Bethesda Cybersecurity Club

Slides:



Advertisements
Similar presentations
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Advertisements

Windows Vista Serious Challenges for Digital Investigators Authors: Darren Hayes Shareq Qureshi Presented By: Prerna Gupta.
Objectives Overview Define an operating system
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Operating System Customization
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Operating Systems Day 1. Booting a Computer 1.Switch on the UPS electricity supply - green light electricity failure - red light charging – orange light.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Windows Tutorial 9 Maintaining Hardware and Software
Lesson 10 Operating System Customization
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Cyber Patriot Training
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Ch 8. The Control Panel Window –Category View The Control Panel Window –Small icons View.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Operating Systems JEOPARDY Computer Repair GeneralConcepts OS Tasks MoreConcepts Using the OS Misc
Troubleshooting Windows Vista Security Chapter 4.
Explain the purpose of an operating system
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
NetTech Solutions Security and Security Permissions Lesson Nine.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Alessandro Cardoso, Microsoft MVP Creating your own “Private Cloud” with Windows 10 Hyper- V WIN443.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
CHANGING THE VOLUME Click the volume icon in the bottom right hand corner of the screen.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
1 Lesson 10 Operating System Customization Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
Windows Tutorial 5 Protecting Your Computer
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Computers: Tools for an Information Age
Chapter 1 Objectives Understand the History of Windows Over the Last 20-Plus Years. Compare and Contrast the Available Editions of Windows 7. Understand.
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Chapter 6 Windows Configuration and Management
6 Windows 10.
Computing Fundamentals
How to Install Norton Antivirus in your Computer
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Chapter 6 Application Hardening
© 2015 Air Force Association
Installing Software Tutorial 11.
FTP - File Transfer Protocol
Understanding Operating System Configurations
How to Fix Windows 10 Update Error 0x ?.
Lesson 10 Operating System Customization
Press ESC for Startup Options © Microsoft Corporation.
Information Technology Ms. Abeer Helwa
Connecting Remotely Winter 2014.
Windows Tutorial 9 Maintaining Hardware and Software
Bethesda Cybersecurity Club
Bethesda Cybersecurity Club
Securing Windows 7 Lesson 10.
PLANNING A SECURE BASELINE INSTALLATION
Introducing Windows Operating Systems
Microsoft Windows 7 Basics
Windows Operating System
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

Bethesda Cybersecurity Club Lesson 4 MS Windows and Practice Images

Agenda MS Windows background Windows Versions System accounts Windows 7 & 8 security tools practice images

Cybersecurity Tasks Readme / Forensics Questions Configure Firewalls Disable ports Update OS Update Software/applications Audit User Accounts Delete Change permissions Add Passwords Password Policy Length Complexity Duration Lockout Manage Services Disable / Enable File management Delete Adjust permissions Antivirus application Enable Configure Update Enable Encryption

Microsoft Windows 1981 1992 1995 2001 2006 2009 2012 2015

Windows XP and Server 2003 Lightweight (64 MB Ram, 1.5GB HD) User Experience Focus XP is first version to use Remote Desktop Security Concerns: 2014 – discontinued support and updates 250 million people still use XP Outdated hardware and software may have more issues

Windows VISTA and Server 2008 Updated GUI and windows sidebard for gadgets Windows defender Backup and restore center User account control (UAC) Bitlocker – full disk encryption Security concern: UAC is useful, but not very usable

Windows 7 and server 2008 R2 Significant speed improvements over vista Improved searching and more nuanced UAC Action Center – centralized location to notify user of major security issues Supports biometric authorization Security concern: Most widely used OS is the most targeted by malicious users

Windows 8/8.1 and server 2012 Focus on support for tablets and touch screens Windows store and Tiled Start Screen Windows 8.1 restored the Start Button Windows Defender includes MS Security Essentials which provides antivirus support Cloud storage and sync Security concern: “Picture passwords” can be more easily cracked than traditional strong passwords

Who was able to create user accounts? System Accounts

Windows 7 & 8 security tools Start  Control Panel  System and Security  Administrative Tools  Local Security Policy Click Account Policies  Password Policies

Account Lockout policies Account policies govern unsuccessful attempts to log into an account Account policies  account lockout policies

Windows updates Control panel  system and security  windows update

Action center and Windows Defender Start  Control panel  system and security  action center Notifies you if windows identifies problems with or updates for: Windows updates Internet security settings Network firewall Spyware and related protection User account control Virus protections Windows backups Windows troubleshooting Control panel  system and security  Action center

Firewalls Control panel  system and security  action center  turn on now

Practice Images Download ZIP File Check Md5 hash Unzip File Provision Virtual Machine

Next week Windows security auditing Server 2016 Pico Capture the Flag (CTF): picoctf.com “free, online” computer security game targeted at middle and high school students created by Carnegie Mellon University Competition Dates: September 27, 2019 - October 11, 2019 Participants: age 13 or older; Individual or team up to 5 participants General Skills Linux and Command Prompt Cryptography Web Exploitation Forensics Binary Exploration Reverse engineering Ctf101.org