windows security a practical approach. basics passwords passwords strong password should:strong...

14
Windows Security Windows Security A practical approach A practical approach

Upload: doreen-perkins

Post on 04-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

Windows SecurityWindows Security

A practical approachA practical approach

Page 2: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

BasicsBasics

PasswordsPasswords• Strong password should:Strong password should:

Be longBe long Contain:Contain:

• LettersLetters• PunctuationPunctuation• SymbolsSymbols• NumbersNumbers

Password CheckerPassword Checker• http://www.microsoft.com/security/online-http://www.microsoft.com/security/online-

privacy/password-checker.aspxprivacy/password-checker.aspx

Page 3: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

PasswordPassword

Password is known ONLY to userPassword is known ONLY to user Storing/Managing PasswordsStoring/Managing Passwords

• Password algorithmsPassword algorithms Password filesPassword files

Page 4: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

File SystemFile System

NTFS Security AdvantagesNTFS Security Advantages• Access Control ListAccess Control List• Granular structureGranular structure• Supports server authenticationSupports server authentication• Ability to encrypt files and directoriesAbility to encrypt files and directories

Encrypted File System (EFS)Encrypted File System (EFS)

Page 5: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

PERMISSIONSPERMISSIONSFor files, directories, networked devicesFor files, directories, networked devices

APPLICABLE ON:APPLICABLE ON:- UsersUsers- ComputersComputers- Networked devicesNetworked devices- Groups of:Groups of:

- UsersUsers- ComputersComputers- Networked devicesNetworked devices

INHERITANCEINHERITANCE

NTFS Access ControlNTFS Access Control

Page 6: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

Surfing the InternetSurfing the Internet

BrowsersBrowsers• FFFF• IEIE• Others (Opera, Chrome, etc)Others (Opera, Chrome, etc)

Browser Add-onsBrowser Add-ons• NoScriptNoScript• FlashBlockFlashBlock

Page 7: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

Environmental ThreatsEnvironmental Threats

COMPONENT OBJECT MODELSCOMPONENT OBJECT MODELS Object Linking and Embedding (OLE)Object Linking and Embedding (OLE)

Remote Procedure Call (RPC)Remote Procedure Call (RPC) ActiveXActiveX

JAVA APPLETSJAVA APPLETS

Page 8: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

External threatsExternal threats Browser relatedBrowser related

• Hijacks (BHO)Hijacks (BHO) Drive-by downloadsDrive-by downloads

WMF (2005), ActiveX, DCOMWMF (2005), ActiveX, DCOM ScamsScams

• Confidence trickingConfidence tricking PhishingPhishing

• Fake EmailsFake Emails ID TheftID Theft

• Data harvestingData harvesting Social EngineeringSocial Engineering

• Psychological manipulationPsychological manipulation Targeted MalwareTargeted Malware

• Silent_banker Silent_banker

Page 9: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

Human ErrorHuman Error

EmailsEmails DownloadsDownloads

• P2PP2P• Underground sourcesUnderground sources

System patches out of dateSystem patches out of date Clicking without reading/fully Clicking without reading/fully

understanding (‘Nexters’)understanding (‘Nexters’)

Page 10: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

PrivacyPrivacy Indexing servicesIndexing services

• Google DesktopGoogle Desktop Social websitesSocial websites

• FacebookFacebook ID ThreatsID Threats Facebook ApplicationsFacebook Applications

• Source of infectionSource of infection• Data miningData mining

Search enginesSearch engines• GoogleGoogle

Scrapped google engine (Scroogle)Scrapped google engine (Scroogle)• IxquickIxquick• DuckDuckGoDuckDuckGo

Page 11: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

Operating System Security Operating System Security SoftwareSoftware

Anti VirusAnti Virus• Microsoft Security Essentials (MSE)Microsoft Security Essentials (MSE)

Anti Spy/MalwareAnti Spy/Malware• Windows DefenderWindows Defender

Tracking SoftwareTracking Software• AdeonaAdeona

FirewallFirewall• Windows FirewallWindows Firewall• Sygate Personal FirewallSygate Personal Firewall

Page 12: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

Common SenseCommon Sense Strong PasswordStrong Password Latest updatesLatest updates Unprivileged user accountUnprivileged user account Read EVERYTHING on screenRead EVERYTHING on screen Never disclose any login detailsNever disclose any login details Never believe in something for nothingNever believe in something for nothing Be AwareBe Aware Better safe than sorryBetter safe than sorry

Page 13: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

Safe SystemSafe System Internet BrowsingInternet Browsing

• Tightened settings for BrowsersTightened settings for Browsers• Do not log in as AdministratorDo not log in as Administrator• Build up adequate layer of defence through application layerBuild up adequate layer of defence through application layer• Real-Time anti-vir/spy/mal/ad wareReal-Time anti-vir/spy/mal/ad ware

Electronic MailElectronic Mail• Set up for plain text onlySet up for plain text only• Be careful what you subscribe toBe careful what you subscribe to

(mailing list harvesting)(mailing list harvesting)

• Spam filtersSpam filters• Email address obfuscatingEmail address obfuscating• Structuring multiple email addresses for different purposesStructuring multiple email addresses for different purposes

System layerSystem layer• Hidden files (double extensions)Hidden files (double extensions)• Start-upStart-up• Active software protectionActive software protection

Page 14: Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters

THE ENDTHE END

Thank youThank you