Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.

Slides:



Advertisements
Similar presentations
©2006 Microsoft Corporation. All rights reserved. Windows Vista Security Tidbits Steve Riley Senior Security Strategist Microsoft Corporation
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Information Security Policies and Standards
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 7 HARDENING SERVERS.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Module 8: Implementing Administrative Templates and Audit Policy.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Guide to Operating System Security Chapter 5 File, Directory, and Shared Resource Security.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Operating System Security CS460 Cyber Security Spring 2010.
Guide to Operating System Security Chapter 4 Account-based Security.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Section 7: Implementing Security Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Hardening.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
Operating system Security By Murtaza K. Madraswala.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
CIS 193A – Lesson4 Bastille Hardening a System. CIS 193A – Lesson4 Focus Question What Linux utilities, commands, and files are used by Bastille to harden.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
TCOM Information Assurance Management System Hacking.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Module 7: Implementing Security Using Group Policy.
NetTech Solutions Security and Security Permissions Lesson Nine.
Module 10: Implementing Administrative Templates and Audit Policy.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Working at a Small-to-Medium Business or ISP – Chapter 8
Module Overview Installing and Configuring a Network Policy Server
Configuring Windows Firewall with Advanced Security
Chapter 5 : Designing Windows Server-Level Security Processes
Chapter 8 File Security.
Operating system Security
Lesson 16-Windows NT Security Issues
Operating System Security
Operating System Concepts
Presentation transcript:

Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security

Copyright © 2002 ProsoftTraining. All rights reserved. Lesson 1: Security Principles

Objectives Explain the need for security in Linux and Windows 2000 environments Describe industry evaluation criteria used for security Identify the guidelines for determining the three general security levels Discuss the security mechanisms used to implement security systems

Objectives (cont’d) Identify the different areas of security management Describe Windows 2000 and Linux “out-of-the- box” security measures Implement tools to evaluate key security parameters in Windows 2000 and Linux Describe security components in the Windows 2000 security architecture

Security Services Authentication Access control Data confidentiality Data integrity Nonrepudiation

Evaluation Criteria European Information Technology Security Evaluation Criteria document BS 7799 Trusted Computer Systems Evaluation Criteria Common Criteria

Security Levels Low Medium High

Security Mechanisms Specific –Encipherment –Digital signature –Access control –Data integrity –Authentication –Traffic padding Wide –Trusted functionality –Security labels –Audit trails –Security recovery

Windows 2000 Security Exploits Windows 2000 registry

Windows 2000 Security Architecture Windows 2000 security components –C2 certification Windows 2000 objects Security components –SIDs –Access tokens –Security descriptors –Access control lists and entities Security subsystem

Linux Security Configuration problems –Misconfigured authentication settings –Unnecessary services –Default account policies –Non-root user access to sensitive commands

Pluggable Authentication Modules Editing PAM files PAM directories PAM entry format Telnet access and the root account

Summary Explain the need for security in Linux and Windows 2000 environments Describe industry evaluation criteria used for security Identify the guidelines for determining the three general security levels Discuss the security mechanisms used to implement security systems

Summary (cont’d) Identify the different areas of security management Describe Windows 2000 and Linux “out-of-the- box” security measures Implement tools to evaluate key security parameters in Windows 2000 and Linux Describe security components in the Windows 2000 security architecture

Copyright © 2002 ProsoftTraining. All rights reserved. Lesson 2: Account Security

Objectives Describe the relationship between account security and passwords Explain techniques for securing accounts in Windows 2000 and Linux Prune users, detect account changes, rename default accounts, and implement password policies in Windows 2000 and Linux

Objectives (cont’d) Identify Linux commands for password aging and explain how to log unsuccessful logon attempts Explain Linux security threats, restrict account access, and monitor accounts

Passwords Windows 2000 and strong passwords –Enforcing strong passwords –Dictionary attacks Linux and strong passwords –Shadow passwords –The root account

