Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 1: Installing Windows XP Professional
Paula Kiernan Senior Consultant Ward Solutions
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 7 HARDENING SERVERS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Hands-On Microsoft Windows Server 2008
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
1 Securing Operating Systems. 2 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy.
Hands-On Microsoft Windows Server 2008
Module 14: Configuring Server Security Compliance
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 1: Installing Microsoft Windows XP Professional.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 10: Rights, User, and Group Administration.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
Chapter 2 Securing Network Server and User Workstations.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Managing Applications, Services, Folders, and Libraries Lesson 4.
NetTech Solutions Protecting the Computer Lesson 10.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Windows Administration How to protect your computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 6 Application Hardening
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Lesson 16-Windows NT Security Issues
Operating System Security
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Securing Operating Systems Chapter 10

Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves creating a strategy –Review and update software and hardware –Review and update security policy –Assign tasks to specific people –Set a schedule Overall goal is to harden the system (make it more secure) –Hardening is iterative and changing –Hardening may not dissuade a persistent attacker

Maintaining the Operating System: Patches, Fixes, and Revisions A cracker is a person who attempts to compromise your computer system –Hackers don’t generally have malicious intent; crackers do –Terms are often used interchangeably An exploit is a procedure that takes advantage of a vulnerability that can be used to compromise a system –Exploits are routinely shared among crackers, and problems will begin to show up on multiple systems

Antivirus Software Identifies files that contain known viruses Antivirus software has a scanning mode that checks files throughout a system to see if they contain a virus signature –A virus signature is a set of instructions or data that is unique to a particular virus After scanning, the software can remove or repair the virus –Clean the system

Antivirus Software (continued) A virus shield scans incoming files for viruses The virus signature database must be up to date in order to be effective Most antivirus packages offer automatic updates –After an update, you should scan your file system to catch any files that have already been infected A final precaution is to train users to recognize and report suspicious activity

Applying a Post-Install Security Checklist Use a security checklist to ensure that you have achieved all of the required tasks A checklist helps you to stay organized and disciplined A checklist should be based on professional experience –Use standard checklists available from the operating system manufacturer and other resources as basis Customize the checklist for your own environment

Windows Checklist Elements Hardening the Windows Registry –The registry is a central repository for system values –Arranged as a database of registry keys that store values –Can be edited with the Windows Registry Editor or 3 rd party applications –It is important to understand the implications for each key value, changes can be dangerous –Create a backup before editing the Windows Registry

Windows Checklist Elements (continued) Removing Unneeded Services –The default Windows installation enables services that may not be needed in many environments –Extra services consume resources and provide entry points for attackers Securing Networking Protocols and Services –Limit access to services that are not disabled –Use a firewall if you’re connected to the Internet –Disable networking protocols that are not used –Review services related to remote access and networking, and remove any that are non-essential

Windows Checklist Elements (continued) Windows Security Miscellany –Physically secure your computer –Stay up-to-date with operating system patches –Download and use the Microsoft Baseline Security Analyzer (MBSA) and enable the Encrypting File System for Windows XP

Windows Checklist Elements (continued) –Do not use Administrator accounts for everyday user tasks –Disable the Guest account –Use antivirus software –Protect backups and passwords –Enable system auditing and disable CD-ROM auto-run

UNIX Checklist Elements Security philosophy is similar for Windows and UNIX but the details are substantially different Removing Unneeded UNIX Protocols and Services –Disable any non-essential services and daemons –Some services can be disabled by editing the /etc/inet.d file Working with the TCPWrapper –TCPWrapper is a common name for the tcpd daemon –Can accept or deny any packet before it is passed to its target –Suspicious requests can be dropped, logged, and/or an administrator can be notified

UNIX Checklist Elements (continued) UNIX Security Miscellany –Physically secure your computer –Stay up-to-date with operating system patches –Protect super user Ids –Ensure strong user passwords and train users on passwords –Use antivirus software –Protect backups –Enable system auditing and review logs –Run vulnerability scanners against your system

Understanding File System Security Issues The file system is the set of programs that manage and store data on secondary storage The file system is presented as a hierarchical tree structure –The top of the tree is the root directory (the entry point) Disks can be divided into sections called partitions –Each partition has its own file system and root directory In Windows, each file system has a drive letter In UNIX, each file system has a mount point

Securing NT File System (NTFS) NTFS is the preferred file system for Windows servers Designed for file protection in a multi-user environment Each file or folder has associated access control lists File systems offer 6 to 13 possible permissions for files and folders, attributes, and extended attributes –Stored in an access control entry NTFS gives administrators very precise access control for files and folders

Windows Share Security Windows files and printers can be shared with remote users –Enable File and Printer Sharing Three security levels for each share –Global level: anyone can access the share –Share level: requires a password for access –User level: access is restricted to specific users

Understanding User Accounts and Passwords A user account is the primary access requirement for modern systems The most common vulnerability in a user account is a weak password Educate users to create strong passwords –Don’t use dictionary words, common phrases, personal information –Use a different password for each account –Don’t write down passwords, and change them periodically –Use letters, numbers, punctuation, uppercase, and lowercase

Windows Account Security Mechanisms Users are typically created at the domain level In newer Windows operating systems, all security permissions can be centralized –Users can log into any computer in a domain Must have administrator privileges to create user accounts User accounts can be added to groups Permissions can be set at group level –Easier to assign group permissions –Plan and organize account strategy before implementing

UNIX Account Security Mechanisms UNIX accounts are typically local Two levels of account security –User and group File permissions can be set for users or groups Overall security concepts are similar to Windows but details are different

Checksums Catch Unauthorized Changes A checksum is a mathematically generated number that is unique for a particular input –For the same input, the checksum will not change unless the input changes Used to ensure that files haven’t changed without authorization Commonly used in collecting forensic evidence Most operating systems implement utilities for generating checksums –md5sum utility is popular

Using System Logging Utilities Current operating systems have many options for logging activity Logging uses resources –CPU resources –Storage resources –Manpower resources Match logging activity to what is required in your specific environment –Do more logging for systems that require strict security or for new systems, less when not needed

Summary Security maintenance requires a strategic plan for –Reviewing and updating hardware, software, and policies –Assigning and scheduling tasks Crackers try to compromise systems by finding and sharing exploits –System is most vulnerable when a new exploit is discovered To minimize risk, stay up-to-date on –Operating system patches, fixes, and revisions –Antivirus software Antivirus software scans existing files and shields incoming files

Summary Checklists should be used to maintain thorough and disciplined security practices –should be customized for the operating system and the environment File systems generally allow some level of permissions to be assigned to each file/directory to control access User accounts are most vulnerable to weak passwords Checksums are used to tell if a file has been changed System logging is a powerful tool to be used judiciously