{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Operating System Customization
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Factors to be taken into account when designing ICT Security Policies
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Chapter 3 Ethics, Privacy & Security
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
New Data Regulation Law 201 CMR TJX Video.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Cyber Patriot Training
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.
IT Security for Users By Matthew Moody.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Networking Basics Lesson 1 Introduction to Networks.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Note1 (Admi1) Overview of administering security.
Security in ERP Systems By Jason Rhodewalt & Marcel Gibson.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
TCOM Information Assurance Management System Hacking.
KTAC Security Task Force Superintendents Update April 23, 2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Security By Duncan Hall.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
Creating and Managing Networks CSC February, 1999.
Personal Security for Advanced Users Group 18 Andrew Trusty, Gaurav Mullick.
Woodland Hills School District Computer Network Acceptable Use Policy.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Windows Administration How to protect your computer.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
Computer Security Sample security policy Dr Alexei Vernitski.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Vista Configuration MCTS : User Account Security.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Chapter 6 Application Hardening
Lesson Objectives Aims You should be able to:
Answer the questions to reveal the blocks and guess the picture.
Columbus State University
Information Security Session October 24, 2005
6. Application Software Security
Presentation transcript:

{ Active Directory Security Why bother?

  Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if the secure way also happens to be the easy way   Law #3: If you don't keep up with security fixes, your network won't be yours for long   Law #4: It doesn't do much good to install security fixes on a computer that was never secured to begin with   Law #5: Eternal vigilance is the price of security Microsoft’s 10 Immutable Laws of Security Administration

  Law #6: There really is someone out there trying to guess your passwords   Law #7: The most secure network is a well- administered one   Law #8: The difficulty of defending a network is directly proportional to its complexity   Law #9: Security isn't about risk avoidance; it's about risk management   Law #10: Technology is not a panacea Law’s continued

Next time someone asks why miscreants might want to hack his PC, show him this diagram.

{ Setting Up a Secure Environment Overview *Not all encompassing*

 Service packs  Hotfixes  Notifications  Network scanners  Virus / malware protection software Updates

 Disable guest account  Transport level encryption  Remote network access  File permissions  Security groups  Group policy  Disable / uninstall unused services  Secure user rights  Firewall settings  Backups  Best Practice Analyzer – BPA  Microsoft Baseline Security Analyzer Security Settings

 Enabled  Adequate storage  Central location  Review schedule  & other notification Audit Logging

 Why bother?  Limit access  Access logs  Locked server closet / room  Security cameras  Network plugs  Paper trail  Environment monitoring  Wireless vs wired  Biggest security vulnerability – humans Physical security

 Company stand  Passwords  Employee dismissal  User access levels  Privacy  Mobile data transfer  Computer use Policies

 Sync network time  Train your users Miscellaneous

 calNetworkSecurity.pdf calNetworkSecurity.pdf calNetworkSecurity.pdf    revisited/ revisited/ revisited/Sources