Presentation is loading. Please wait.

Presentation is loading. Please wait.

Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.

Similar presentations


Presentation on theme: "Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human."— Presentation transcript:

1 Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human aspects of security

2 Course ILT Topic A Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security

3 Course ILT User accounts Object that represents a user of the computer –Name, password, group membership User Administrator Guest

4 Course ILT Groups Management tool for applying security settings to multiple users Users Administrators Power Users

5 Course ILT Active Directory Management framework Centralized database of security data Domains Forests Organizational units

6 Course ILT Activity A-1 Securing access to the operating system

7 Course ILT File system security Logical organization scheme for files Windows supports: –File Allocation Table (FAT) –FAT32 –NTFS Only NTFS supports security

8 Course ILT NTFS advantages Larger disks Security Compression and encryption Disk quotas Recovery logging

9 Course ILT Activity A-2 Choosing the correct file system for security

10 Course ILT NTFS security Security tab in Properties dialog box Permissions are cumulative Explicit permissions override inherited permissions Permissions are inherited unless blocked Set permissions on folders and files

11 Course ILT NTFS permissions Full control Modify Read and Execute List Folder Contents Read Write Special Permissions

12 Course ILT Enabling the Security tab 1.Open Windows Explorer 2.Choose Tools, Folder Options 3.Activate the View tab 4.Clear the checkbox beside Use simple file sharing 5.Click OK

13 Course ILT Activity A-3 Configuring file access restrictions

14 Course ILT Encryption Scrambling of data Public key cryptography –Pairs of keys –Whichever encrypts, the pair decrypts Encrypting file system (EFS)

15 Course ILT Activity A-4 Encrypting files

16 Course ILT Authentication mechanisms Biometric devices Smart cards Fobs Digital certificates

17 Course ILT Authentication Identity validated Workgroup vs. domain Local computer vs. domain Network authentication

18 Course ILT Protocols Kerberos v5 –Supported by: Windows 2000, Windows XP, and Windows Server 2003 NTLM –Supported by Windows NT, Windows 9x

19 Course ILT Activity A-5 Understanding authentication technologies

20 Course ILT Security policies Password Policy Account Lockout Policy Audit Policy User Rights Assignments Security Options Encrypting File System Software Restriction Policies IP Security Policies

21 Course ILT Activity A-6 Using local security policies to set password restrictions

22 Course ILT Topic B Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security

23 Course ILT A fingerprint scanner

24 Course ILT Activity B-1 Installing a fingerprint reader

25 Course ILT Smart card and reader

26 Course ILT Installing IdentiPHI Basic 1.Install the card reader and its drivers 2.Install the IdentiPHI Basic software 3.Configure IdentiPHI Basic to accept smart cards 4.Enroll a smart card and set a secure PIN for that card

27 Course ILT Activity B-2 Installing a card reader

28 Course ILT Activity B-3 Installing the IdentiPHI Basic software

29 Course ILT Activity B-4 Configuring IdentiPHI Basic to accept smart cards

30 Course ILT Activity B-5 Enrolling a smart card with IdentiPHI

31 Course ILT Activity B-6 Using a smart card

32 Course ILT Activity B-7 Uninstalling the smart card reader and software

33 Course ILT Fobs Keychain sized devices Creates a rolling code Might need username and password, in addition to fob number Rolling code not random

34 Course ILT Topic C Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security

35 Course ILT Alleviate security weaknesses Restrict physical access to sensitive systems and data Create an automated backup schedule Manage data destruction Create a corporate security policy Manage social engineering attacks

36 Course ILT Physical access restrictions Lock server rooms Lock PC cases and peripherals Use cameras or motion-sensor alarms Station guards in ultra-sensitive areas

37 Course ILT Activity C-1 Implementing physical access restrictions

38 Course ILT Backup Use to create copies of your files Recover files after system failure Back up any critical data before you begin troubleshooting Windows Backup is a GUI utility –Archive selected files and folders –Restore archived files and folders –Make copy of computer’s system state –Copy your computer’s system partition, boot partition, and files needed to start up the system

39 Course ILT Backup utility in Windows XP

40 Course ILT Backup modes Wizard mode — walk you step-by-step through the process Advanced mode — provides complete control over file and folder selection

41 Course ILT Backup utility in Advanced Mode

42 Course ILT Backup types Copy Daily Differential Incremental Normal

43 Course ILT Activity C-2 Backing up files using Wizard mode

44 Course ILT Activity C-3 Restoring information from a backup

45 Course ILT Scheduling backups Daily Weekly Monthly At predefined times On predefined days continued

46 Course ILT Scheduling backups, continued

47 Course ILT Activity C-4 Scheduling a backup

48 Course ILT Data destruction and migration Destruction utilities Removable media and drives Paper records Data migration

49 Course ILT Activity C-5 Examining data destruction techniques

50 Course ILT Corporate security policies Contract between company and employees Heightens awareness Demonstrates commitment Spells out permitted and prohibited uses of company resources, plus repercussions Intrusion handling plans Regularly review and update

51 Course ILT Activity C-6 Considering corporate security policies

52 Course ILT Social engineering attacks Social engineering includes: –Tricking users into divulging sensitive information –Phishing –Dumpster diving –Shoulder surfing –Trojan horse attachments –Sneaking into secure areas through deception Training and awareness are best defenses

53 Course ILT Malicious software Virus Worm Trojan horse Spam Spyware Adware Grayware

54 Course ILT Prevention Training Corporate security policy Antivirus software

55 Course ILT Activity C-7 Managing social engineering attacks

56 Course ILT Network security Firewalls Password management Account management Incidence reporting

57 Course ILT Activity C-8 Examining network security

58 Course ILT Unit summary Configured operating system and file system security Installed a fingerprint scanner and card reader Managed the human aspects of security


Download ppt "Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human."

Similar presentations


Ads by Google