Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
MIS Chapter 51 Chapter 5 – Managing File Access MIS 431 Created Spring 2006.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
By Rashid Khan Lesson 8-Crowd Control: Controlling Access to Resources Using Groups.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
Chapter 7 Installing and Using Windows XP Professional.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Module 13: Configuring Availability of Network Resources and Content.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Securing Windows.
Week #7 Objectives: Secure Windows 7 Desktop
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Chapter Fourteen Windows XP Professional Fault Tolerance.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Module 12: Managing Disaster Recovery. Overview Preparing for Disaster Recovery Backing Up Data Scheduling Backup Jobs Restoring Data Configuring Shadow.
Troubleshooting Windows Vista Security Chapter 4.
Module 1: Installing Microsoft Windows XP Professional.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
11 BACKING UP AND RESTORING SYSTEMS AND DATA Chapter 15.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 3: Configuring File Access and Printers on Windows 7 Clients
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
NetTech Solutions Security and Security Permissions Lesson Nine.
Managing Applications, Services, Folders, and Libraries Lesson 4.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Information Systems Design and Development Security Precautions Computing Science.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Introduction to Operating Systems
Lesson 16-Windows NT Security Issues
Securing Windows 7 Lesson 10.
Chapter 9: Managing Groups, Folders, Files, and Object Security
Creating and Managing Folders
Presentation transcript:

Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human aspects of security

Course ILT Topic A Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security

Course ILT User accounts Object that represents a user of the computer –Name, password, group membership User Administrator Guest

Course ILT Groups Management tool for applying security settings to multiple users Users Administrators Power Users

Course ILT Active Directory Management framework Centralized database of security data Domains Forests Organizational units

Course ILT Activity A-1 Securing access to the operating system

Course ILT File system security Logical organization scheme for files Windows supports: –File Allocation Table (FAT) –FAT32 –NTFS Only NTFS supports security

Course ILT NTFS advantages Larger disks Security Compression and encryption Disk quotas Recovery logging

Course ILT Activity A-2 Choosing the correct file system for security

Course ILT NTFS security Security tab in Properties dialog box Permissions are cumulative Explicit permissions override inherited permissions Permissions are inherited unless blocked Set permissions on folders and files

Course ILT NTFS permissions Full control Modify Read and Execute List Folder Contents Read Write Special Permissions

Course ILT Enabling the Security tab 1.Open Windows Explorer 2.Choose Tools, Folder Options 3.Activate the View tab 4.Clear the checkbox beside Use simple file sharing 5.Click OK

Course ILT Activity A-3 Configuring file access restrictions

Course ILT Encryption Scrambling of data Public key cryptography –Pairs of keys –Whichever encrypts, the pair decrypts Encrypting file system (EFS)

Course ILT Activity A-4 Encrypting files

Course ILT Authentication mechanisms Biometric devices Smart cards Fobs Digital certificates

Course ILT Authentication Identity validated Workgroup vs. domain Local computer vs. domain Network authentication

Course ILT Protocols Kerberos v5 –Supported by: Windows 2000, Windows XP, and Windows Server 2003 NTLM –Supported by Windows NT, Windows 9x

Course ILT Activity A-5 Understanding authentication technologies

Course ILT Security policies Password Policy Account Lockout Policy Audit Policy User Rights Assignments Security Options Encrypting File System Software Restriction Policies IP Security Policies

Course ILT Activity A-6 Using local security policies to set password restrictions

Course ILT Topic B Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security

Course ILT A fingerprint scanner

Course ILT Activity B-1 Installing a fingerprint reader

Course ILT Smart card and reader

Course ILT Installing IdentiPHI Basic 1.Install the card reader and its drivers 2.Install the IdentiPHI Basic software 3.Configure IdentiPHI Basic to accept smart cards 4.Enroll a smart card and set a secure PIN for that card

Course ILT Activity B-2 Installing a card reader

Course ILT Activity B-3 Installing the IdentiPHI Basic software

Course ILT Activity B-4 Configuring IdentiPHI Basic to accept smart cards

Course ILT Activity B-5 Enrolling a smart card with IdentiPHI

Course ILT Activity B-6 Using a smart card

Course ILT Activity B-7 Uninstalling the smart card reader and software

Course ILT Fobs Keychain sized devices Creates a rolling code Might need username and password, in addition to fob number Rolling code not random

Course ILT Topic C Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security

Course ILT Alleviate security weaknesses Restrict physical access to sensitive systems and data Create an automated backup schedule Manage data destruction Create a corporate security policy Manage social engineering attacks

Course ILT Physical access restrictions Lock server rooms Lock PC cases and peripherals Use cameras or motion-sensor alarms Station guards in ultra-sensitive areas

Course ILT Activity C-1 Implementing physical access restrictions

Course ILT Backup Use to create copies of your files Recover files after system failure Back up any critical data before you begin troubleshooting Windows Backup is a GUI utility –Archive selected files and folders –Restore archived files and folders –Make copy of computer’s system state –Copy your computer’s system partition, boot partition, and files needed to start up the system

Course ILT Backup utility in Windows XP

Course ILT Backup modes Wizard mode — walk you step-by-step through the process Advanced mode — provides complete control over file and folder selection

Course ILT Backup utility in Advanced Mode

Course ILT Backup types Copy Daily Differential Incremental Normal

Course ILT Activity C-2 Backing up files using Wizard mode

Course ILT Activity C-3 Restoring information from a backup

Course ILT Scheduling backups Daily Weekly Monthly At predefined times On predefined days continued

Course ILT Scheduling backups, continued

Course ILT Activity C-4 Scheduling a backup

Course ILT Data destruction and migration Destruction utilities Removable media and drives Paper records Data migration

Course ILT Activity C-5 Examining data destruction techniques

Course ILT Corporate security policies Contract between company and employees Heightens awareness Demonstrates commitment Spells out permitted and prohibited uses of company resources, plus repercussions Intrusion handling plans Regularly review and update

Course ILT Activity C-6 Considering corporate security policies

Course ILT Social engineering attacks Social engineering includes: –Tricking users into divulging sensitive information –Phishing –Dumpster diving –Shoulder surfing –Trojan horse attachments –Sneaking into secure areas through deception Training and awareness are best defenses

Course ILT Malicious software Virus Worm Trojan horse Spam Spyware Adware Grayware

Course ILT Prevention Training Corporate security policy Antivirus software

Course ILT Activity C-7 Managing social engineering attacks

Course ILT Network security Firewalls Password management Account management Incidence reporting

Course ILT Activity C-8 Examining network security

Course ILT Unit summary Configured operating system and file system security Installed a fingerprint scanner and card reader Managed the human aspects of security