Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Assurance in Windows-based Networks Mark Boyer.

Similar presentations


Presentation on theme: "Data Assurance in Windows-based Networks Mark Boyer."— Presentation transcript:

1 Data Assurance in Windows-based Networks Mark Boyer

2 Ways To Assure Data In A Network Authentication and Authorization Encryption/decryption Virtual Private Networks (VPN) Firewalls Virus and Worm Protection Spyware Protection Wireless Security

3 Authentication and Authorization Authentication – a security feature that allows administrators to control who has access to your network Usually done by using something or a combination of items that a person has, knows, or is/does EX: ID cards, usernames/passwords, fingerprints Authorization – identifies what the users that are authenticated, are allowed to access while on the computer system Such as classified files or specific work groups

4 Windows Password Tools Specify length and complexity of users passwords XP allows passwords to be from 0 to 128 characters Complexity setting requires user to meet 3 of 4 requirements Lower case letters, uppercase letters, numbers, and special characters

5 Windows Password Tools cont. Minimum Password Age – min amount of days before user can change their password Maximum Password Age – max amount of day before user has to change their password Enforce Password History Setting – makes sure users can not reuse older passwords Account Lockout – can set system to lock out a user if they enter the wrong password to many times Can set to unlock manually or automatically

6 Restricting Logon Hours & Location Windows administrators can set time of day, day of week, and location of accessing the networks Restricting reasons System backup Don’t want anyone on the system during this process Policy restrictions You don’t want people that deal with sensitive materials to be able to access them out of the office

7 Windows Authorizing Access Two Ways Sharing permissions NTFS Permissions

8 Sharing Permissions Applied only to folders shared over the network Files within these folders inherit same permissions as the folder Permissions only apply to users trying to access through the network, not locally

9 NTFS Permissions Can assign to both folders and files Also can restrict local users as well as ones logged in over the network Assign permissions to individual users or groups of users Has 6 different standard permissions and 14 different special permissions

10 Windows & Encryption Encoding of data used to protect data transferred over a network or the internet Two ways of windows encryption IP Security (IPSec) Encrypting File Systems (EFS)

11 IPSec Most popular method of encrypting data It works by creating an connection between two devices Done by one of three ways of authenticating Preshared key – special key entered on both devices by an admin Kerberos authentication – special key generated by the OS (more secure) Digital certificates – uses a third party known as Certification Authority (CA) Must apply for a digital certificate from CA When communication takes place each device sends certificate to CA for verification

12 Three Standard IPSec Policies in Windows Client (Respond Only) – only uses secure communication if the other device suggests it Server (Request Security) – requests IPSec communication if its supported Allows unsecure communication if it isn't supported Secure Server (Require Security) – requires IPSec Rejects any device that does not support it

13 Encrypting File Systems (EFS) Process of encrypting data on the computers disk drive so that only the file creator and data recovery agent can decrypt it Data recovery agent usually administrator This is useful if someone gains access to your hard drive

14 Windows VPN’s Virtual Private Networks are temporary or permanent connections across a network such as the internet that use encryption to send and receive data. Windows Offers Two Different types Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) More Secure Than PPTP Supports advanced authentication and encryption tech.  Requires Windows machines on both sides of the connection

15 Benefits of VPN Offer a more secure line of communication Helps improve companies productivity Faster and more cost effective for remote users More cost effective than implementing a wide area network (WAN)

16 Firewalls Hardware or software programs that inspects packets going in and out of the system weeding out ones that are not desired Windows has implemented its own personal firewall into its operating system It basically monitors traffic in and out of the system and stops anything suspicious and possibly harmful

17 Online Firewall Software ZoneAlarm Firewall Armor2net Personal Firewall 3.12 Commando Firewall Pro Tiny Personal Firewall 6.5 There are tons of them

18 Malware Protection Any software that is meant to cause harm or disruption to any computer system Virus program that spreads by replicating itself into other programs or documents Goal corrupt or delete files Worm Self contained program that spreads by replicating itself Does not need help to spread Goals send emails, delete files, create backdoors, use up network bandwidth

19 Malware cont. Trojans program that appears to be something useful but is really a form of malware such as free utilities Spyware (sniffing software) Collects info about activities on the computer they are on and reports them back to one who put them on there

20 Anti Virus Software Can be expensive to maintain but it is much more expensive to lose critical company data Available Software AVG Anti-Virus Free Addition AVAST home addition Avira AntiVir Personal – Free Antivirus Norton AntiVirus McAfee Virus Scan Plus

21 Spyware Software Removes spyware that is on your computer system, that could slow down and inhibit your computers overall performance Windows currently uses Windows Defender Others online include Ad-Aware 2008 Spybot – Search & Destroy Spyware Doctor 5.5 SpywareBlaster 4.1

22 Wireless Security It is much more difficult than protecting a wired network You want to protect your wireless signal from wardrivers Wardriving – the act of searching for Wi-Fi wireless networks by an individual or group of individuals while traveling in a moving vehicle. This is done by using software on either a portable computer or PDA to search for wireless access points NetStumbler Free software available to use for wardrivers that use windows

23 Wireless Security Cont. 5 ways of securing your wireless network (Need to use at least one if not a few) Service Set Identifier (SSID) Alphanumeric label that identifies one LAN from another Wired Equivalency Protocol (WEP) provides data encryption in a network Uses a static encryption key Wi-Fi Protected Access (WPA) Improvement over WEP Alters encryption key periodically and automatically 802.11i (WPA2) Better encryption and encryption key handling MAC address filtering Used on small networks Restricts network access to specific computer’s MAC addresses

24 Citations Cnet. Retrieved October 1, 2008, Web site: http://www.download.com http://www.download.com Windows IT Library. Retrieved October 1, 2008, Web site http://www.windowsitlibrary.comhttp://www.windowsitlibrary.com Greg Tomsho, Ed Tittle, David Jhonson. (2007) Guide to Networking Esentials, Fifth Edition. Paul Campbell, Ben Calvert, Steven Boswell. (2003) Security+ Guide To Network Security Fundamentals.


Download ppt "Data Assurance in Windows-based Networks Mark Boyer."

Similar presentations


Ads by Google