Chapter Nineteen Security.

Slides:



Advertisements
Similar presentations
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
 Overview User Accounts Groups User Rights Permissions.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Complete CompTIA A+ Guide to PCs, 6e
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Securing a Wireless Network
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Working with Workgroups and Domains
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Cyber Patriot Training
. CEO & Engineering of W: T: / / MCSA. MCSE. CCNA Heng Nida.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Computer Security. Through your PC, a malicious person can gain valuable information About you and your habits Can steal your files Run programs that.
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2014 Pearson IT Certification Computer and Network Security.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Setting Wireless Network At Home By: Parveen Sharma.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
NetTech Solutions Security and Security Permissions Lesson Nine.
Module 10: Implementing Administrative Templates and Audit Policy.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Methods of Securing Data in Windows Networks
Introducing, Installing, and Upgrading Windows 7
Chapter Nineteen Security.
Chapter 6 – Users, Groups, and Permissions
Introduction to NTFS Permissions
Unit 2, Lesson 5 Windows User Accounts
Chapter 6 Application Hardening
TECHNOLOGY GUIDE THREE
Configuring Windows Firewall with Advanced Security
Securing A Wireless Network
Implementing Network Access Protection
Configuring and Troubleshooting Routing and Remote Access
Business Risks of Insecure Networks
CompTIA Security+ Study Guide (SY0-401)
Complete CompTIA A+ Guide to PCs, 6e
How to scan system with norton-antivirus Norton antivirus is one of the worlds best anti-malware software developed by Symmantics corporation in 1991 as.
Figure 6-9: Managing Users and Groups
12 STEPS TO A GDPR AWARE NETWORK
CHAPTER Introduction to LANs
Operating System Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Securing Windows 7 Lesson 10.
Instructor Materials Chapter 12: Security
Operating System Basics
Cybersecurity and Cyberhygiene
CIS101B Week 4 Class 1 Chapter 12 Security 12.1 through 12.6
Presentation transcript:

Chapter Nineteen Security

220-902 Objectives Covered 3.1: Identify common security threats and vulnerabilities. 3.2: Compare and contrast common prevention methods. 3.3: Compare and contrast differences of basic Windows OS security settings. 3.4: Given a scenario, deploy and enforce security best practices to secure a workstation. 3.5: Compare and contrast various methods for securing mobile devices. 3.6: Given a scenario, use appropriate data destruction and disposal methods. 3.7: Given a scenario, secure SOHO wireless and wired networks.

Common Prevention Methods Physical security Digital security User education Principle of least privilege

Physical Security

Common Security Threats Social Engineering Malware

Types of Viruses Armored Companion Macro Multipartite Phage Polymorphic Retro Stealth

Workstation Best Practices Set strong passwords. Require passwords. Restrict user permissions. Change default usernames. Disable the guest account. Make the screensaver require a password. Disable autorun functionality.

Windows Users and Groups Administrator(s) Power User Guest User

NTFS Directory Permissions Full Control Modify Read & Execute List Folder Contents Read Write

NTFS File Permissions Full Control Modify Read & Execute Read Write

Mobile Device Security Screen locks Remote wipes Device locator applications Remote backup

Destruction and Disposal Methods Low-Level Format vs. Standard Format Hard Drive Sanitation and Sanitation Methods Physical Destruction

Securing a SOHO Network Change the default SSID. Disable SSID broadcasts. Disable DHCP or use reservations. Use MAC filtering. Use IP filtering. Use strongest security available on the access point. Change the static security keys every two to four weeks. Limit the user accounts that can use wireless connectivity. Use a preauthentication system, such as RADIUS. Use remote access filters. Use IPSec tunnels over the wireless links. Turn down the signal strength. Remove wireless access from your LAN.