course ilt security unit objectives configure operating system and file system security install a...

58
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human aspects of security

Upload: emmeline-amanda-chandler

Post on 25-Dec-2015

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Security

Unit objectives Configure operating system and file

system security Install a fingerprint scanner and card

reader Manage the human aspects of security

Page 2: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Topic A

Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of

security

Page 3: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

User accounts

Object that represents a user of the computer– Name, password, group membership

User Administrator Guest

Page 4: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Groups

Management tool for applying security settings to multiple users

Users Administrators Power Users

Page 5: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Active Directory

Management framework Centralized database of security data Domains Forests Organizational units

Page 6: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity A-1

Securing access to the operating system

Page 7: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

File system security

Logical organization scheme for files Windows supports:

– File Allocation Table (FAT)– FAT32– NTFS

Only NTFS supports security

Page 8: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

NTFS advantages

Larger disks Security Compression and encryption Disk quotas Recovery logging

Page 9: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity A-2

Choosing the correct file systemfor security

Page 10: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

NTFS security

Security tab in Properties dialog box Permissions are cumulative Explicit permissions override inherited

permissions Permissions are inherited unless

blocked Set permissions on folders and files

Page 11: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

NTFS permissions

Full control Modify Read and Execute List Folder Contents Read Write Special Permissions

Page 12: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Enabling the Security tab

1. Open Windows Explorer

2. Choose Tools, Folder Options

3. Activate the View tab

4. Clear the checkbox beside Use simple file sharing

5. Click OK

Page 13: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity A-3

Configuring file access restrictions

Page 14: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Encryption

Scrambling of data Public key cryptography

– Pairs of keys– Whichever encrypts, the pair decrypts

Encrypting file system (EFS)

Page 15: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity A-4

Encrypting files

Page 16: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Authentication mechanisms

Biometric devices Smart cards Fobs Digital certificates

Page 17: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Authentication

Identity validated Workgroup vs. domain Local computer vs. domain Network authentication

Page 18: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Protocols

Kerberos v5– Supported by: Windows 2000, Windows

XP, and Windows Server 2003

NTLM– Supported by Windows NT, Windows 9x

Page 19: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity A-5

Understanding authentication technologies

Page 20: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Security policies

Password Policy Account Lockout Policy Audit Policy User Rights Assignments Security Options Encrypting File System Software Restriction Policies IP Security Policies

Page 21: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity A-6

Using local security policies to setpassword restrictions

Page 22: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Topic B

Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of

security

Page 23: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

A fingerprint scanner

Page 24: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity B-1

Installing a fingerprint reader

Page 25: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Smart card and reader

Page 26: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Installing IdentiPHI Basic

1. Install the card reader and its drivers

2. Install the IdentiPHI Basic software

3. Configure IdentiPHI Basic to accept smart cards

4. Enroll a smart card and set a secure PIN for that card

Page 27: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity B-2

Installing a card reader

Page 28: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity B-3

Installing the IdentiPHI Basic software

Page 29: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity B-4

Configuring IdentiPHI Basic to accept smart cards

Page 30: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity B-5

Enrolling a smart card with IdentiPHI

Page 31: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity B-6

Using a smart card

Page 32: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity B-7

Uninstalling the smart card readerand software

Page 33: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Fobs

Keychain sized devices Creates a rolling code Might need username and password,

in addition to fob number Rolling code not random

Page 34: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Topic C

Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of

security

Page 35: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Alleviate security weaknesses

Restrict physical access to sensitive systems and data

Create an automated backup schedule Manage data destruction Create a corporate security policy Manage social engineering attacks

Page 36: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Physical access restrictions

Lock server rooms Lock PC cases and peripherals Use cameras or motion-sensor alarms Station guards in ultra-sensitive areas

Page 37: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity C-1

Implementing physical access restrictions

Page 38: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Backup

Use to create copies of your files Recover files after system failure Back up any critical data before you

begin troubleshooting Windows Backup is a GUI utility

– Archive selected files and folders– Restore archived files and folders – Make copy of computer’s system state– Copy your computer’s system partition,

boot partition, and files needed to start up the system

Page 39: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Backup utility in Windows XP

Page 40: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Backup modes

Wizard mode — walk you step-by-step through the process

Advanced mode — provides complete control over file and folder selection

Page 41: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Backup utility in Advanced Mode

Page 42: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Backup types

Copy Daily Differential Incremental Normal

Page 43: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity C-2

Backing up files using Wizard mode

Page 44: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity C-3

Restoring information from a backup

Page 45: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Scheduling backups

Daily Weekly Monthly At predefined times On predefined days

continued

Page 46: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Scheduling backups, continued

Page 47: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity C-4

Scheduling a backup

Page 48: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Data destruction and migration

Destruction utilities Removable media and drives Paper records Data migration

Page 49: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity C-5

Examining data destruction techniques

Page 50: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Corporate security policies

Contract between company and employees

Heightens awareness Demonstrates commitment Spells out permitted and prohibited

uses of company resources, plus repercussions

Intrusion handling plans Regularly review and update

Page 51: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity C-6

Considering corporate security policies

Page 52: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Social engineering attacks

Social engineering includes:– Tricking users into divulging sensitive

information– Phishing– Dumpster diving– Shoulder surfing– Trojan horse attachments– Sneaking into secure areas through

deception

Training and awareness are best defenses

Page 53: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Malicious software

Virus Worm Trojan horse Spam Spyware Adware Grayware

Page 54: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Prevention

Training Corporate security policy Antivirus software

Page 55: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity C-7

Managing social engineering attacks

Page 56: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Network security

Firewalls Password management Account management Incidence reporting

Page 57: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Activity C-8

Examining network security

Page 58: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human

Cou

rse

ILT

Unit summary

Configured operating system and file system security

Installed a fingerprint scanner and card reader

Managed the human aspects of security