By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
2.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 2: Installing Windows Server.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 6: Configure and Troubleshoot Local User and Group Accounts.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Maintaining and Updating Windows Server 2008
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Windows Tutorial 9 Maintaining Hardware and Software
Incident Response Updated 03/20/2015
Lesson 10 Operating System Customization
Chapter 7 Installing and Using Windows XP Professional.
Microsoft ® Official Course Module 9 Configuring Applications.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Test Review. What is the main advantage to using shadow copies?
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Hands-On Microsoft Windows Server 2008
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Week #7 Objectives: Secure Windows 7 Desktop
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Troubleshooting Windows Vista Security Chapter 4.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Module 5: Configuring Internet Explorer and Supporting Applications.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Week #3 Objectives Partition Disks in Windows® 7 Manage Disk Volumes Maintain Disks in Windows 7 Install and Configure Device Drivers.
INTERNET SAFETY FOR KIDS
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
NetTech Solutions Security and Security Permissions Lesson Nine.
NetTech Solutions Protecting the Computer Lesson 10.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Windows Administration How to protect your computer.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Maintaining and Updating Windows Server 2008 Lesson 8.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Introducing, Installing, and Upgrading Windows 7
Chapter Objectives In this chapter, you will learn:
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Information Security Session October 24, 2005
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Administering Your Network
G061 - Network Security.
Presentation transcript:

By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school

Preventive Support Preventive support Preventive support is the practice of performing actions that prevent specific problems from occurring. In large organizations, a great deal of preventive support occurs enforcement computer user policies Much of the preventive support in these organizations happens through the enforcement of computer and user policies over networks called domains Your school might not have a domain, but most of the preventive support measures that are presented can be performed on individual client computers

Common Prevention - Users Preventive user support is designed to prevent users from performing malicious acts or accidentally causing harm to the school’s computers. Some preventive user support measures include: 1. Require every user to have a user account When users know that their actions are associated with their own user account, they are less likely to perform malicious acts. To support this measure, disable any Guest accounts on the computer.

Common Prevention - Users 2. Require all users to use strong passwords When users have strong passwords to access their user accounts, it is less likely that hackers can compromise or guess these passwords. Hackers try to gain unauthorized access to a computer or network. Strong passwords are at least eight characters long, and include at least one character that is not alphanumeric in a position other than the first or last position. Examples of strong passwords include: TH*s0ne$, and Br(bW#irL. 3. Require all users to change passwords frequently When users change passwords frequently (usually every 30 to 60 days), their passwords are less likely to be compromised. Password Policies are part of Local Security Settings and should not be changed without the consent and supervision of your faculty adviser or instructor.

Common Prevention - Users 4. Require all users to create a password reset disk. One of the greatest burdens on any help desk is resetting passwords when users forget them. To avoid this, require each user to create a password “reset disk.” This disk enables a user to create a new password for his or her account without a technician’s help. 5. Restrict end-user account type to User or Limited. User accounts on computers in a domain have an account status of User (the most restricted), Power User (more privileges), and Administrator (full control over the computer). User accounts on a standalone computer or in a workgroup network have an account status of Limited (the most restricted) or Administrator (full control over the computer). Whenever possible, end-user accounts should have an account status of User (in a domain) or Limited (in a workgroup or on a standalone computer) so that users cannot perform actions, such as installing unauthorized software.

Common Prevention - Hardware Preventive hardware support is designed to ensure that hardware functions properly, and that hardware drivers are updated regularly and systematically. 1. Prevent users from installing unsigned hardware drivers A driver is a program that enables a piece of hardware to work with the operating system. An unsigned driver is a driver that does not contain the digital signature of the creator. 2. Create a schedule for updating drivers New drivers for hardware are often available to improve the function of the hardware, or its interaction with the computer system. Create a schedule for updating hardware drivers (once every three to six months is usually enough). To update hardware drivers, go to and search for drivers. Then click Microsoft Download Center: Drivers. You can also go to the Web site of the component manufacturer to see if new drivers are available.

Common Prevention - Hardware 3. Create a schedule for inspecting hardware Hardware needs to be cleaned regularly (especially keyboards and monitors), as well as inspected for damage. When you inspect hardware, pay special attention to connections. It is not uncommon for cables to become tangled or stretched, which can lead to damaging pressure on ports. 4. Create an inventory of all hardware, and inscribe hardware with school identification The best way to maintain hardware is to know what you have. An inventory can provide you with this information. Additionally, inscribing hardware with an identifying mark can make recovery easier if the hardware is stolen. You can also physically secure hardware by locking the rooms in which it is kept, or by using computer locks that secure it to a desk or other piece of furniture.

