ANTICLICK: INCREASING DESKTOP SECURITY Jason Petrey Computer Electronic Networking Dept. of Technology Eastern Kentucky University.

Slides:



Advertisements
Similar presentations
IT Technical Support South Nottingham College. Aims Knowledge of the Registry Discuss the tools available to support a technician Gain an understanding.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
TEMPLATE DESIGN © Bluetooth Login Key RIT Computer Engineering Senior Design Project Tim Wesley, Dan Chen Spring 2009.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
The sequence of folders to a file or folder is called a(n) ________.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Maintaining and Updating Windows Server 2008
KEEP YOUR COMPUTE SAFE AND HOW TO FIX IT 1. OBJECTIVE Keep your computer safe. -Not about spam, phishing or browser hijacks Designed for the non-geek.
Online testing made effective and easy. The easy way to have your tests answered and scored online. If you have a test in a PDF file, it can be online.
Screen Clipping. Screen 3 rd Party Software Print Screen Copying images from the internet is easy. But if can also violate the copyright laws of.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Configuring Task Scheduler Lesson 9. Skills Matrix Technology SkillObjective Domain SkillDomain # Understanding Task Scheduler Configure and manage the.
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
Sr. Manager Global Business Solutions Carlos Capó Master Macs in Business Easily integrate Macs into a Microsoft Shop.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
ITIS 2110 Class # No home network devices devices devices devices devices devices devices 9.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Week #7 Objectives: Secure Windows 7 Desktop
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Office Live Workspace Visio 2007 Outlook 2007 Groove 2007 Access 2007 Excel 2007 Word 2007.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
1 Chapter Overview Configuring and Troubleshooting the Display Configuring Power Management Configuring Operating System Settings Configuring and Troubleshooting.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Clearly Visual Basic: Programming with Visual Basic 2008 Chapter 4 I Need a Tour Guide.
CSC8320. Outline Content from the book Recent Work Future Work.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Output Design. Output design  Output can be: Displayed on a screen/VDU/monitor. Printed on paper as hard copy. Sound.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
System Hacking Active System Intrusion. Aspects of System Hacking System password guessing Password cracking Key loggers Eavesdropping Sniffers Man in.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
NT4 SP4 Security Jack Schmidt - Fermilab
Aaron Fore Network Security & Electronics Department of Applied Engineering and Technology.
Welcome, Parents. Check out what’s new for 2012! Now there’s an app for our school directory.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
1 Programming Environment and Tools VS.Net 2012 First project MSDN Library.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Chapter 3 I Need a Tour Guide (Introduction to Visual Basic 2010) Clearly Visual Basic: Programming with Visual Basic nd Edition.
CSCE 201 Identification and Authentication Fall 2015.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
EBay Searcher Brian Payton, Jason Nowakoski, Justin Szeluga, Salvatore Siragusa, David Wolkiser.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Maintaining and Updating Windows Server 2008 Lesson 8.
How to Recover Forgotten Windows 8 Password?. Boring Problems I stupidly forgot my Windows 8 password, how can I remove or reset it? What should I do.
Digital Skills Award Day 1 – Introduction to your Programme of Learning.
Chapter 2 Operating Systems
Chapter 3: I Need a Tour Guide (Introduction to Visual Basic 2012)
Chapter Objectives In this chapter, you will learn:
Cat Litter Box Ventilation System
Chapter 2: System Structures
Basic Computing for Teachers
forgot laptop password Windows 10 with no reset disk
WHAT IS WINDOWS MULTIPOINT SERVER 2012?
Presentation transcript:

ANTICLICK: INCREASING DESKTOP SECURITY Jason Petrey Computer Electronic Networking Dept. of Technology Eastern Kentucky University

OUTLINE Basic Idea Motivation Password Security Problem Statement Solution Conclusion Future Work 2

3 SECURITY GAP Windows user passwords are not secure enough There is a need for a security application to protect a user after the log on process, so I developed one

4 MOTIVATION During my studies at EKU I was shocked at how unsecure the windows user password is. I remembered a security program that I had started in high school. Now had the knowledge and skills needed to complete the program I had started in high school.

5 PASSWORD SECURITY In 2003 a Swiss researcher reduced the time it takes to crack a password like a windows users password from little less than 2 minutes to 13.6 seconds. (Lemos, 2003)

PASSWORD SECURITY Quick list of free ‘tools’ Ophcrack Offline NT Password & Registry Editor Cain & Abel LCP John the Ripper (Fisher) 6

7 PROBLEM STATEMENT With the lack of security in windows user passwords a program is needed to protect a user account after the user logs on.

8 PROPOSED SOLUTION Anticlick: Screen Lock Clear form covering the entire screen. Blocks key combinations that could normally bypass the program. Requires pressing two keys, defined by the user, to bring up password entry, settings, or change password screens

9 PROPOSED SOLUTION Anticlick: Screen Lock (cont.) Ability to run on startup/log on and text message warnings on a user defined number of failed attempts at the password All information protected with 3DES encryption (a three-step data encryption algorithm )

10 PROPOSED SOLUTION Anticlick: Administrator Control Panel Provide administrator override password that will work for any user Allows an administrator to edit anticlick settings on all local users who have already ran Anticlick: Screen Lock All information protected with 3DES encryption

BLOCK DIAGRAM 11

12 MAIN FORM

PASSWORD FORMS 13

SETTINGS FORM 14

ADMIN CONTROL PANEL 15

KNOWN VULNERABILITIES Operating system that boot from removable media Safe Mode An occasional bug that places the start bar above the for that blocks mouse key strokes. 16

17 CONCLUSIONS When run on startup Anticlick is an effective invisible layer of protection for a user. When ran manually it makes an effective screen lock. When working with Visual Basic always start research on MSDN (Microsoft Developer Network)

CONCLUSIONS It is surprisingly easy to integrate functions from external Dynamic-link libraries and windows API (application programming interfaces) functions into programs using Visual Studio, which helps a programmer create programs. 18

19 FUTURE WORK Multiple monitor support Windows service integration Remove the assumptions about the host system that are hard coded to increase compatibility

20 FUTURE WORK Administrator Control Panel to establish settings for users who have not yet ran the Anticlick: Screen Lock Sell for profit or distribute as freeware /shareware Permanent

REFERENCES Lemos, Robert. (2003, July 22). Cracking Windows passwords in seconds. Retrieved April 10, 2010, from Fisher, Tim. Top 5 Free Windows Password Recovery Tools. Retrieved April 10, 2010, from ssrecovery.htm ssrecovery.htm 21

PROJECT ACKNOWLEDGEMENTS WindowsHooksLib.dll from Provided Keyboard Hooking MSDN Microsoft repository of dot net programming (including visual basic) and developer forum 22

PROJECT ACKNOWLEDGEMENTS sms411.net How to send to phones as text message How to interact with the registry How to interact with the registry 23