Verifying System State Cross-referencing information on non-domain controllers Built-in and external tools Renaming default accounts Windows 2000 account policies Password lockout

Password Aging in Linux Linux command options Timing out users Monitoring accounts System-wide event logging facility

Summary Describe the relationship between account security and passwords Explain techniques for securing accounts in Windows 2000 and Linux Prune users, detect account changes, rename default accounts, and implement password policies in Windows 2000 and Linux

Summary (cont’d) Identify Linux commands for password aging and explain how to log unsuccessful logon attempts Explain Linux security threats, restrict account access, and monitor accounts

Copyright © 2002 ProsoftTraining. All rights reserved. Lesson 3: File System Security

Objectives Identify the Windows 2000 file-level permissions Assign NTFS permissions Explain the importance of drive partitioning and how it relates to security Describe how copying and moving a file affect file security Identify remote file access control permissions

Objectives (cont’d) Describe Linux file system security concepts Explain the function of the umask command Discuss the purpose of setuid, setgid, and sticky bits

Windows 2000 File System Security File-level permissions Standard 2000 permissions Drive partitioning Copying and moving files

Remote File Access Control Remote access permissions –Full Control –Modify –Read & Execute –No Access Share permissions

Linux File System Security Files File information Permissions The umask command The chmod command UIDs and GIDs The set bits: setuid, setgid and sticky bits

Summary Identify the Windows 2000 file-level permissions Assign NTFS permissions Explain the importance of drive partitioning and how it relates to security Describe how copying and moving a file affect file security Identify remote file access control permissions

Summary (cont’d) Describe Linux file system security concepts Explain the function of the umask command Discuss the purpose of setuid, setgid, and sticky bits

Copyright © 2002 ProsoftTraining. All rights reserved. Lesson 4: Assessing Risk

Objectives Identify general and specific operating system attacks Describe a keylogger program’s function Change Windows 2000 system defaults Scan a system to determine security risks Explain Linux security concerns

Security Threats Accidental threats Intentional threats –Passive threats –Active threats

Types of Attacks Spoofing/masquerade Replay Denial of service Insider Trapdoor Trojan horses

Windows 2000 Security Risks Default directories Default accounts Default shares and services

General UNIX Security Vulnerabilities Viruses Buffer overflows

Keyloggers Invisible KeyLogger Stealth and Windows 2000 Keylogging and securing the Linux search path Protecting yourself against keyloggers

System Port Scanning Advanced security scanners –WebTrends Security Analyzer

UNIX Security Risks The rlogin command –Interactive sessions: Telnet vs. rlogin Network Information System (NIS) Network File System (NFS)

NIS Security Concerns NIS security problems –No authentication requirements –Contacting server by broadcast –Plain-text distribution –Encryption and authentication –Portmapper processes and TCPWrappers –The securenets file NIS+

NFS Security Concerns Users, groups and NFS Secure RPC NFS security summary

Summary Identify general and specific operating system attacks Describe a keylogger program’s function Change Windows 2000 system defaults Scan a system to determine security risks Explain Linux security concerns

Copyright © 2002 ProsoftTraining. All rights reserved. Lesson 5: Reducing Risk

Objectives Explain the purpose and importance of system patches and fixes, and apply system patches Modify the Windows 2000 Registry for security Lock down and remove services for effective security in Windows 2000 and Linux

Patches and Fixes Microsoft service packs Red Hat Linux errata

Windows 2000 Registry Security Registry structure –Subtrees and their uses Auditing the registry Setting registry permissions

Disabling and Removing Services in Windows 2000 Securing network connectivity Server Message Block Miscellaneous configuration changes

Disabling and Removing Services in UNIX Bastille –The tarball format –Downloading and installing Bastille –Running Bastille in text mode

Summary Explain the purpose and importance of system patches and fixes, and apply system patches Modify the Windows 2000 Registry for security Lock down and remove services for effective security in Windows 2000 and Linux

Operating System Security Security Principles Account Security File System Security Assessing Risk Reducing Risk