Methods of Securing Data in Windows Networks

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Securing a Wireless Network
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter 7: Using Windows Servers to Share Information.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Chapter 9: Novell NetWare
Staying Safe Online Keep your Information Secure.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Privilege Management Chapter 22.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Any criminal action perpetrated primarily through the use of a computer.
Data Assurance in Windows-based Networks Mark Boyer.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
8 – Protecting Data and Security
Chapter 40 Internet Security.
Chapter 7: Using Windows Servers
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
What they are and how to protect against them
Malware and Computer Maintenance
Chapter 6 Application Hardening
Unit 4 IT Security.
Ways to protect yourself against hackers
Configuring Windows Firewall with Advanced Security
Wireless Network Security
Configuring and Troubleshooting Routing and Remote Access
Wireless Network Security
Computer Security Std XI– Chapter 8.
Cyber Security By: Pratik Gandhi.
Security of a Local Area Network
Information Security Session November 11, 2004
IS4550 Security Policies and Implementation
Guide to Networking Essentials 7th Edition
Information Security Session October 24, 2005
Design Unit 26 Design a small or home office network
Information Security Session October 23, 2006
Implementing Client Security on Windows 2000 and Windows XP Level 150
Unit 4 IT Security Kerris Davies.
Securing Windows 7 Lesson 10.
Network hardening Chapter 14.
Public-Key, Digital Signatures, Management, Security
Cybersecurity and Cyberhygiene
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Network Security Mark Creighton GBA 576 6/4/2019.
G061 - Network Security.
Presentation transcript:

Methods of Securing Data in Windows Networks Mark Boyer

Ways To Secure Data On A Network Authentication and Authorization Encryption/decryption Virtual Private Networks (VPN) Firewalls Virus and Worm Protection Spyware Protection Wireless Security

Authentication and Authorization Authentication – security feature that allows administrators to control who has access to your network Authorization – what the users that are authenticated are allowed to access while on the system

Windows Password Tools Specify length and complexity of users passwords XP allows passwords to be from 0 to 128 characters Complexity setting requires user to meet 3 of 4 requirements Lower case letters, uppercase letters, numbers, and special characters

Windows Password Tools cont. Minimum Password Age – min amount of days before user can change their password Maximum Password Age – max amount of day before user has to change their password Enforce Password History Setting – makes sure users can not reuse older passwords Account Lockout – can set system to lock out a user if they enter the wrong password to many times Can set to unlock manually or automatically

Restricting Logon Hours & Location Windows administrators can set time of day, day of week, and location of accessing the networks Restricting reasons System backup Don’t want anyone on the system during this process Policy restrictions You don’t want people that deal with sensitive materials to be able to access them out of the office

Windows Authorizing Access Two Ways Sharing permissions NTFS Permissions

Sharing Permissions Applied only to folders shared over the network Files within these folders inherit same permissions as the folder Permissions only apply to users trying to access through the network, not locally

NTFS Permissions Can assign to both folders and files Also can restrict local users as well as ones logged in over the network Assign permissions to individual users or groups of users Has 6 different standard permissions and 14 different special permissions

Windows & Encryption Encoding of data used to protect data transferred over a network or the internet Two ways of windows encryption IP Security (IPSec) Encrypting File Systems (EFS)

IPSec Most popular method of encrypting data It works by creating an connection between two devices Done by one of three ways of authenticating Preshared key – special key entered on both devices by an admin Kerberos authentication – special key generated by the OS (more secure) Digital certificates – uses a third party known as Certification Authority (CA) Must apply for a digital certificate from CA When comunication takes place each device sends certificate to CA for verification

Three Standard IPSec Policies in Windows Client (Respond Only) – only uses secure communication if the other device suggests it Server (Request Security) – requests IPSec communication if its supported Allows unsecure communication if it isn't supported Secure Server (Require Security) – requires IPSec Rejects any device that does not support it

Encrypting File Systems (EFS) Process of encrypting data on the computers disk drive so that only the file creator and data recovery agent can decrypt it Data recovery agent usually administrator This is useful if someone gains access to your hard drive

Windows VPN’s Temporary or permanent connections across a network such as the internet that use encryption to send and receive data. Leave it at that (other students topic)

Firewalls Hardware or software programs that inspects packets going in and out of the system weeding out ones that are not desired Windows has implemented its own personal firewall into it operating system It basically monitors traffic in and out of the system and stops anything suspicious and possibly harmful

Online Firewall Software ZoneAlarm Firewall Armor2net Personal Firewall 3.12 Commando Firewall Pro Tiny Personal Firewall 6.5 There are tons of them

Malware Protection Any software that is meant to cause harm or disruption to any computer system Virus program that spreads by replicating itself into other programs or documents Goal corrupt or delete files Worm Self contained program that spreads by replicating itself Does not need help to spread Goals send emails, delete files, create backdoors, use up network bandwidth

Malware cont. Trojans Spyware (sniffing software) program that appears to be something useful but is really a form of malware such as free utilities Spyware (sniffing software) Collects info about activities on the computer they are on and reports them back to one who put them on there

Anti Virus Software Can be expensive to maintain but it is much more expensive to lose critical company data Available Software AVG Anti-Virus Free Addition AVAST home addition Avira AntiVir Personal – Free Antivirus Norton AntiVirus McAfee Virus Scan Plus

Spyware Software Removes spyware that is on your computer system Ad-Aware 2008 Spybot – Search & Destroy Spyware Doctor 5.5 SpywareBlaster 4.1

Wireless Security You want to protect your wireless signal from wardrivers 5 ways of doing this (Use at least one if not a few) Service Set Identifier (SSID) Alphanumeric label that identifies one LAN from another Wired Equivalency Protocol (WEP) provides data encryption in a network Uses a static encryption key Wi-Fi Protected Access (WPA) Improvement over WEP Alters encryption key periodically and automatically 802.11i (WPA2) Better encryption and encryption key handling MAC address filtering Used on small networks Restricts network access to specific MAC addresses

Citations Cnet. Retrieved October 1, 2008, Web site: http://www.download.com Windows IT Library. Retrieved October 1, 2008, Web site http://www.windowsitlibrary.com Greg Tomsho, Ed Tittle, David Jhonson. (2007) Guide to Networking Esentials, Fifth Edition.