Download presentation
1
Cyber Patriot Training
Ken Dewey Rose State College
2
Local Security Policy What is it? Where is it?
Used to directly modify account and local policies, public key policies and IP security policies for your local computer Where is it? Start > Control Panel > Administrative Tools > Local Security Policy
3
Local Security Policy What should I look for? More information
Default User Rights, Security Templates, Password Policies, etc More information
4
Local Security Policy
5
User & Group Configuration
What is it? Policy is typically assigned at the group level and then users are assigned into groups. It is very important that your groups are configured correctly and your users are in the appropriate groups. Where is it? Start > Control Panel > User Accounts
6
User & Group Configuration
What should I look for? Users in correct groups for their job, all users have password protected account, etc Guest account turned off More information
7
User & Group Configurations
8
BackDoor/Virus/Malware
What is it? A malicious program that allows a computer to be remotely controlled or exploited Where is it? Can be anywhere on your computer (memory, harddrive, registry, flash drive, etc)
9
BackDoor/Virus/Malware
What should I look for? Look for files and folders that do not belong. Start in the root of C:\ and comb through the file system. Bogus file extensions, files with no name or a garbled name, files that should be small but are huge, etc. More information
10
Installing Anti-Virus
Microsoft Security Essentials Sufficiently protects computer from malicious attacks, and roots out viruses After downloading/installing be sure to update the software
11
Installing Anti-Virus
12
Installing Anti-Virus
Update the MSE Virus Database, and Spyware Database
13
Enable Windows Firewall
Start > Control Panel > Windows Firewall
14
DNS How to check DNS configuration Host file DHCP
C:\windows\system32\drivers\etc DHCP Check via ipconfig /all
15
Task Manager vs. Process Explorer
Malicious Processes can be executing on the computer Windows Task Manager shows processes Process Explorer shows a more detailed analysis of what is running on computer
16
Task Manager vs. Process Explorer
17
Task Manager vs. Process Explorer
18
File/Folder Permissions
What is it? The guidelines on who should be able to and how they should be able to access any particular file or folder. Where is it? Right click any file or folder > Properties > Sharing and Security tabs
19
File/Folder Permissions
What should I look for? Folders that are shared that don’t need to be, folders that have full permissions for all users that don’t need to be, etc More information
20
File/Folder Permissions
21
Vulnerable Services What is it? Where is it?
Services are programs that run in the background and perform a specific task. Where is it? Start > Run > Services.msc
22
Vulnerable Services What should I look for? More information
Services running that don’t need to be (Telnet, SSH, etc) More information
23
Vulnerable Services
24
Vulnerable Services
25
Patching & Updating What is it? Where should I look?
Patches are updates to your operating system (or some program) that add functionality, fix bugs/errors/security holes, etc Where should I look? Start > Windows Update
26
Patching & Updating What should I look for? More information
Make sure that you have all the latest updates and service packs. More information
27
Patching & Updating
28
Patching & Updating
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.