SlideShare a Scribd company logo
1 of 15
By: Marc Angelo Sebastian
BTTE-3 COET
Configuring Security and
Defending your Computer
• We will answer the following:
 What is the Four Layers of Defense?
 Why do we need to know these Four Layers of Defense?
 What is Group Policy?
 Why do we need to understand the concept of Group
Policy?
In this session…
Four Layers of
Defense
YOU!
Antivirus / AntiMalware
& Firewall
OS Settings
Layer 4
Layer 3
Layer 2
Layer 1
Four Layers of Defense
Secure Passwords
YOU!Layer 1
Four Layers of Defense
 Users are the weakest link of the system.
 Learn more about your computer.
 Be proactive
 Develop “defensive computing” habits
YOU!
Four Layers of Defense
Layer 1
Antivirus / AntiMalware
& Firewall
Layer 2
YOU!Layer 1
 Install and use reputable Antivirus / Antimalware programs.
 Update frequently and regularly.
 Use Firewall to protect your system from external threats.
Antivirus / AntiMalware & Firewalls
Layer 2
Four Layers of Defense
Four Layers of Defense
OS SettingsLayer 3
Antivirus / AntiMalware
& Firewall
Layer 2
YOU!Layer 1
Four Layers of Defense
 Learn to use your operating system’s security features.
• For example, Windows 7 has its UAC (User Account Control
).
 Disable unnecessary features and services.
• For example, disable Windows “Autoplay” feature.
 Install the latest recommended patches and updates.
 Regular users should use Standard
account, not Administrator account.
OS Settings
Four Layers of Defense
Layer 3
YOU!
Antivirus / AntiMalware
& Firewall
OS Settings
Layer 4
Layer 3
Layer 2
Layer 1
Secure Passwords
Four Layers of Defense
 This is your last line of defense.
 All user accounts, especially Administrator, must be password
protected.
 Passwords should be at least 8 characters long.
• Mix letters, numbers, special characters.
 Passwords should be easy to remember
but difficult to guess.
Secure Passwords
Four Layers of Defense
Layer 4
Group Policy
Management
 A feature of the Microsoft Windows NT family of operating
systems.
 Controls the working environment of user and computer
accounts.
 Provides the centralized management and configuration in an
Active Directory environment.
Group Policy
Group Policy Management
 A directory service that Microsoft developed for Windows
domain networks.
 Included in most Windows Server operating systems.
 Set authentication and authorization to users and computers.
 Set a policy in a specific directory.
Active Directory (AD)
Group Policy Management
How the Group Policy works
 The Administrator in the Windows Server create a New Poli
cy to the Group Policy.
Four Layers of Defense
How the Group Policy works
 The Domain Server distributed the New Policy to the users an
d computers.
 “One action” of the Domain Server can apply to ALL users an
d computers.
Group Policy Management
What you can do in Group Policy
1. Schedule the log on hours of the users.
2. Auto-shutdown the computers.
3. Secure what users can ONLY do in the computer.
4. Disable shutdown button in computers.
5. Disable USB ports and Internet in a specific user and comput
er.
6. Set the disk space in computer what only the user can use.
Group Policy Management
Thank you!
“An ounce of prevention
is better than a pound of cure”
-Benjamin Franklin

More Related Content

What's hot

What's hot (18)

maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Foss benifits
Foss benifitsFoss benifits
Foss benifits
 
Presentation1
Presentation1Presentation1
Presentation1
 
Lesson 2.2
Lesson 2.2Lesson 2.2
Lesson 2.2
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus part2
Virus part2Virus part2
Virus part2
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
 

Viewers also liked

Technology Aup & Hardware, Software
Technology Aup & Hardware, SoftwareTechnology Aup & Hardware, Software
Technology Aup & Hardware, Softwarebrookeayers
 
Software hardware policy
Software hardware policySoftware hardware policy
Software hardware policysasi2108
 
Software Selection Policy & Aup
Software Selection Policy & AupSoftware Selection Policy & Aup
Software Selection Policy & Aupguest6edafec
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...VibrantGroup
 
Top 10 it infrastructure interview questions and answers
Top 10 it infrastructure interview questions and answersTop 10 it infrastructure interview questions and answers
Top 10 it infrastructure interview questions and answersAvrilLavigne888
 
Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1abbas mohd
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenancecapjjj
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshootingJerome Luison
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructurepramod_kmr73
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Jitendra s Rathore
 
It infrastructure hardware and software
It infrastructure hardware and softwareIt infrastructure hardware and software
It infrastructure hardware and softwareProf. Othman Alsalloum
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenanceCornelius Micah
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]LinkedIn
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Viewers also liked (19)

Technology Aup & Hardware, Software
Technology Aup & Hardware, SoftwareTechnology Aup & Hardware, Software
Technology Aup & Hardware, Software
 
