340 likes | 459 Views
CN1260 Client Operating System. Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+. Agenda. Chapter 12: Resolving Security Issues Quiz Exercise. To Keep a System Secure. Always require usernames and passwords Don’t give your password to anyone
E N D
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Agenda • Chapter 12: Resolving Security Issues • Quiz • Exercise
To Keep a System Secure • Always require usernames and passwords • Don’t give your password to anyone • Change your passwords frequently • If your password is compromised, change your password immediately. • Don’t allow people to watch you type in your password • Do not write your password down near the computer • Always log off or lock your computer • Use a password-protected screen saver • Use strong passwords • At least 8 characters long and are a mix of lowercase, uppercase, digits, and special characters
To Keep a System Secure (Cont.) • Do not use obvious passwords • Don’t always assign full permissions to resources • Only assign the permissions that people need to perform their job or task • Do not always log on as an administrator • Log in as a standard user and then elevate to an administrator as needed • Using the runascommand • Right-clicking an icon while pressing the Shift key and selecting RunasAdministrator
Social Engineering • The act of manipulating people into performing actions or divulging confidential information • Trick someone into giving their username, password, or other private information such as credit card numbers and social security numbers
Phishing • A technique of fraudulently obtaining private information. • The phisher sends an email that appears to come from a legitimate business and requests verification such as your bank account information or social security number • A realistic website where you would input the information
Malicious Software (Malware) • Software designed to infiltrate or affect a computer system without the owner’s informed consent • Usually associated with viruses, worms, Trojan horses, spyware, rootkits, and dishonest adware
Computer Virus • A program that can copy itself and infect a computer without the user’s consent or knowledge • Had some form of executable code that was hidden in the boot sector of a disk or as an executable file (with a .exe or .com filename extension) • Macros languages (which can be used to infect documents)
Worm • A self-replicating program that replicates itself to other computers over the network without any user intervention • Worm DOES NOT corrupt or modify files on a target computer • Consumes bandwidth and processor and memory resources, slowing your system down or causing your system to be unusable • Worms usually spread by using security holes found in the operating system or TC/IP software implementations
Trojan Horse • An executable that appears as a desirable or useful program • After the program is loaded, it can cause your computer to become unusable or it can bypass your system’s security allowing your private information to be read including passwords, credit card numbers, and social security numbers, and it may execute adware
Spyware • A type of malware that is installed on computers and collects personal information or browsing habits often without the user’s knowledge • It can also install additional software, and redirect your web browser to other sites or change your home page. • Keylogger
Rootkit • A software or hardware device designed to gain administrator-level control over a computer system without being detected • Rootkits can target the BIOS, hypervisor, boot loader, kernel, or less commonly, libraries or applications
Symptoms of Malware • Poor performance while connected to the Internet • Computer stops responding frequently • Computer takes longer to start up • Unexpected additional toolbars added to the browser • Unexpected programs automatically start • Components of Windows or other programs no longer work • Unusual messages or displays on your monitor • See Full list on Page 230
Protecting Against Malware • Keep your Windows (as well as other Microsoft products such as Microsoft Office) system up-to-date with the latest service packs, security patches, and other critical fixes • Up-to-date anti-virus software package • You should install an anti-spyware software package. • You should also run your anti-virus software at least once a week and do a full scan
Windows Defender • A software that prevents, removes, and quarantines spyware • Protects against pop-ups, slow performance, and security threats caused by spyware and other unwanted software
User Account Control • A feature that helps prevent unauthorized changes to your computer • To use Protected Mode in IE, you need to have UAC
Firewall • Software or hardware that checks information coming from the Internet or a network • Either blocks it or allows it to pass through • Help prevent hackers or malicious software from gaining access to your computer through a network or the Internet • A stateful firewall is a firewall that keeps track of the state of network connections • Determines which packets are legitimate based on the current network connections • Only packets matching a known connection state will be allowed by the firewall; others will be rejected.
