Host Based Security. John Scrimsher, CISSP email@example.com. Pre-Quiz. Name Do you own a computer? What Brand? Email address City of Birth Have you ever had a computer virus?. Why Host Based Security?. Perimeter Security vs. Host Based. 66% $. 34% $$$. Why Host Based Security?.
Host Based Security
John Scrimsher, CISSP
Anything that you would not want deliberately installed on your computer.
The Common Factor
Link goes to dllbat.com
"It's hard to imagine a more ridiculous situation: a handful of virus writers are playing unpunished with the Internet, and not one member of the Internet community can take decisive action to stop this lawlessness.
The problem is that the current architecture of the Internet is completely inconsistent with information security. The Internet community needs to accept mandatory user identification - something similar to driving licenses or passports.
We must have effective methods for identifying and prosecuting cyber criminals or we may end up losing the Internet as a viable resource."
Eugene KasperskyHead of Antivirus Research
Security is a Mindset, not a service. It must be a part of all decisions and implementations.
… 70 percent of those asked said they would reveal their computer passwords for a …
Bar of chocolate
Schrage, Michael. 2005. Retrieved from http://www.technologyreview.com/articles/05/03/issue/review_password.asp?p=1
The biggest threat to the security of a company is not a computer virus, an unpatched hole in a key program or a badly installed firewall. In fact, the biggest threat could be you. What I found personally to be true was that it's easier to manipulate people rather than technology. Most of the time organizations overlook that human element.
Mitnick, Kevin, “How to Hack People.” BBC NewsOnline, October 14, 2002.