1 Operating Systems Security. 2 Where Malware hides ? Autoexec.bat or autoexec.nt can start malware before windows start Config.sys, config.nt Autorun.inf.

Slides:



Advertisements
Similar presentations
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Chapter 7 HARDENING SERVERS.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 7 Administering Web Resources in Windows Server 2003.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Hacking Web Server Defiana Arnaldy, M.Si
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
1 Computer Security: Protect your PC and Protect Yourself.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
eScan Total Security Suite with Cloud Security
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Security for Seniors SeniorNet Help Desk
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
. CEO & Engineering of W: T: / / MCSA. MCSE. CCNA Heng Nida.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
SECURITY BASELINES -Sangita Prabhu.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Troubleshooting Windows Vista Security Chapter 4.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Installing SME Version 5 –1)Set the computer to boot from the CDRom by changing the BIOS setting. –2)Startup the computer with the CD in the CD drive –3)Type.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Module 2: Overview of IIS 7.0 Application Server.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Internet Security and Your Computer Welcome to Boot Camp.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
CHAPTER 3 Securing your PC and LAN Suraya Alias. Securing your desktop or Notebook Computer ◦Know an access control ◦Limit use of the administrator accounts.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
TMG Client Protection 6NPS – Session 7.
Chapter 6 Application Hardening
Common Methods Used to Commit Computer Crimes
Instructor Materials Chapter 7 Network Security
Configuring Windows Firewall with Advanced Security
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Windows Vista Inside Out
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

1 Operating Systems Security

2 Where Malware hides ? Autoexec.bat or autoexec.nt can start malware before windows start Config.sys, config.nt Autorun.inf on CD-ROMs or even hard drives Boot.ini, bootsect.dos, command.com, dosstart.bat msdos.sys, io.sys Desktop.ini -Can be used to hide files and auto- launch programs when a folder is viewed Host, lmhost Manipulating SMTP server settings or the Host file and intercepting sent .

3 Malware (cont) Nested archives (zip, rar, tar, cab) -detected only by recursive scanning Auto-run files in archives Embedded applications in Documents (word, PowerPoint, excel) Embedded macros in documents -Can secretly send a named doc to a remote sender OLE2 formatted documents can be executed Rasphone.pbk -Can modify dialup network setting including DNS and make long distance calls

4 Malware (cont) Startup folder Web cache -malware dropped in by websites Path variable -illegitimate program will run then load legitimate program Trusted publishers -can execute programs w/o user approval Registry entries Embedded URLs in HTML s (can execute programs)

5 Malware Trends Moving from hobby to criminals ⇒ more attempts to gain financial information Viruses are distributed through compromised websites Compromised clients are then directed to download more malware

6 Magnitude of the Problem

7 Defenses Don't give users Admin access ⇒ Windows Vista requires "run as administrator" for Privileged operations:  Install or uninstall programs  Configure windows system settings  View or change security permissions  Change networking configuration  Stop, start, load, or pause services  Modify drivers  Registry  etc.

8 Defenses (Cont) Update often Use Personal firewall Use antivirus software -keep updated Use anti-spam Use anti-spyware Boot-up password Boot only from primary hard drive -Can't load NTFS4DOS Password protect the bios

9 Defenses (Cont) Disable guest account Rename administrator account -unlimited retries Rename guest account to administrator -helps catch hackers Run services on non-default ports Install software on non-default folders Use encrypted file system (EFS) Disable LM and NTLM authentication Enable account lockout after a certain number of tries

10 Defenses (Cont) Use two factor authentication -biometric, smart card, USB token, etc. Disable Simple File Sharing. SFS removes most NTFS permissions to close to Share. All connecting users come in as administrator or guests

11 Passwords

12 Windows Login Passwords

13 Password Attacks

14 Password Attacks

15 Password Attacks

16 Password Authentication Mistakes

17 Application Security

18 Phishing Attachments HTML content (autopreview) Spam: Spamming tools to introduce misspellings to avoid detection, to harvest s from web sites, usenet groups, chat channels Most is plain text ⇒ Can be read by any one Match the senders domain with IP address Set rate control on: Connections per client, s per client, number of recipients per Personal black and white lists

19 Browsing IE MIME type mismatch -Declare skin but send java script IE Plug-ins, Active X controls, Java scripts Password and form input saving in browsers and in-line auto complete Empty Temporary Internet Files folder when browser is closed

20 Web Servers Directory Traversal:  dir+c  will be converted to c:\windows\system32\cmd.exe in unpatched versions of IIS 5.  Allows a command shell access to the hacker

21 Summary Need to secure systems against theft of data –bios password, boot password Passwords must be strong. Use two-factor authentication for critical applications. 10 Immutable Laws of Security Secure and browsing

22

23 Any question ?