Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.

Slides:



Advertisements
Similar presentations
Donald Hester May 4, 2010 For audio call Toll Free and use PIN/code Windows 7 for IT Professionals Part 1: Security and Control.
Advertisements

Rambling on the Private Data Security
Windows Vista Serious Challenges for Digital Investigators Authors: Darren Hayes Shareq Qureshi Presented By: Prerna Gupta.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Microsoft Windows Vista SIRT Roundtable Discussion January 12, 2007 Harvard Townsend Interim University IT Security Officer College.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
SEC316: BitLocker™ Drive Encryption
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Week:#14 Windows Recovery
BitLocker™ Drive Encryption Hardware Enhanced Data Protection
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar│ Technology Evangelist │Microsoft Corporation Blog:
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Chapter 7 Installing and Using Windows XP Professional.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Troubleshoot Access, Authentication, and User Account Control Issues Lesson 8.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
Hands-On Microsoft Windows Server 2008
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Week #7 Objectives: Secure Windows 7 Desktop
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Troubleshooting Windows Vista Security Chapter 4.
MCTS Guide to Microsoft Windows Vista Chapter 7 Windows Vista Security Features.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Managing Applications, Services, Folders, and Libraries Lesson 4.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
Understand Encryption LESSON 2.5_A Security Fundamentals.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 3: Windows7 Part 3.
Information Systems Design and Development Security Precautions Computing Science.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Systems Architecture Microsoft BitLocker -> securing data on mobile devices Johannes Marotzke
UNM Encryption Services in Development
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Chapter Objectives In this chapter, you will learn:
Trusted Computing and the Trusted Platform Module
4 Windows 7.
Trusted Computing and the Trusted Platform Module
תרגול 9 – Windows Security
Chapter 3: Windows7 Part 3.
Securing Windows 7 Lesson 10.
The bios.
Presentation transcript:

Securing

Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection

Available in Windows Vista Ultimate - $ BitLocker Drive Encryption

Why is BitLocker Needed?  Reduces the threat of data theft or exposure from lost, stolen, or recycled computers  Statistics  A laptop is stolen every 53 seconds in the USA - Symantec  Over 600,000 laptops are stolen each year in the USA - Safeware Insurance Agency  97% of these laptops are never recovered – FBI  The second most common crime, just after identity theft, is laptop theft – FBI  Lost or stolen laptops are the top culprit of data leaks/breaches, accounting for 45% (of all the incidents studied) - The Identity Theft Resource Center  Laptops are the number-one item stolen in San Francisco - San Francisco Police Department

Requires a version 1.2 Trusted Platform Module for its two main security services BitLocker Drive Encryption

BitLocker Volumes Schematic Typical Disk PartitioningDisk Partitioning with BitLocker Drive 0 OS Volume (active) (Drive C:) OEM Maintenance Volume OEM Maintenance Volume OS Volume (Encrypted with Bitlocker) (Drive C:) System Volume (Active) (Drive D:) (Unencrypted)

What are BitLocker’s services?  Boot file integrity  Completed using the TPM  Creates a unique fingerprint of the system  TPM provides access to the encryption keys only if fingerprint is verified  Once unique fingerprint is verified BitLocker uses TPM to unlock the OS Volume and permits Windows to boot normally

What are BitLocker’s services?  OS volume encryption  BitLocker can encrypt the entire OS volume  EFS cannot encrypt system files  The OS volume contains:  Windows OS and it support files  Page files  Hibernation files

What if a TPM does not exist on the PC?  A USB flash drive can be used to store a startup key  The startup key is needed during each boot or return from hibernation  When using a USB flash drive BitLocker cannot perform the OS Integrity Check

Additional Authentication Modes BitLocker Drive Encryption

What other authentication is there with BitLocker?  PIN  This forces BitLocker to use a PIN (entered by the user) and the TPM to decrypt the information on the OS Volume  If forgotten then the recovery console must be used to recover the BitLocker Keys  Startup Key  A long string of numeric characters that is unique for each computer usually stored on a USB flash drive but not a smart card  BIOS must be able to detect USB device prior to OS starting up  Should be removed after boot or return from hibernation

Recovery BitLocker Drive Encryption

What if something goes wrong?  BitLocker has built in recovery capabilities.  This will recover the BitLocker keys needed to decrypt the OS Volume  Recovery involves a 48-bit recovery key  Randomly generated during BitLocker Setup  Recovery key can be stored:  USB Flash drive  Printed

Restriction and Limitations BitLocker Drive Encryption

What are BitLocker’s limitations?  Offline Protection  BitLocker only protects the PC when it is offline  Only OS Volume encrypted  Lost recovery key = lost data

Availability and Requirements BitLocker Drive Encryption

What is necessary to use BitLocker?  Windows Vista Ultimate  BitLocker with OS integrity checking  A version 1.2 TPM and a BIOS compliant with version 1.2 TCG (trusted computing group) to establish the chain of trust for pre-OS boot  Support for TCG-specified static root trust measurement  Partitioning into at least 2 volumes (OS Volume, BitLocker Boot Partition)

What is necessary to use BitLocker?  Windows Vista Ultimate  BitLocker without OS integrity checking  BIOS support for Class 2 USB mass-storage devices  Must include capabilities to read and write in the pre- OS boot environment  Be partitioned to include 2 volumes (OS Volume, BitLocker Boot Partition)

Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection

User Account Control

What are user account controls and how do they work?  Enables a user to have a non-administrator account and still be productive  All users operate a lowest possible privileges  Vista has a special account that runs in AAM (admin approval mode)  Means that the user either supplies administrative credentials or consents (depending on group policy settings) to perform typical admin functions  EXAMPLE: install a program

UAC continued  Microsoft places a high value on application compatibility  Microsoft has tried to ensure that existing applications can run without administrative privileges

UAC continued DDetermining privileged tasks TTemporarily elevating privileges IIsolating system messages EEnsuring existing applications run

Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection

Root Level Access Admin Services D D D User Kernel D Kernel Drivers Service 1 Service 2 Service 3 Service … Service … Restricted services Low rights programs DD D Service A Service B D User-mode Drivers

What can operate at root level?  Microsoft has included the ability for file and registry virtualization.  This pulls all programs away from operating at the kernel level  Only trusted and “signed” programs can operate at root or kernel level  To get signed a VeriSign Class 2 Commercial Software Publisher Certificate must be received  This is coded into the binary of the program therefore removing performance hampering validation

Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection

Windows Vista Firewall

Improvements for IT Departments?  The Windows Vista firewall will now have the ability to block outgoing traffic  Windows XP only blocked incoming traffic  Provides the ability to stop peer-to-peer connections  Provides the ability to stop instant messaging programs

Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection

Windows Defender

What does windows defend against?  Spyware  Uses automatic definition updates provided by Microsoft to remove known spyware from the windows vista system