Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Breaking Trust On The Internet
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Your Computer & Your Information
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
PLUG IT IN SIX Protecting Your Information Assets.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
 A short talk on Windows security for the SEC module  Slides available at
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
A Quick and Easy Crash Course Internet Safety for Everyone.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Windows Tutorial 5 Protecting Your Computer
INTERNET SAFETY FOR EVERYONE
Joseph J. Malone Security for Seniors Joseph J. Malone
What they are and how to protect against them
Edexcel GCSE Cyber security threats Computer Science 1CP1
Hotspot Shield Protect Your Online Identity
Unit 4 IT Security.
Personal spaces.
TECHNOLOGY GUIDE THREE
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Norton Antivirus How to install Norton antivirus on windows 8 | Norton.com/setup download.
Protect Your Computer Against Harmful Attacks!
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Information Security Session October 24, 2005
Internet Safety for Everyone
Internet Safety for Everyone
Implementing Client Security on Windows 2000 and Windows XP Level 150
Internet Safety for Everyone
Internet Safety for Everyone
How to Stay Safe Online Rollie Edwards.
Security in mobile technologies
Internet Safety for Everyone
Internet Safety for Everyone
Wireless Spoofing Attacks on Mobile Devices

Presentation transcript:

Windows Security A practical approach

Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters PunctuationPunctuation SymbolsSymbols NumbersNumbers Password Checker Password Checker privacy/password-checker.aspxhttp:// privacy/password-checker.aspx

Password Password is known ONLY to user Password is known ONLY to user Storing/Managing Passwords Storing/Managing Passwords Password algorithmsPassword algorithms Password files Password files

File System NTFS Security Advantages NTFS Security Advantages Access Control ListAccess Control List Granular structureGranular structure Supports server authenticationSupports server authentication Ability to encrypt files and directoriesAbility to encrypt files and directories Encrypted File System (EFS) Encrypted File System (EFS)

PERMISSIONS For files, directories, networked devices APPLICABLE ON: - Users - Computers - Networked devices - Groups of: -Users -Computers -Networked devices INHERITANCE NTFS Access Control

Surfing the Internet Browsers Browsers FFFF IEIE Others (Opera, Chrome, etc)Others (Opera, Chrome, etc) Browser Add-ons Browser Add-ons NoScriptNoScript FlashBlockFlashBlock

Environmental Threats COMPONENT OBJECT MODELS Object Linking and Embedding (OLE) Object Linking and Embedding (OLE) Remote Procedure Call (RPC) Remote Procedure Call (RPC) ActiveX ActiveX JAVA APPLETS

External threats Browser related Browser related Hijacks (BHO)Hijacks (BHO) Drive-by downloads Drive-by downloads WMF (2005), ActiveX, DCOM WMF (2005), ActiveX, DCOM Scams Scams Confidence trickingConfidence tricking Phishing Phishing Fake sFake s ID Theft ID Theft Data harvestingData harvesting Social Engineering Social Engineering Psychological manipulationPsychological manipulation Targeted Malware Targeted Malware Silent_bankerSilent_banker

Human Error s s Downloads Downloads P2PP2P Underground sourcesUnderground sources System patches out of date System patches out of date Clicking without reading/fully understanding (‘Nexters’) Clicking without reading/fully understanding (‘Nexters’)

Privacy Indexing services Indexing services Google DesktopGoogle Desktop Social websites Social websites FacebookFacebook ID Threats ID Threats Facebook Applications Facebook Applications Source of infectionSource of infection Data miningData mining Search engines Search engines GoogleGoogle Scrapped google engine (Scroogle) Scrapped google engine (Scroogle) IxquickIxquick DuckDuckGoDuckDuckGo

Operating System Security Software Anti Virus Anti Virus Microsoft Security Essentials (MSE)Microsoft Security Essentials (MSE) Anti Spy/Malware Anti Spy/Malware Windows DefenderWindows Defender Tracking Software Tracking Software AdeonaAdeona Firewall Firewall Windows FirewallWindows Firewall Sygate Personal FirewallSygate Personal Firewall

Common Sense Strong Password Strong Password Latest updates Latest updates Unprivileged user account Unprivileged user account Read EVERYTHING on screen Read EVERYTHING on screen Never disclose any login details Never disclose any login details Never believe in something for nothing Never believe in something for nothing Be Aware Be Aware Better safe than sorry Better safe than sorry

Safe System Internet Browsing Internet Browsing Tightened settings for BrowsersTightened settings for Browsers Do not log in as AdministratorDo not log in as Administrator Build up adequate layer of defence through application layerBuild up adequate layer of defence through application layer Real-Time anti-vir/spy/mal/ad wareReal-Time anti-vir/spy/mal/ad ware Electronic Mail Electronic Mail Set up for plain text onlySet up for plain text only Be careful what you subscribe toBe careful what you subscribe to (mailing list harvesting) Spam filtersSpam filters address obfuscating address obfuscating Structuring multiple addresses for different purposesStructuring multiple addresses for different purposes System layer System layer Hidden files (double extensions)Hidden files (double extensions) Start-upStart-up Active software protectionActive software protection

THE END Thank you