allen-kinney
Uploaded by
9 SLIDES
214 VIEWS
90LIKES

Comprehensive Guide to File Security: Protecting Personal Files with User-Level Safeguards

DESCRIPTION

In today's digital landscape, safeguarding personal files is crucial due to constant threats, especially online. This guide explores user-level protection methods, including password-based and encryption-based solutions. Learn about the importance of password management, encryption using tools like GnuPG, and best practices for maintaining system security. Discover how to mitigate risks from local threats and cyber attacks, implement a firewall, and adhere to best practices for password complexity and system updates. Prioritize your digital security by taking proactive steps today.

1 / 9

Download Presentation

Comprehensive Guide to File Security: Protecting Personal Files with User-Level Safeguards

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security

  2. File Security • User-level protection • Protect personal files • Three ways of protection • password-based • encryption-based • access right

  3. Password protection • Login and password • Login names are public • /etc/passwd • passwd • yppasswd, nispasswd

  4. Encryption • Covert (encrypt) a file to a different form • Use gpg • gpg --gen-key • generates private & public keys • ~/.gnupg • encrypt & sign emails and files

  5. System security • Everyone is under threat • Specially when using Internet • Local threats also • Common sense, good practice • Err on the side of caution

  6. Some threats • Denial of Service (Dos) • Intrusion • Snooping • Viruses, Worms & Trojans • Rootkits

  7. Initial steps to security • shut down unwanted daemons • netstat -an • /etc/services • kill unwanted daemons • remove from init • changing access permissions to needed services

  8. Best Practices • Complex passwords • Skip the root account • Don’t trust random binaries • strace, ltrace • Log files • /var/log/syslog etc. • Software update • Physical security

  9. Firewall • Packet filtering • Stateless / stateful filtering • netfilter / iptables • Firewall products • Firestarter, Smoothwall Express, IPCop, Shoreline

More Related