Understanding Firewalls • Base their filtering on TCP/IP characteristics: • IP address - Specific computers • Protocol numbers - Transport layer protocol • Port number - Application running on computer • Rules are used to filter traffic two ways: • Admit all traffic, except that which applies to the rules • Block all traffic, except that which applies to the rules
Windows Firewall • See Figure 12-1 on Page 232 • Firewall with advanced options • Allow or deny depends on the programs or ports • See Figure 12-2 on Page 233 • See Figure 12-3 on Page 234
Avoiding Malware • Don’t install unknown software or software from a disreputable source • Don’t open unexpected or unsolicited email attachments • Don’t click on hyperlinks in messages from unknown people • If your email client supports auto launch, turn it off • If your web browser alerts you that a site is known for hosting malware, pay attention to these warnings • If you surf the Internet and you get browser pop-ups that you need to download the newest driver or you need to check your system for viruses, use caution • Don’t forget to perform regular backups
Action Center • A central place to view alerts and take actions to keep Windows running • Enables users and administrators to access, monitor, and configure the various Windows 7 security mechanisms • The primary function • Provide an automatic notification system that alerts users when the system is vulnerable • See Figure 12-4 on Page 235
Removing Malware • Run an anti-virus software package and perform a full scan • Reboot your computer and run it again to be sure your system is clean • Keeps running it until you are all clear.
Malicious Software Removal Tool • Checks computers running Windows for infections by specific, prevalent malicious software • Second Tuesday of each month • The tool is available from Microsoft Update, Windows Update, and the Microsoft Download Center.
Tools to Limit Malware • Disable unknown or questionable services and startup programs • Task Manager • Services MMC • System Configuration (msconfig.msc) • Disable unknown or questionable Internet Explorer add-ons
Virus Hoax • A message warning the recipient of a nonexistent computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone he or she knows
Windows Updates • Fixes, patches, service packs, and device drivers, and apply them to the Windows system. • If there are many fixes or patches, Microsoft releases them together as a service pack or a cumulative package • See Figure 12-5 on Page 237 • You can set how often and what to install • See Figure 12-6 on Page 238
Windows Updates (Cont.) • Security updates • A broadly released fix for a product-specific security-related vulnerability • Critical, important, moderate, or low • Critical updates • A broadly released fix for a specific problem addressing a critical, nonsecurity-related bug • Service Packs • A tested, cumulative set of hotfixes, security updates, critical updates, and updates, additional fixes for problems found internally since the release of the product • Service Packs might also contain a limited number of customer-requested design changes or features
Encryption and Decryption • Encryption • The process of converting data into a format that cannot be read by another user • Decryption • The process of converting data from encrypted format back to its original format.
Encryption • Encryption algorithms can be divided into three classes: • Symmetric (Secret-key, shared-key, and private-key encryption) • Uses a single key to encrypt and decrypt data • Initially send or provide the secret key to both sender and receiver • Asymmetric • One key is used to encrypt the data while the second key is used to decrypt the data • Certificate Authority (CA) • Hash function • A one way encryption (it cannot be decrypted) • It can used to encrypt a password that is stored on disk
Encrypting File System (EFS) • Encrypt files on an NTFS volume • After a file has been encrypted • You do not have to manually decrypt an encrypted file before you can use it • See Figure 12-7 on Page 240 • A recovery agent • Can recover encrypted files for a domain
BitLocker • Windows 7 Enterprise and Ultimate • Encrypts an entire volume to protect against unauthorized persons, such as someone stealing a hard drive • Computer must have a Trusted Platform Module (TPM) and a compatible BIOS • A TPM is a microchip that is built into a computer • Store cryptographic information, such as encryption keys
BitLocker (Cont.) • Data recovery agent (DRA) • A user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card • Administrators of Active Directory Domain Services (AD DS) networks use DRAs to ensure access to their BitLocker-protected systems, to avoid having to maintain large numbers of individual keys and PINs
BitLocker To Go • A new feature in Windows 7 that enables users to encrypt removable USB devices, such as flash drives and external hard disks • a TPM chip is not required
Assignment • Submit these before class over on Thursday • Fill in the blank • Multiple Choice • True / False • Lab 12