Assuming that your device or network will not be the next target of an attack is never wise. Taking protective measures can guard you from loss of sensitive or confidential data, and can protect your systems from being damaged or compromised. Security procedures can range from simple, inexpensive tasks such as maintaining up-to-date software releases, to complex implementations of firewalls and intrusion detection systems.
Security Practices and Procedures (15.5.1)
Some of the most effective security procedures are simple to implement and do not require extensive technical knowledge. A username and password are two pieces of information that a user needs to log on to a computer or application.
Figures 15-7 through 15-9 show examples of different login screens.
Figure 15-7 BIOS Password
Figure 15-8 Windows Login
Figure 15-9 Network Login
When a threat actor knows one of these entries, the attacker needs only to crack or discover the other entry to gain access to the computer. It is important to change the default username for all users on computers and network equipment because these default usernames are widely known.
Most users select passwords that can be easily guessed or derived from known information about the user such as birthdays, pet names, or a favorite sports team. It is important to view passwords as a key to valuable data and to make them as secure as possible. A password that is actually a passphrase is easy to remember but would be more difficult to crack. An example would be My-pets_name-1s_Ginger rather than just Ginger.
Security Tools and Applications (15.5.2)
Internet security is a major concern around the world. As a result, many tools are available to network users to protect their devices from attacks and to help remove malware from infected machines.
Some of the security tools and applications used in securing a network are briefly described in Table 15-1.
Table 15-1 Security Tools and Applications
Security Tool or Application | Description |
Firewall | A security tool that controls traffic to and from a network. |
Patches and updates | Software that is applied to an OS or application to correct a known security vulnerability or add functionality. |
Virus protection | Antivirus software that is installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email. |
Spyware protection | Antispyware software that is installed on an end-user workstation to detect and remove spyware and adware. |
Spam blocker | Software that is installed on an end-user workstation or server to identify and remove unwanted emails. |
Popup blocker | Software that is installed on an end-user workstation to prevent popup and pop-under advertisement windows from displaying. |