Title: Security
1Security
- Unit objectives
- Configure operating system and file system
security - Install a fingerprint scanner and card reader
- Manage the human aspects of security
2Topic A
- Topic A Operating system security
- Topic B Security hardware
- Topic C The human aspects of security
3User accounts
- Object that represents a user of the computer
- Name, password, group membership
- User
- Administrator
- Guest
4Groups
- Management tool for applying security settings to
multiple users - Users
- Administrators
- Power Users
5Active Directory
- Management framework
- Centralized database of security data
- Domains
- Forests
- Organizational units
6Activity A-1
Securing access to the operating system
7File system security
- Logical organization scheme for files
- Windows supports
- File Allocation Table (FAT)
- FAT32
- NTFS
- Only NTFS supports security
8NTFS advantages
- Larger disks
- Security
- Compression and encryption
- Disk quotas
- Recovery logging
9Activity A-2
Choosing the correct file system for security
10NTFS security
- Security tab in Properties dialog box
- Permissions are cumulative
- Explicit permissions override inherited
permissions - Permissions are inherited unless blocked
- Set permissions on folders and files
11NTFS permissions
- Full control
- Modify
- Read and Execute
- List Folder Contents
- Read
- Write
- Special Permissions
12Enabling the Security tab
- Open Windows Explorer
- Choose Tools, Folder Options
- Activate the View tab
- Clear the checkbox beside Use simple file sharing
- Click OK
13Activity A-3
Configuring file access restrictions
14Encryption
- Scrambling of data
- Public key cryptography
- Pairs of keys
- Whichever encrypts, the pair decrypts
- Encrypting file system (EFS)
15Activity A-4
Encrypting files
16Authentication mechanisms
- Biometric devices
- Smart cards
- Fobs
- Digital certificates
17Authentication
- Identity validated
- Workgroup vs. domain
- Local computer vs. domain
- Network authentication
18Protocols
- Kerberos v5
- Supported by Windows 2000, Windows XP, and
Windows Server 2003 - NTLM
- Supported by Windows NT, Windows 9x
19Activity A-5
Understanding authentication technologies
20Security policies
- Password Policy
- Account Lockout Policy
- Audit Policy
- User Rights Assignments
- Security Options
- Encrypting File System
- Software Restriction Policies
- IP Security Policies
21Activity A-6
Using local security policies to set password
restrictions
22Topic B
- Topic A Operating system security
- Topic B Security hardware
- Topic C The human aspects of security
23A fingerprint scanner
24Activity B-1
Installing a fingerprint reader
25Smart card and reader
26Installing IdentiPHI Basic
- Install the card reader and its drivers
- Install the IdentiPHI Basic software
- Configure IdentiPHI Basic to accept smart cards
- Enroll a smart card and set a secure PIN for that
card
27Activity B-2
Installing a card reader
28Activity B-3
Installing the IdentiPHI Basic software
29Activity B-4
Configuring IdentiPHI Basic to accept smart cards
30Activity B-5
Enrolling a smart card with IdentiPHI
31Activity B-6
Using a smart card
32Activity B-7
Uninstalling the smart card reader and software
33Fobs
- Keychain sized devices
- Creates a rolling code
- Might need username and password, in addition to
fob number - Rolling code not random
34Topic C
- Topic A Operating system security
- Topic B Security hardware
- Topic C The human aspects of security
35Alleviate security weaknesses
- Restrict physical access to sensitive systems and
data - Create an automated backup schedule
- Manage data destruction
- Create a corporate security policy
- Manage social engineering attacks
36Physical access restrictions
- Lock server rooms
- Lock PC cases and peripherals
- Use cameras or motion-sensor alarms
- Station guards in ultra-sensitive areas
37Activity C-1
Implementing physical access restrictions
38Backup
- Use to create copies of your files
- Recover files after system failure
- Back up any critical data before you begin
troubleshooting - Windows Backup is a GUI utility
- Archive selected files and folders
- Restore archived files and folders
- Make copy of computers system state
- Copy your computers system partition, boot
partition, and files needed to start up the
system
39Backup utility in Windows XP
40Backup modes
- Wizard mode walk you step-by-step through the
process - Advanced mode provides complete control over
file and folder selection
41Backup utility in Advanced Mode
42Backup types
- Copy
- Daily
- Differential
- Incremental
- Normal
43Activity C-2
Backing up files using Wizard mode
44Activity C-3
Restoring information from a backup
45Scheduling backups
- Daily
- Weekly
- Monthly
- At predefined times
- On predefined days
continued
46Scheduling backups, continued
47Activity C-4
Scheduling a backup
48Data destruction and migration
- Destruction utilities
- Removable media and drives
- Paper records
- Data migration
49Activity C-5
Examining data destruction techniques
50Corporate security policies
- Contract between company and employees
- Heightens awareness
- Demonstrates commitment
- Spells out permitted and prohibited uses of
company resources, plus repercussions - Intrusion handling plans
- Regularly review and update
51Activity C-6
Considering corporate security policies
52Social engineering attacks
- Social engineering includes
- Tricking users into divulging sensitive
information - Phishing
- Dumpster diving
- Shoulder surfing
- Trojan horse attachments
- Sneaking into secure areas through deception
- Training and awareness are best defenses
53Malicious software
- Virus
- Worm
- Trojan horse
- Spam
- Spyware
- Adware
- Grayware
54Prevention
- Training
- Corporate security policy
- Antivirus software
55Activity C-7
Managing social engineering attacks
56Network security
- Firewalls
- Password management
- Account management
- Incidence reporting
57Activity C-8
Examining network security
58Unit summary
- Configured operating system and file system
security - Installed a fingerprint scanner and card reader
- Managed the human aspects of security