Common Prevention – OS (Win) Preventive operating system support is critical to the health and security of the computer system, and any network of which the computer is a member. Preventive operating system support measures include: 1. Configure computers to automatically download Windows XP updates This enables computers connected to the Internet to automatically download updates to Windows XP, which include security patches and other executable programs. If a computer is not connected to the Internet, download the updates on a computer that is, and then copy them to a CD. You can then install them on the computer that is not connected to the Internet.

Common Prevention – OS (Win) 2. Create a schedule to install Windows updates Windows XP updates that you download are not automatically installed, so you should create a schedule for doing this. Updates should be installed at least every two weeks. However, if an important security fix is identified by Microsoft, you should immediately install it to prevent unauthorized access to your computer systems. 3. Ensure that Windows File Protection is enabled Windows File Protection prevents the replacement of protected system files, such as.sys,.dll,.ocx,.ttf,.fon, and.exe files. Windows File Protection protects all files installed by the Windows Setup program. By default, Windows File Protection is always enabled and allows only Windows digitally signed files to replace existing files. This functionality should never be disabled.

Common Prevention – OS (Win) 4. Install and regularly update virus detection software Virus detection software is vital to keeping your operating system functional. An anti-virus program should be installed on every computer, and the virus definitions for the program should be updated at least once a month. You should configure the program to scan all media, such as floppy disks and CDs, for viruses before loading any data from those devices. 5. Create Automated System Recovery disks Automated System Recovery (ASR) is a last resort recovery option for restoring a damaged operating system. ASR occurs in two stages: backup and recovery. ASR backs up and recovers the system state, system services, and all disks associated with the operating system components. When you restore an operating system using ASR, you restore only the operating system; you might lose other data, such as programs and data files and folders.

Common Prevention – Network Preventive networking support is designed to secure your network from internal and external threats, and to ensure that network connectivity is maintained whenever possible. Preventive networking support measures include: firewall 1. Enable a firewall on all connections from your network to the Internet A firewall is hardware or software that prevents specific types of Internet traffic from entering your network. Windows XP Professional has built-in firewall functionality for network connections; however, the Internet Connection Firewall (ICF) should only be enabled for direct connections to the Internet. It should not be enabled on an individual computer’s connection to the school network.

Common Prevention – Network 2. Set security levels for Microsoft Internet Explorer zones Microsoft Internet Explorer defines different network zones. It is important that the security level for each zone is set to the appropriate level. To access the security level settings, open Internet Explorer. On the Tools menu, click Internet Options and then click the Security tab. Click each zone, and then set the security setting for each zone as described in the following list. 1. Internet zone. This is the security setting for all Internet sites that are not contained in one of the other zones. Set the security level to Medium or higher. 2. Local Intranet zone. This is the security setting for the network on which the computer resides. If the network is secure, set this to Medium- Low. If you are not sure if the network is secure, set the security level to Medium or higher. 3. Trusted Sites zone. This zone is only active if specific sites have been added to it. Add only those sites that you trust completely to this zone. Because site content or ownership (and therefore safety) can change, set the security level for this zone to Medium or higher. 4. Restricted Sites zone. This zone is only active if specific sites have been added to it. Sites that you suspect to be dangerous because they have malicious code should be added to this list. Always set the security level for this zone to High.

Exercise

Determine Preventive Support Measures for Your School In this exercise, you work with your instructor or faculty adviser and your school’s technology support staff to identify the preventive support measures that are already in place, and determine which measures can and should be implemented.

Determine Preventive Support Measures for Your School 1. List the preventive support measures that are currently in place at your school: a) Preventive User Support b) Preventive Hardware Support c) Preventive Operating System Support d) Preventive Networking Support 2. List the preventive support measures that you think can and should be implemented in your school. For each idea, list the resources you would need to implement it. For example, you might need two technicians to perform updates every two weeks, or you might need a floppy disk for each user to create a password reset disk. a) Preventive User Support b) Preventive Hardware Support c) Preventive Operating System Support d) Preventive Networking Support