1 / 30

Windows Security

Windows Security. Myles Maxfield John Smith Rick Born. Old School. IBM/MS DOS. 1981 – purchased by Micro-soft Single user, Limited network support No user security No File security. Windows 3.1. Added Protected_Mode Task Switching only

aelwen
Download Presentation

Windows Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Windows Security Myles Maxfield John Smith Rick Born

  2. Old School

  3. IBM/MS DOS • 1981 – purchased by Micro-soft • Single user, • Limited network support • No user security • No File security

  4. Windows 3.1 • Added Protected_Mode • Task Switching only • Added some virtual capabilities of the 386 processoe if run in 386 Enhanced mode

  5. Windows 95 • Built in TCP/IP stack • 32bit operating system • Appears to be multiuser

  6. Windows 98/ME • Built in browser (IE)

  7. References • http://www.nukesoft.co.uk/msdos/dosversions.shtml • http://www.lbl.gov/ITSD/Security/systems/win-checklist.html

  8. Windows NT - 2000

  9. What is Windows NT? • Windows meant for business and server usage • Multiprocessing and multiuser support was important • The basis for modern Windows releases

  10. Security Model • Security Descriptors (SD) • Access Control Lists (ACL)

  11. Security Descriptors • Every single anything on NT has one. • It IDs the owner of the thing and has an ACL attached

  12. Access Control Lists • A list of all of the user and groups and their permissions on the object • Contain Access Control Entries, which specify access for individuals • Two Types • Discretionary: Controlled by the owner • System: Controlled by system administrator

  13. Access Token • Used to id a user and their groups for use with SDs.

  14. Pre-2000 are Broken! • A flaw in early versions of NT are vulnerable to DoS attacks through RCP. • Not patched in pre-2000! • The underlying system would need to be changed too much

  15. References • http://www.microsoft.com/technet/security/Bulletin/MS03-010.mspx • http://msdn.microsoft.com/en-us/library/ms995339.aspx • http://msdn.microsoft.com/en-us/library/ms995341.aspx

  16. Windows XPWindows Vista Securitah!

  17. Windows XP

  18. Most Popular • 60-90 Percent market share • Most targeted • Windows Update lag

  19. Service Packs • Service Pack 1 • Patches and hotfixes • Service Pack 2 • Data Execution Prevention • Security Center • Service Pack 3 • .NET patches

  20. Security Center (SP2)

  21. Security Center • Firewall • Automatic Updates • Antivirus • Note: Unix

  22. User Access • Default operating as Administrator

  23. Vista

  24. Similar to XP • Security Center* • Data Execution Prevention

  25. Security Center • Vanilla Installation • Firewall • Automatic Updates • Malware Protection • Internet Security Settings

  26. User Access Control • Problem with XP • Authentication • User and Administrator at the same time • Annoying

  27. Windows Defender

  28. Windows Defender • Problem with XP • Malware security

  29. Address Space Layout Randomization • OpenBSD

  30. Digital Rights Management • Non effective

More Related