it was the bottom of the page. We will see Host base. We just say it says Windows Firewall.
05:49
Windows Firewall is a perfect example of a host based firewall. The world host refers to a computer system, so if I was that recites on that machine is a host based rival. Usually that firewall is protecting traffic coming in on living that system.
06:05
Malicious persons will usually like to turn off your firewall if your PC is attacked. So our host based firewall is something we need to monitor periodically, as this would also facilitate generating alerts on preventing intrusion into our systems.
06:25
Patch management is a very important topic. Toe
06:30
gave host security
06:32
software is not perfect.
06:34
As a result, there are flaws that exist within software
06:39
on as you start to use software. Some of these floors are identified so the manufacturers off the software will periodically produce the patches. When these patches are produced, they are released to the general public.
06:51
Organizations should do best. Practice one. Whenever you get a patch, the first thing you want to do is validate the source of the patch. Where is this patch from?
07:03
To. You must have a test machine
07:06
on which you test this. The patch you want to see does this part. You do what they say it does. Is it robust? Is it sufficient to solve the issues They say he does.
07:16
How does it affect the infrastructure? Does it cause any problems? If no. For all these questions, then you could move the part to your real systems. You never download a patch on instead of directly on your little systems because malicious persons know that you need patches. They could also craft their militias payloads
07:38
like a party. And then you download it. Install it on your systems on your system. Starting is behaving. So you want to do proper patch management?
07:45
Individuals and organizations should be responsible for validating the source of the party
07:49
to test the patch for sufficiency. And three migrate the parts to the production systems once it's been found. Toby riposte on it does what they say it does. So that is how we protect our host machines.

Up Next

Fundamental System Security

Commonly referred to as INFOSEC, refers to the processes and methodologies required to keep information confidential.

Instructed By

Instructor Profile Image
John Oyeleke
Lead IT Security Instructor
Instructor