Presentation is loading. Please wait.

Presentation is loading. Please wait.

Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters.

Similar presentations


Presentation on theme: "Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters."— Presentation transcript:

1 Windows Security A practical approach

2 Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters PunctuationPunctuation SymbolsSymbols NumbersNumbers Password Checker Password Checker http://www.microsoft.com/security/online- privacy/password-checker.aspxhttp://www.microsoft.com/security/online- privacy/password-checker.aspx

3 Password Password is known ONLY to user Password is known ONLY to user Storing/Managing Passwords Storing/Managing Passwords Password algorithmsPassword algorithms Password files Password files

4 File System NTFS Security Advantages NTFS Security Advantages Access Control ListAccess Control List Granular structureGranular structure Supports server authenticationSupports server authentication Ability to encrypt files and directoriesAbility to encrypt files and directories Encrypted File System (EFS) Encrypted File System (EFS)

5 PERMISSIONS For files, directories, networked devices APPLICABLE ON: - Users - Computers - Networked devices - Groups of: -Users -Computers -Networked devices INHERITANCE NTFS Access Control

6 Surfing the Internet Browsers Browsers FFFF IEIE Others (Opera, Chrome, etc)Others (Opera, Chrome, etc) Browser Add-ons Browser Add-ons NoScriptNoScript FlashBlockFlashBlock

7 Environmental Threats COMPONENT OBJECT MODELS Object Linking and Embedding (OLE) Object Linking and Embedding (OLE) Remote Procedure Call (RPC) Remote Procedure Call (RPC) ActiveX ActiveX JAVA APPLETS

8 External threats Browser related Browser related Hijacks (BHO)Hijacks (BHO) Drive-by downloads Drive-by downloads WMF (2005), ActiveX, DCOM WMF (2005), ActiveX, DCOM Scams Scams Confidence trickingConfidence tricking Phishing Phishing Fake EmailsFake Emails ID Theft ID Theft Data harvestingData harvesting Social Engineering Social Engineering Psychological manipulationPsychological manipulation Targeted Malware Targeted Malware Silent_bankerSilent_banker

9 Human Error Emails Emails Downloads Downloads P2PP2P Underground sourcesUnderground sources System patches out of date System patches out of date Clicking without reading/fully understanding (‘Nexters’) Clicking without reading/fully understanding (‘Nexters’)

10 Privacy Indexing services Indexing services Google DesktopGoogle Desktop Social websites Social websites FacebookFacebook ID Threats ID Threats Facebook Applications Facebook Applications Source of infectionSource of infection Data miningData mining Search engines Search engines GoogleGoogle Scrapped google engine (Scroogle) Scrapped google engine (Scroogle) IxquickIxquick DuckDuckGoDuckDuckGo

11 Operating System Security Software Anti Virus Anti Virus Microsoft Security Essentials (MSE)Microsoft Security Essentials (MSE) Anti Spy/Malware Anti Spy/Malware Windows DefenderWindows Defender Tracking Software Tracking Software AdeonaAdeona Firewall Firewall Windows FirewallWindows Firewall Sygate Personal FirewallSygate Personal Firewall

12 Common Sense Strong Password Strong Password Latest updates Latest updates Unprivileged user account Unprivileged user account Read EVERYTHING on screen Read EVERYTHING on screen Never disclose any login details Never disclose any login details Never believe in something for nothing Never believe in something for nothing Be Aware Be Aware Better safe than sorry Better safe than sorry

13 Safe System Internet Browsing Internet Browsing Tightened settings for BrowsersTightened settings for Browsers Do not log in as AdministratorDo not log in as Administrator Build up adequate layer of defence through application layerBuild up adequate layer of defence through application layer Real-Time anti-vir/spy/mal/ad wareReal-Time anti-vir/spy/mal/ad ware Electronic Mail Electronic Mail Set up for plain text onlySet up for plain text only Be careful what you subscribe toBe careful what you subscribe to (mailing list harvesting) Spam filtersSpam filters Email address obfuscatingEmail address obfuscating Structuring multiple email addresses for different purposesStructuring multiple email addresses for different purposes System layer System layer Hidden files (double extensions)Hidden files (double extensions) Start-upStart-up Active software protectionActive software protection

14 THE END Thank you


Download ppt "Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters."

Similar presentations


Ads by Google