Windows Vista Security David Kenney Christopher Lange.

Slides:



Advertisements
Similar presentations
Windows Vista Serious Challenges for Digital Investigators Authors: Darren Hayes Shareq Qureshi Presented By: Prerna Gupta.
Advertisements

Module 1: Installing Windows XP Professional
Mr C Johnston ICT Teacher
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Security+ Guide to Network Security Fundamentals
24/7/365 Remote Computer Support. Program Overview.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
ROOT KITS. Overview History What is a rootkit? Rootkit capabilities Rootkits on windows OS Rootkit demo Detection methodologies Good tools for detection.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Security for Seniors SeniorNet Help Desk
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Hacker Zombie Computer Reflectors Target.
Using Windows Firewall and Windows Defender
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Windows Defender. What is Windows Defender? Windows Defender is a free program that helps protect your computer against pop- ups, slow performance, and.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Internet Security and Your Computer Welcome to Boot Camp.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
Computer Hope Copyright © Cannady ACOS. All rights reserved. (R1: July 2011)
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
McAfee Antivirus Support By Techdotcomp nd Ave, Seattle, WA 98122, USA Phone: Based on Seattle, WA.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Network Security.
Introduction : This Spyware remover software that keep all time your computer completely clean.Spyware remover software This software can secure your.
Windows Tutorial 5 Protecting Your Computer
Working at a Small-to-Medium Business or ISP – Chapter 8
Step-By-Step Guide To Install Kaspersky Internet Security For Mac.
Bethesda Cybersecurity Club
Securing Windows 7 Lesson 10.
Bethesda Cybersecurity Club
Presentation transcript:

Windows Vista Security David Kenney Christopher Lange

Background Windows Vista is Microsoft’s most current operating system Windows Vista is Microsoft’s most current operating system Vista offers new security features: Vista offers new security features: Windows DefenderWindows Defender User Account ControlUser Account Control Windows Firewall with Advanced SecurityWindows Firewall with Advanced Security

Windows Defender Microsoft’s anti-spyware program now integrated with the Windows Vista operating system Microsoft’s anti-spyware program now integrated with the Windows Vista operating system Designed to detect, remove, and prevent spyware Designed to detect, remove, and prevent spyware Supports not only scanning, but real- time protection Supports not only scanning, but real- time protection

User Account Control (UAC) Windows Vista security infrastructure Windows Vista security infrastructure Applications run with standard user privileges until an administrator authorizes an increase in privilege Applications run with standard user privileges until an administrator authorizes an increase in privilege Much criticism over the number of prompts a user can receive from UAC requesting authorization Much criticism over the number of prompts a user can receive from UAC requesting authorization

Windows Firewall with Advanced Security Not accessible by default, but can easily be accessed Not accessible by default, but can easily be accessed Allows for more advanced control of the firewall including: Allows for more advanced control of the firewall including: Firewall ProfilesFirewall Profiles IPSec ConfigurationIPSec Configuration Connection Security RulesConnection Security Rules Inbound/Outbound RulesInbound/Outbound Rules Rules MonitoringRules Monitoring

Introduction The lab will require a new hard drive with Windows Vista pre-installed and the following software available NAS: The lab will require a new hard drive with Windows Vista pre-installed and the following software available NAS: Cain & AbelCain & Abel F-Secure BlackLight Rootkit EliminatorF-Secure BlackLight Rootkit Eliminator Ophcrack LiveCDOphcrack LiveCD RegtickRegtick Scoundrel SimulatorScoundrel Simulator Trojan SimulatorTrojan Simulator Spybot Search & Destroy with Detection UpdateSpybot Search & Destroy with Detection Update

Lab Procedure UAC and Windows Defender will be introduced, tested, and compared with Spybot Search & Destroy UAC and Windows Defender will be introduced, tested, and compared with Spybot Search & Destroy Applications such as Trojan Simulator, Regtick, and Scoundrel Simulator will be used with various privileges to test how UAC and Windows Defender will react Applications such as Trojan Simulator, Regtick, and Scoundrel Simulator will be used with various privileges to test how UAC and Windows Defender will react

Lab Procedure The Windows Firewall with Advanced Security configuration will be introduced The Windows Firewall with Advanced Security configuration will be introduced Writing custom rules for situations such as blocking Nmap scans as was done in previous labs for Linux and Windows third party software Writing custom rules for situations such as blocking Nmap scans as was done in previous labs for Linux and Windows third party software

Lab Procedure Password cracking of Windows Vista user accounts using Ophcrack, Cain & Abel, and rainbow tables Password cracking of Windows Vista user accounts using Ophcrack, Cain & Abel, and rainbow tables Vista does not use LM hashes, but stores passwords in the SAM file making them harder to crack Vista does not use LM hashes, but stores passwords in the SAM file making them harder to crack Can be done with NTLM hashes fairly easily if the password is weak Can be done with NTLM hashes fairly easily if the password is weak

Lab Procedure Rootkits and backdoors are always a prominent threat Rootkits and backdoors are always a prominent threat We were unable to acquire any means of attacking Vista, but the DFK ThreatSimulator or similar program may one day be updated to do so We were unable to acquire any means of attacking Vista, but the DFK ThreatSimulator or similar program may one day be updated to do so F-Secure BlackLight Rootkit Eliminator is a scanning program that is capable of checking Vista for rootkits F-Secure BlackLight Rootkit Eliminator is a scanning program that is capable of checking Vista for rootkits

Lab Procedure Worms and viruses are a serious threat to all Windows operating systems Worms and viruses are a serious threat to all Windows operating systems We were unable to acquire any new worms or viruses, so we used the AnnaKournikova.jpg.vbs worm from a previous lab to demonstrate the need for updated anti-virus software We were unable to acquire any new worms or viruses, so we used the AnnaKournikova.jpg.vbs worm from a previous lab to demonstrate the need for updated anti-virus software

Conclusion Throughout the semester we have done numerous attacks and learned security techniques for both RedHat and Windows XP Throughout the semester we have done numerous attacks and learned security techniques for both RedHat and Windows XP Windows Vista is still fairly new and no labs cover the new security features it offers and how effective they may or may not be Windows Vista is still fairly new and no labs cover the new security features it offers and how effective they may or may not be

Questions?