Cyber Patriot Training

Slides:



Advertisements
Similar presentations
Your Definitive Lockdown Guide
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Cyber Patriot Training
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Lesson 19: Configuring Windows Firewall
Maintaining and Updating Windows Server 2008
Enterprise Network Security Accessing the WAN Lecture week 4.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Module 8: Implementing Administrative Templates and Audit Policy.
Windows Operating Systems Basic Security. Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major.
What are computers? Computers are machines that perform tasks or calculations according to a set of instructions, or programs. The first fully electronic.
Ch 11 Managing System Reliability and Availability 1.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Tutorial 11 Installing, Updating, and Configuring Software
Using Windows Firewall and Windows Defender
Managing Windows Server 2008 R2 Lesson 2. Objectives.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Module 14: Configuring Server Security Compliance
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Chapter 4 Initial Configuration Tasks. Understanding the Initial Configuration Tasks window Microsoft now provides a new feature, the Initial Configuration.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Realtime Technologies, Inc. Distributed Simulation Training  April 2005.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
June 14, 2007 © 2007 Bill Barnes Own Your Computer Presented for the PCCC Own Your Computer Demonstrated on Windows XP and Office 2003 Presented to Personal.
Small Business Security Keith Slagle April 24, 2007.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Module 8 : Configuration II Jong S. Bok
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
Module 8: Managing Software Distribution. Collections Packages Programs Advertisements Collections Packages Programs Advertisements How Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Module 10: Implementing Administrative Templates and Audit Policy.
Understand Permissions LESSON Security Fundamentals.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Windows Administration How to protect your computer.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Maintaining and Updating Windows Server 2008 Lesson 8.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows XP Professional Not Finish Yet
Windows Tutorial 5 Protecting Your Computer
Windows Security.
Chapter 6 Application Hardening
Chapter 4: Security Baselines
Malware aka- malicious software By: Ken Fogel
How to Fix Windows 10 Update Error 0x ?.
Intuit has launched QuickBooks File Doctor tool (QBFD) in QuickBooks File Doctor is a tool that has been designed to recover the damaged company.
Setting the Permissions
Figure 6-9: Managing Users and Groups
Bethesda Cybersecurity Club
Test 3 review FTP & Cybersecurity
Bethesda Cybersecurity Club
Presentation transcript:

Cyber Patriot Training Ken Dewey Rose State College

Local Security Policy What is it? Where is it? Used to directly modify account and local policies, public key policies and IP security policies for your local computer Where is it? Start > Control Panel > Administrative Tools > Local Security Policy

Local Security Policy What should I look for? More information Default User Rights, Security Templates, Password Policies, etc More information http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/lpe_topnode.mspx?mfr=true

Local Security Policy

User & Group Configuration What is it? Policy is typically assigned at the group level and then users are assigned into groups. It is very important that your groups are configured correctly and your users are in the appropriate groups. Where is it? Start > Control Panel > User Accounts

User & Group Configuration What should I look for? Users in correct groups for their job, all users have password protected account, etc Guest account turned off More information http://support.microsoft.com/kb/307882 http://www.kellys-korner-xp.com/xp_groups.htm

User & Group Configurations

BackDoor/Virus/Malware What is it? A malicious program that allows a computer to be remotely controlled or exploited Where is it? Can be anywhere on your computer (memory, harddrive, registry, flash drive, etc)

BackDoor/Virus/Malware What should I look for? Look for files and folders that do not belong. Start in the root of C:\ and comb through the file system. Bogus file extensions, files with no name or a garbled name, files that should be small but are huge, etc. More information http://www.wikihow.com/Remove-a-Virus http://news.frbiz.com/windows_system_the_virus_most-275070.html

Installing Anti-Virus Microsoft Security Essentials Sufficiently protects computer from malicious attacks, and roots out viruses After downloading/installing be sure to update the software

Installing Anti-Virus

Installing Anti-Virus Update the MSE Virus Database, and Spyware Database

Enable Windows Firewall Start > Control Panel > Windows Firewall

DNS How to check DNS configuration Host file DHCP C:\windows\system32\drivers\etc DHCP Check via ipconfig /all

Task Manager vs. Process Explorer Malicious Processes can be executing on the computer Windows Task Manager shows processes Process Explorer shows a more detailed analysis of what is running on computer

Task Manager vs. Process Explorer

Task Manager vs. Process Explorer

File/Folder Permissions What is it? The guidelines on who should be able to and how they should be able to access any particular file or folder. Where is it? Right click any file or folder > Properties > Sharing and Security tabs

File/Folder Permissions What should I look for? Folders that are shared that don’t need to be, folders that have full permissions for all users that don’t need to be, etc More information http://articles.techrepublic.com.com/5100-10878_11-5308684.html

File/Folder Permissions

Vulnerable Services What is it? Where is it? Services are programs that run in the background and perform a specific task. Where is it? Start > Run > Services.msc

Vulnerable Services What should I look for? More information Services running that don’t need to be (Telnet, SSH, etc) More information http://techrepublic.com.com/i/tr/downloads/home/windows_xp_services_that_can_be_disabled.pdf

Vulnerable Services

Vulnerable Services

Patching & Updating What is it? Where should I look? Patches are updates to your operating system (or some program) that add functionality, fix bugs/errors/security holes, etc Where should I look? Start > Windows Update

Patching & Updating What should I look for? More information Make sure that you have all the latest updates and service packs. More information http://update.microsoft.com

Patching & Updating

Patching & Updating