Software hardware policy
Software hardware policySoftware hardware policy
Software hardware policy
 
Software Selection Policy & Aup
Software Selection Policy & AupSoftware Selection Policy & Aup
Software Selection Policy & Aup
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
 
Ch01
Ch01Ch01
Ch01
 
Top 10 it infrastructure interview questions and answers
Top 10 it infrastructure interview questions and answersTop 10 it infrastructure interview questions and answers
Top 10 it infrastructure interview questions and answers
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
 
Hp case study
Hp case studyHp case study
Hp case study
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
K to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning ModuleK to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning Module
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 
It infrastructure hardware and software
It infrastructure hardware and softwareIt infrastructure hardware and software
It infrastructure hardware and software
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Similar to #1

Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Jennifer Lopez
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathanaminpathan11
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network AdministratorGina Alfaro
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxPoornimaGhodke3
 
iSeries Navigator.ppt
iSeries Navigator.pptiSeries Navigator.ppt
iSeries Navigator.pptken761ken1
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptxOnyemaobiAmarachi
 
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACHICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACHJamaicaCabrales
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
SAM_Lecture_One.pptx
SAM_Lecture_One.pptxSAM_Lecture_One.pptx
SAM_Lecture_One.pptxssuser98702e1
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practiceswebhostingguy
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014TonikJDK
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 

Similar to #1 (20)

Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network Administrator
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
iSeries Navigator.ppt
iSeries Navigator.pptiSeries Navigator.ppt
iSeries Navigator.ppt
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
 
Lecture10.pptx
Lecture10.pptxLecture10.pptx
Lecture10.pptx
 
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACHICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
SAM_Lecture_One.pptx
SAM_Lecture_One.pptxSAM_Lecture_One.pptx
SAM_Lecture_One.pptx
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practices
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 

#1

  • 1. By: Marc Angelo Sebastian BTTE-3 COET Configuring Security and Defending your Computer
  • 2. • We will answer the following:  What is the Four Layers of Defense?  Why do we need to know these Four Layers of Defense?  What is Group Policy?  Why do we need to understand the concept of Group Policy? In this session…
  • 4. YOU! Antivirus / AntiMalware & Firewall OS Settings Layer 4 Layer 3 Layer 2 Layer 1 Four Layers of Defense Secure Passwords
  • 5. YOU!Layer 1 Four Layers of Defense  Users are the weakest link of the system.  Learn more about your computer.  Be proactive  Develop “defensive computing” habits YOU! Four Layers of Defense Layer 1
  • 6. Antivirus / AntiMalware & Firewall Layer 2 YOU!Layer 1  Install and use reputable Antivirus / Antimalware programs.  Update frequently and regularly.  Use Firewall to protect your system from external threats. Antivirus / AntiMalware & Firewalls Layer 2 Four Layers of Defense Four Layers of Defense
  • 7. OS SettingsLayer 3 Antivirus / AntiMalware & Firewall Layer 2 YOU!Layer 1 Four Layers of Defense  Learn to use your operating system’s security features. • For example, Windows 7 has its UAC (User Account Control ).  Disable unnecessary features and services. • For example, disable Windows “Autoplay” feature.  Install the latest recommended patches and updates.  Regular users should use Standard account, not Administrator account. OS Settings Four Layers of Defense Layer 3
  • 8. YOU! Antivirus / AntiMalware & Firewall OS Settings Layer 4 Layer 3 Layer 2 Layer 1 Secure Passwords Four Layers of Defense  This is your last line of defense.  All user accounts, especially Administrator, must be password protected.  Passwords should be at least 8 characters long. • Mix letters, numbers, special characters.  Passwords should be easy to remember but difficult to guess. Secure Passwords Four Layers of Defense Layer 4
  • 10.  A feature of the Microsoft Windows NT family of operating systems.  Controls the working environment of user and computer accounts.  Provides the centralized management and configuration in an Active Directory environment. Group Policy Group Policy Management
  • 11.  A directory service that Microsoft developed for Windows domain networks.  Included in most Windows Server operating systems.  Set authentication and authorization to users and computers.  Set a policy in a specific directory. Active Directory (AD) Group Policy Management
  • 12. How the Group Policy works  The Administrator in the Windows Server create a New Poli cy to the Group Policy. Four Layers of Defense
  • 13. How the Group Policy works  The Domain Server distributed the New Policy to the users an d computers.  “One action” of the Domain Server can apply to ALL users an d computers. Group Policy Management
  • 14. What you can do in Group Policy 1. Schedule the log on hours of the users. 2. Auto-shutdown the computers. 3. Secure what users can ONLY do in the computer. 4. Disable shutdown button in computers. 5. Disable USB ports and Internet in a specific user and comput er. 6. Set the disk space in computer what only the user can use. Group Policy Management
  • 15. Thank you! “An ounce of prevention is better than a pound of cure” -Benjamin Franklin