Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human aspects of security
Course ILT Topic A Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security
Course ILT User accounts Object that represents a user of the computer –Name, password, group membership User Administrator Guest
Course ILT Groups Management tool for applying security settings to multiple users Users Administrators Power Users
Course ILT Active Directory Management framework Centralized database of security data Domains Forests Organizational units
Course ILT Activity A-1 Securing access to the operating system
Course ILT File system security Logical organization scheme for files Windows supports: –File Allocation Table (FAT) –FAT32 –NTFS Only NTFS supports security
Course ILT NTFS advantages Larger disks Security Compression and encryption Disk quotas Recovery logging
Course ILT Activity A-2 Choosing the correct file system for security
Course ILT NTFS security Security tab in Properties dialog box Permissions are cumulative Explicit permissions override inherited permissions Permissions are inherited unless blocked Set permissions on folders and files
Course ILT NTFS permissions Full control Modify Read and Execute List Folder Contents Read Write Special Permissions
Course ILT Enabling the Security tab 1.Open Windows Explorer 2.Choose Tools, Folder Options 3.Activate the View tab 4.Clear the checkbox beside Use simple file sharing 5.Click OK
Course ILT Activity A-3 Configuring file access restrictions
Course ILT Encryption Scrambling of data Public key cryptography –Pairs of keys –Whichever encrypts, the pair decrypts Encrypting file system (EFS)
Course ILT Activity A-4 Encrypting files
Course ILT Authentication mechanisms Biometric devices Smart cards Fobs Digital certificates
Course ILT Authentication Identity validated Workgroup vs. domain Local computer vs. domain Network authentication
Course ILT Protocols Kerberos v5 –Supported by: Windows 2000, Windows XP, and Windows Server 2003 NTLM –Supported by Windows NT, Windows 9x
Course ILT Activity A-5 Understanding authentication technologies
Course ILT Security policies Password Policy Account Lockout Policy Audit Policy User Rights Assignments Security Options Encrypting File System Software Restriction Policies IP Security Policies
Course ILT Activity A-6 Using local security policies to set password restrictions
Course ILT Topic B Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security
Course ILT A fingerprint scanner
Course ILT Activity B-1 Installing a fingerprint reader
Course ILT Smart card and reader
Course ILT Installing IdentiPHI Basic 1.Install the card reader and its drivers 2.Install the IdentiPHI Basic software 3.Configure IdentiPHI Basic to accept smart cards 4.Enroll a smart card and set a secure PIN for that card
Course ILT Activity B-2 Installing a card reader
Course ILT Activity B-3 Installing the IdentiPHI Basic software
Course ILT Activity B-4 Configuring IdentiPHI Basic to accept smart cards
Course ILT Activity B-5 Enrolling a smart card with IdentiPHI
Course ILT Activity B-6 Using a smart card
Course ILT Activity B-7 Uninstalling the smart card reader and software
Course ILT Fobs Keychain sized devices Creates a rolling code Might need username and password, in addition to fob number Rolling code not random
Course ILT Topic C Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of security
Course ILT Alleviate security weaknesses Restrict physical access to sensitive systems and data Create an automated backup schedule Manage data destruction Create a corporate security policy Manage social engineering attacks
Course ILT Physical access restrictions Lock server rooms Lock PC cases and peripherals Use cameras or motion-sensor alarms Station guards in ultra-sensitive areas
Course ILT Activity C-1 Implementing physical access restrictions
Course ILT Backup Use to create copies of your files Recover files after system failure Back up any critical data before you begin troubleshooting Windows Backup is a GUI utility –Archive selected files and folders –Restore archived files and folders –Make copy of computer’s system state –Copy your computer’s system partition, boot partition, and files needed to start up the system
Course ILT Backup utility in Windows XP
Course ILT Backup modes Wizard mode — walk you step-by-step through the process Advanced mode — provides complete control over file and folder selection
Course ILT Backup utility in Advanced Mode
Course ILT Backup types Copy Daily Differential Incremental Normal
Course ILT Activity C-2 Backing up files using Wizard mode
Course ILT Activity C-3 Restoring information from a backup
Course ILT Scheduling backups Daily Weekly Monthly At predefined times On predefined days continued
Course ILT Scheduling backups, continued
Course ILT Activity C-4 Scheduling a backup
Course ILT Data destruction and migration Destruction utilities Removable media and drives Paper records Data migration
Course ILT Activity C-5 Examining data destruction techniques
Course ILT Corporate security policies Contract between company and employees Heightens awareness Demonstrates commitment Spells out permitted and prohibited uses of company resources, plus repercussions Intrusion handling plans Regularly review and update
Course ILT Activity C-6 Considering corporate security policies
Course ILT Social engineering attacks Social engineering includes: –Tricking users into divulging sensitive information –Phishing –Dumpster diving –Shoulder surfing –Trojan horse attachments –Sneaking into secure areas through deception Training and awareness are best defenses
Course ILT Malicious software Virus Worm Trojan horse Spam Spyware Adware Grayware
Course ILT Prevention Training Corporate security policy Antivirus software
Course ILT Activity C-7 Managing social engineering attacks
Course ILT Network security Firewalls Password management Account management Incidence reporting
Course ILT Activity C-8 Examining network security
Course ILT Unit summary Configured operating system and file system security Installed a fingerprint scanner and card reader Managed the human aspects of security