WINDOWS VISTA AND TRUSTWORTHY COMPUTING BY S.VIJAY SARADHI
Importance of windows vista <ul><li>Started under the initiative called “trustworthy computing” in 2002 by bill gates </li...
DEVELOPMENT OF VISTA
SECURE DEVELOPMENT LIFE CYCLE <ul><li>Security is a core requirement for software vendors, driven by market forces, and th...
Threats and Vulnerabilities Mitigation   <ul><li>Features and technologies providing layered defenses against malicious so...
Internet Explorer 7 Protected Mode <ul><li>Mandatory Integrity Control (MIC) . A model in which data can be configured to ...
Working of protected mode
USER ACCOUNT CONTROL <ul><li>AIM OF UAC </li></ul><ul><li>   Limiting application software to standard user privilage </li...
User Account Control
WORKING OF UAC <ul><li>During a login session token with basic privilage is provided </li></ul><ul><li>Asks for credential...
Secure Desktop Mode
UAC PROMPT LEVELS
Address space layout randomization <ul><li>Preventing an attacker from being able to easily predict target addresses </li>...
ASLR ENFORCEMENT
 
DATA EXECUTION PREVENTION <ul><li>Prevents an application or service from executing code from a non-executable memory regi...
DEP ENFORCEMENT
BIT LOCKER DRIVE ENCRYPTION <ul><li>Addresses the threats of data theft or exposure from lost, stolen, or inappropriately ...
WORKING OF BITLOCKER
KERNEL PATCH PROTECTION <ul><li>Protects the intergrity of Windows Kernel </li></ul><ul><li>Periodical checks  ensure the ...
SHELL AND UI ENHANCEMENTS <ul><li>WINDOWS AERO </li></ul><ul><li>WINDOWS DRIVER DISPLAY MODEL </li></ul><ul><li>WINDOWS IN...
WINDOWS AERO <ul><li>Its name is a  backronym  for Authentic, Energetic, Reflective and Open </li></ul><ul><li>Utilizes th...
START MENU USING AERO
WINDOWS FLIP ANF FLIP 3D <ul><li>Windows Flip and Windows Flip 3D render live thumbnail images of the exact contents of yo...
WINDOWS FLIP 3D
WINDOWS FLIP
LIVE THUMBNAILS
WINDOWS DRIVER DISPLAY MODEL <ul><li>Is the  graphic driver  architecture for  video card   drivers  running  Microsoft Wi...
RENDERING BY USING WDDM
WINDOWS INSTANT SEARCH <ul><li>Upon installation,builds  an index of the files on a user's hard drive.  Once the indexing ...
WINDOWS INSTANT SEARCH
ARCHITECTURE OF SEARCH <ul><li>Windows Search is implemented as a  Windows Service  which implements the Windows Search ru...
ARCHITECTURE
CONCLUSION <ul><li>Windows Vista has become the Harbinger for other OS’es to follow it,by incorporating robust security me...
REFERNCES <ul><li>1. www.msdn.com </li></ul><ul><li>2. www.microsoft.com/technet </li></ul><ul><li>3. www.winsupersite.com...
<ul><li>THANK YOU  </li></ul>
Upcoming SlideShare
Loading in …5
×

Windows Vista and Trust Worthy Computing

367 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
367
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Windows Vista and Trust Worthy Computing

