Figure 6-4: Installation and Patching

Slides:



Advertisements
Similar presentations
Computers in the real world Objectives
Advertisements

P1-P2-M1-D1-D2.
Make People Productive Anywhere Manage Risks through Enhancing Security and Control Manage Risks through Enhancing Security and Control Reduce Application.
Upgrading Software CIT 1100 Chapter4.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 11 Windows Server 2008 Virtualization.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
1 Secure Your Business PATCH MANAGEMENT STRATEGY.
Chapter Thirteen Maintaining and Upgrading a Network.
Maintaining and Updating Windows Server 2008
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
IT:Network:Microsoft Applications
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
Windows 10 Remediation 1 Upgrading to Windows 10 with Norton Installed OEM Team.
Client Management. Introduction In a typical organization there are a lot of client machines used for day to day operations Client management is a necessary.
HWINTRO1 OPERATING INSTALLING AN OPERATING SYSTEM.
Ashita Srivastava ISM High Five Corporations Chain of fast food restaurants Using Windows XP for clients and Windows Server 2008 Needs a robust.
Linux Operations and Administration
Linux & UNIX Version 5.3 (Power) Version 6.1 (Power) Version 7.1 (Power) AIX Version 11iv2 (PA-RISC/IA64) Version 11iv3 (PA-RISC/IA64) HP-UX Version.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Lesson 14: Installing and Uninstalling Programs how to install a new program what to do if the new program doesn’t work how to uninstall a program © CCI.
Raven Services Update December 2003 David Wallis Senior Systems Consultant Raven Computers Ltd.
1 Host Hardening Chapter 6 Copyright 2003 Prentice-Hall.
Honeypot and Intrusion Detection System
Windows 2003 Installation/Upgrade and Update. Checking Compatibility Supported Upgrade paths Using the MS Windows Upgrade Advisor HCL (Hardware Compatibility.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
11 SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL Chapter 9.
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Managing Windows Software & Updates SUS Server MS Baseline Security Analyzer Software and Group Policy Paul “The Yellow Dart” Peterson University of Minnesota.
XP Practical PC, 3e Chapter 3 1 Installing and Learning Software.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
ITGS Application Software, pt. 3. ITGS Business Software Alliance (BSA) and Federation Against Software Theft (FAST) –Represent software companies and.
Microsoft Management Seminar Series SMS 2003 Change Management.
Microsoft Premier Offering Project Server 2007 Health Review Bishan Ruder Premier Field Engineer (PFE) Enterprise Project Management (EPM)
Deploying Software with Group Policy Chapter Twelve.
+ Moving Targets: Security and Rapid-Release in Firefox Presented by Carlos Bernal-Cárdenas.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
XAMPP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Maintaining and Updating Windows Server 2008 Lesson 8.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
Windows Vista Configuration MCTS : Installing and Upgrading.
보안 취약점 비교 Linux vs. Windows
Patch Management Module 13.
Chapter 9 Managing Software
Introduction to Operating Systems
Installing and Learning Software
Let's talk about Linux and Virtualization in 'vLAMP'
Installing and Learning Software
Chapter 6 Application Hardening
Installing Patches on the ALSMS Server Configuration Example
Security Patching.
Software Packaging and Releasing
CompTIA Server+ Certification (Exam SK0-004)
Overview – SOE PatchTT November 2015.
Overview – SOE PatchTT December 2013.
5.0 : Windows Operating System
Lecture 13 RPM and its advantages.
f
More Scripting & Chapter 11
Chapter 10: Supporting and Maintaining Desktop Applications
IQCare AutoUpdate Tool
IS3440 Linux Security Unit 7 Securing the Linux Kernel
SAP R/3 Installation on WIN NT-ORACLE
System Center Third Party Tools Ivanti Patch and RCT Recast April 2019.
COMMON CUSTOMER QUERIES – AND HOW TO RESPOND
Presentation transcript:

Figure 6-4: Installation and Patching Installation Offers Many Options, Some of Which Affect Security For example, in Windows, the NTFS file system is better for security than FAT32 Need a security baseline to guide option choices during installation Microsoft Baseline Security Analyzer (www.microsoft.com/technet/security/tools/mbsa home.asp)

Figure 6-4: Installation and Patching Known Vulnerabilities Most programs have known vulnerabilities Exploits are programs that take advantage of known vulnerabilities

Figure 6-4: Installation and Patching Known Vulnerabilities Vulnerability reporters send vulnerability reports to vendors Vulnerability reporters often say that vendors take too long to fix vulnerabilities Vendors say that vulnerability reporters do not give them enough time, report too much detail to the press

Figure 6-4: Installation and Patching Fixes Work-around: A series of actions to be taken; no new software Patches: New software to be added to the operating system Upgrades: Newer versions of programs usually fix older vulnerabilities.

Figure 6-4: Installation and Patching Upgrades Often, security vulnerabilities are fixed in new versions If a version is too old, the vendor might stop offering fixes It might be good to wait to upgrade until after the first round of bug and security fixes

Figure 6-4: Installation and Patching Mechanics of Patching Microsoft Windows: Apply Patches on Start menu (Figure 6-2) LINUX distributions often use rpm (RPM Package Manager - http://www.rpm.org/)

Patching

Figure 6-4: Installation and Patching Patches Often Are Not Applied Companies get overwhelmed by number of patches Use many products, vendors release many patches per product Especially a problem for application programs

Figure 6-4: Installation and Patching Patches Often Are Not Applied Cost of Patch installation Mitigated by patch servers that distribute patches to general servers More easy-to-use vendor tools are needed Might simply lack the resources to apply all; might be selective

Figure 6-4: Installation and Patching Patches Often Are Not Applied Risks of Patch installation Reduced functionality Freeze machines, do other damage—sometimes with no Uninstall possible Should test patch on a test system before deployment Special problem for mission-critical production systems that must work