Security Architecture of Windows

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
System Security Chapter 11. Chapter Objectives Recognize the seven common sense rules of system security Understand file, and account security. Understand.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
We are here to help you… Fight something like this Brownies !
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
VIRUS.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
bitdefender virus protection
Computer Viruses Author: Alyse Allen.
Tech Level Cyber Security Lesson 7
Chapter 40 Internet Security.
Chapter Objectives In this chapter, you will learn:
Managing Windows Security
Securing Network Servers
What they are and how to protect against them
Chapter 6 Application Hardening
War between Good and Evil.
Introduction to Operating Systems
COMPUTER VIRUSES Computer Technology.
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
Viruses and Virus Protection
Stay Safe While Using The Internet
Lab 7 – Defeating MALWARE
HOW DO I KEEP MY COMPUTER SAFE?
Operating System Security
Securing Windows 7 Lesson 10.
Chap 10 Malicious Software.
Technology Mrs. Huddleston
Test 3 review FTP & Cybersecurity
Presentation transcript:

Security Architecture of Windows Microsoft: Windows Presented By: Ambreesh Arya (2011014) Siddharth Ubana (2011145) Vikram Suthar (2011173)

System Security Computer(PC) Security Earlier personal computers and their Operating Systems, were not designed with security in mind. They were developed as personal systems which would only be used by one user. 1 Security = ---------------- Easy Use

Security Architecture of Windows Security Reference Monitor(SRM) Local Security Authority(LSA) Security Account Manager(SAM)

Security Reference Monitor Kernel Mode Component that Performs Access Checks Generates Audit Log Entries Manipulates User Privileges

Local Security Authority Responsible for enforcing local security policy Lsass.exe User mode Issues security tokens to accounts Key component of the logon process

Security Account Manager (SAM) A database that stores user accounts and local users and groups security information SamSrv.exe

Windows Login Administrator creates a user account (full name, username, password, group, privileges) Windows creates an SID in the form of S-1-5-21-AAA-BBB-CCC-RRR

Windows Login User logs in with keyboard. Information is sent to the LSA controller. If successful token is generated and sent to user. Token contains User’s SID Group membership Privileges

Common Sense Rules of Security Don’t put files on your system that are likely to be interesting to hackers or nosy employees. Change your system password with in regular period of time. Update your system at regular period of time. Monitor the reports generated by the security tools. Use Strong Password. Install genuine software in your system.

Common Security Options Checks Windows Firewall configuration and repairs as needed. Checks Windows policies to determine bad settings in the Windows Registry. Checks status of antivirus. Checks Internet Explorer privacy setting to determine how cookies are handled. Checks Windows Update to ensure computer is kept current and secure Clears Internet Explorer history and cache. Checks if Internet Explorer is up to date.

Program Threats Virus Worm Trojan Horse

Program Threats A virus is a piece of code which attaches itself to other code/files on the system. It relies on that piece of code in order to propagate/operate. When that code is executed so is the virus code. This gives the virus code the opportunity to propagate, and to perform other actions. A worm is a piece of code that propagates itself to other systems, but the code does not attach itself to programs or files on the infected systems. Worms are stand-alone programs that do not rely on a “host” piece of code to propagate/operate.

Program Threats A Trojan horse is a program that appears to do one thing, but in reality does something else. It does not attach itself to other code/files, and does not rely upon other code/files to propagate/operate. For instance a game program that removes all of your files (on purpose) would be a Trojan horse.

Types of Virus Viruses There are two general types of virus programs; malicious, and non-malicious. A non-malicious virus does not intend to cause any lasting damage to the computer system. It propagates. It may print messages on the screen. It may utter noises from the speaker. It does not include any code to intentionally do damage to the computer system.

Malicious Virus Viruses A malicious virus makes a concentrated attempt to do damage to the computer system. It may format your disk drive. It may scramble the FAT table. It may remove random files. It may encrypt the data on the disk.

PC Viruses PC Viruses PC viruses usually infect files with .exe, .com, and extensions. These files usually contain executable code. The virus code sometimes infects the command.com file, the hard disk boot sector, the hard disk partition tables, or floppy disk boot sectors. Some virus code is memory resident code. It goes memory resident then sits and waits for other programs to be pulled into memory. When these programs are in memory the virus infects them. Some virus code goes to great lengths to hide itself...for instance the strings in the code are variably encrypted to keep virus scanners from finding the virus.

Tools There are many audit tools available for free download. The Center for Internet Security offers tools to check Solaris, Windows, and Linux hosts, as well as routers for common security problems. The System Administration, Networking, and Security Institute (SANS) has several tools for system auditing, and step-by-step guides to follow to secure your systems. The CERT(Computer Emergency Response Team) organization publishes guidelines for system security.

Summary Securing the individual systems is the first step toward providing a secure environment. Account and password security are basics that should not be ignored. Understand virus, trojans, and worms work. Become familiar with the tools available to monitor/implement security on your systems.

References http://online.securityfocus.com/infocus/1527 http://www.cert.org/ http://www.nmap.org/ http://lcamtuf.coredump.cx/newtcp/ Google.com Wikipedia Microsoft.com