1 / 30

Securing Operating Systems

2. Security Maintenance Practices. Basic proactive security can prevent many problemsMaintenance involves creating a strategyReview and update software and hardwareReview and update security policyAssign tasks to specific peopleSet a scheduleOverall goal is to harden the systemHardening is it

matty
Download Presentation

Securing Operating Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. 1 Securing Operating Systems

    2. 2 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy Review and update software and hardware Review and update security policy Assign tasks to specific people Set a schedule Overall goal is to harden the system Hardening is iterative and changing Hardening may not dissuade a persistent attacker

    3. 3 Operating System Maintenance A cracker is a person who attempts to compromise your computer system Hackers don’t generally have malicious intent; crackers do These two terms are often used interchangeably An exploit is a procedure that takes advantage of a vulnerability that can be used to compromise a system Exploits are routinely shared among crackers, and problems will begin to show up on multiple systems

    4. 4 Antivirus Software Identifies files that contain known viruses Antivirus software has a scanning mode that checks files throughout a system to see if they contain a virus signature A virus signature is a set of instructions or data that is unique to a particular virus After scanning, the software can remove or repair the virus Clean the system

    5. 5 Antivirus Software A virus shield scans incoming files for viruses The virus signature database must be up to date in order to be effective Most antivirus packages offer automatic updates After an update, you should scan your file system to catch any files that have already been infected A final precaution is to train users to recognize and report suspicious activity

    6. 6 Post-Install Security Checklist Use a security checklist to ensure that you have achieved all of the required tasks A checklist helps you to stay organized and disciplined A checklist should be based on professional experience Use standard checklists available from the operating system manufacturer and other resources as basis Customize the checklist for your own environment

    7. 7 Windows Checklist Elements Hardening the Windows Registry The registry is a central repository for system values Arranged as a database of registry keys that store values Can be edited with the Windows Registry Editor or 3rd party applications It is important to understand the implications for each key value, changes can be dangerous Create a backup before editing the Windows Registry

    8. 8

More Related