  1. 1. WINDOWS VISTA AND TRUSTWORTHY COMPUTING BY S.VIJAY SARADHI
  2. 2. Importance of windows vista <ul><li>Started under the initiative called “trustworthy computing” in 2002 by bill gates </li></ul><ul><li>Four major pillars of trusthworthy computing </li></ul><ul><li>Security </li></ul><ul><li>Privacy </li></ul><ul><li>Reliability </li></ul><ul><li>Business Integrity </li></ul>
  3. 3. DEVELOPMENT OF VISTA
  4. 4. SECURE DEVELOPMENT LIFE CYCLE <ul><li>Security is a core requirement for software vendors, driven by market forces, and the need to build and preserve widespread trust in computing </li></ul><ul><li>Vista is the First OS from microsoft to completly go through the SDLC </li></ul><ul><li>Principles of SDLC </li></ul><ul><li>Secure by Design </li></ul><ul><li>Secure by Default </li></ul><ul><li>Secure in Deployment </li></ul>
  5. 5. Threats and Vulnerabilities Mitigation <ul><li>Features and technologies providing layered defenses against malicious software threats and intrusions through a strategy of prevention and isolation </li></ul>
  6. 6. Internet Explorer 7 Protected Mode <ul><li>Mandatory Integrity Control (MIC) . A model in which data can be configured to prevent lower-integrity applications from accessing it. </li></ul><ul><li>Processes are assigned an integrity level in their access token </li></ul><ul><li>User Interface Privilege Isolation (UIPI) . Blocks lower-integrity processes from accessing higher-integrity processes. </li></ul><ul><li>Active X control installtions lead to an elevation prompt </li></ul>
  7. 7. Working of protected mode
  8. 8. USER ACCOUNT CONTROL <ul><li>AIM OF UAC </li></ul><ul><li>  Limiting application software to standard user privilage </li></ul><ul><li>Controlling the auto elevation of malicous process to higher intergrity level </li></ul><ul><li>Verifiying the Digital signatures associated with the software vendor </li></ul>
  9. 9. User Account Control
  10. 10. WORKING OF UAC <ul><li>During a login session token with basic privilage is provided </li></ul><ul><li>Asks for credentials in a   Secure Desktop  mode </li></ul><ul><li>This is to prevent spoofing of the UI or the mouse by the application requesting elevation. </li></ul><ul><li>Provides defense against Shatter attacks and piggybacking of malware on critical services </li></ul>
  11. 11. Secure Desktop Mode
  12. 12. UAC PROMPT LEVELS
  13. 13. Address space layout randomization <ul><li>Preventing an attacker from being able to easily predict target addresses </li></ul><ul><li>Memory addresses are obscured from shell code injected into the system </li></ul><ul><li>Entropy is increased by raising the amount of virtual memory space when the period the randomization occurs over </li></ul><ul><li>Code areas such as library base and main executable need to be discovered exactly </li></ul>
  14. 14. ASLR ENFORCEMENT
  15. 16. DATA EXECUTION PREVENTION <ul><li>Prevents an application or service from executing code from a non-executable memory region </li></ul><ul><li>Helps prevent certain exploits that store code via a buffer overflow </li></ul><ul><li>Hardware-enforced DEP enables the NX bit on compatible CPUs in 32-bit Windows and the native support on 64-bit kernels. </li></ul><ul><li>Windows Vista DEP works by marking certain parts of memory as being intended to hold only data </li></ul>
  16. 17. DEP ENFORCEMENT
  17. 18. BIT LOCKER DRIVE ENCRYPTION <ul><li>Addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned personal computers </li></ul><ul><li>Helps mitigate unauthorized data access by enhancing Windows Vista file and system protection </li></ul><ul><li>The most secure implementation of BitLocker leverages the enhanced security capabilities of a Trusted Platform Module (TPM) version. </li></ul><ul><li>TPM works with BitLocker to ensure that a computer running Windows Vista has not been tampered with while the system was offline. </li></ul>
  18. 19. WORKING OF BITLOCKER
  19. 20. KERNEL PATCH PROTECTION <ul><li>Protects the intergrity of Windows Kernel </li></ul><ul><li>Periodical checks ensure the integrity of protected system structures. If a modification is detected, a bug check is initiated and the system is shut down </li></ul><ul><li>Mitigates erratic display of “bluescreen of death” due to buggy software issues </li></ul><ul><li>Protection from rootkits which may embed themselves in the kernel </li></ul>
  20. 21. SHELL AND UI ENHANCEMENTS <ul><li>WINDOWS AERO </li></ul><ul><li>WINDOWS DRIVER DISPLAY MODEL </li></ul><ul><li>WINDOWS INSTANT SEARCH </li></ul>
  21. 22. WINDOWS AERO <ul><li>Its name is a backronym for Authentic, Energetic, Reflective and Open </li></ul><ul><li>Utilizes the GPU in the system for rendering </li></ul><ul><li>Reliable and seamless display, with none of the weird tearing effects that can mar the other interfaces </li></ul><ul><li>Provides a much more desirable look and feel for the system as a whole by providing Windows flip3D,Windows flip and live thumbnails </li></ul>
  22. 23. START MENU USING AERO
  23. 24. WINDOWS FLIP ANF FLIP 3D <ul><li>Windows Flip and Windows Flip 3D render live thumbnail images of the exact contents of your open windows </li></ul><ul><li>Windows Flip 3D dynamically displays all open windows in a graceful three-dimensional view. </li></ul><ul><li>Flip 3D uses the dimension of visual depth to give you a more comprehensive view of your open windows </li></ul><ul><li>Live taskbar thumbnail images display the actual contents of both windows that are currently open and those that are minimized in the taskbar </li></ul>
  24. 25. WINDOWS FLIP 3D
  25. 26. WINDOWS FLIP
  26. 27. LIVE THUMBNAILS
  27. 28. WINDOWS DRIVER DISPLAY MODEL <ul><li>Is the graphic driver architecture for video card drivers running Microsoft Windows versions beginning with Windows Vista . </li></ul><ul><li>provides the functionality required to render the desktop and applications using Desktop Window Manager </li></ul><ul><li>Improves the overall reilabilty of desktop composition by off-loading the rendering of windows to the GPU </li></ul>
  28. 29. RENDERING BY USING WDDM
  29. 30. WINDOWS INSTANT SEARCH <ul><li>Upon installation,builds an index of the files on a user's hard drive. Once the indexing is complete, Windows Search is able to use this index to search results more rapidly </li></ul><ul><li>Windows Search also features word-wheeled search (or search-as-you-type ). </li></ul><ul><li>It uses property handlers to handle metadata from file formats </li></ul>
  30. 31. WINDOWS INSTANT SEARCH
  31. 32. ARCHITECTURE OF SEARCH <ul><li>Windows Search is implemented as a Windows Service which implements the Windows Search runtime and APIs, as well as acting as host for the index stores and controlling the components. </li></ul><ul><li>the Indexer, which crawls the file system periodically and creates and maintains the index of the data </li></ul><ul><li>The Indexer consists of two components, the Gatherer and the Merger , [9] the Gatherer retrieves the list of URIs that need to be crawled </li></ul><ul><li>the is the job of the Merger to periodically merge the indices </li></ul>
  32. 33. ARCHITECTURE
  33. 34. CONCLUSION <ul><li>Windows Vista has become the Harbinger for other OS’es to follow it,by incorporating robust security mechanisms. </li></ul><ul><li>It has clearly lived up to its caption of providing </li></ul><ul><li>Clarity </li></ul><ul><li>Confidence and </li></ul><ul><li>Connectivity to its users </li></ul>
  34. 35. REFERNCES <ul><li>1. www.msdn.com </li></ul><ul><li>2. www.microsoft.com/technet </li></ul><ul><li>3. www.winsupersite.com </li></ul><ul><li>4. www.symantec.com/vista security </li></ul><ul><li>5. Inside windows vista’s kernel by mark russionvich </li></ul><ul><li>6.Windows vista’s secrets by paul thurrott </li></ul>
  35. 36. <ul><li>THANK YOU </li></ul>

×