SlideShare a Scribd company logo
1 of 5
Download to read offline
A GUIDE TO UNDERSTANDING AND
IMPLEMENTING MICROSOFT WINDOWS SECURITY
Today, Information Security is the most important thing to be taken care of while using the Internet.
Internet, Being a source of knowledge, learning and entertainment, it is also something that can be
misused for malicious and destructive intent.
Learn more about configuration settings that could potentially help to improve your Windows Security,
protecting and defending your data from malicious actors.
So what do I mean by "Securing Windows"?
Windows being the most widely used operating system, Its users are vulnerable to data theft, Identity
theft and cracking. By taking some precautions and a few good practices, you can secure your Windows
computer, easily and effectively.
Security is a big field altogether in the world of computers, there are huge corporations that only
specialize in security. This article is for the type of security you can use for your home computer and not
it is not for huge corporate setups, since they have a much larger perspective.
To begin with, let me summarize the points that I am going to cover in this article
1. Understanding Windows processes that run in the background.
2. Antivirus software, and sources of viruses
3. Firewall
4. Security tips and tricks
Understanding Windows Processes
Every software, application we install in our computer runs as a "process", it is a way that the computer
can keep track of running software, close it, or even modify it in some cases.
So where can you see them?
You can see the processes by following these steps -
1. Right-click the taskbar down below, select "Task Manager"
2. Select the "Processes" tab
Or - You can also open Task Manager by pressing (CTRL+SHIFT+ESC)
Once you get there, you can see all the processes that are currently running on your computer. This
gives you a detailed overview of what exactly is going on in your computer. You can see what process is
running, and how much of your system memory are they using.
Here is a list of common Windows system processes that can be found there,
Ctfmon.exe
This is involved with the language/alternative input services in MS-Office. Ctfmon.exe will continue to
put itself back into the system startup when you run the MS-Office apps as long as the Text Services and
Speech applets in the Control Panel are enabled.
Explorer.exe
This is the Windows Shell - the desktop, taskbar, icons almost everything that you see in windows is
controlled by this process
Svchost.exe
Svchost.exe (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be
stopped or restarted manually. This process manages system services that run from dynamic link
libraries (files with extension.dll). Examples for such system services are: "Automatic Updates",
"Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more.
Winlogon.exe
This controls the authentication of Windows users. It is one of the most important system processes.
Rundll32.exe
This program is part of Windows, and is used to run program code in DLL files as if they were within the
actual program. DLL files are a part of the Windows programming.
Csrss.exe
This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss
stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all
times.
When looking at the processes, you can also see the memory they are consuming, using the task
manager process list, you can also close a non-responsive program.
From the security aspect, any Virus, Spyware will show up in this list, so this is a very important tool that
you can use when you feel you have a virus or a spyware installed on your computer.
Sometimes you can directly say whether a process is running a virus or not, when you click on it, it will
just 'slip' out of your mouse pointer and will change its position, these are the advanced viruses
designed to evade from being manually removed.
Antivirus Software
Antivirus software is one of the first and foremost thing that you must install after getting a new system,
or after you have re-installed your operating system.
Choosing the right anti-virus software is very important; it is very much dependent how fast your
computer is. An Antivirus constantly scans your system's active processes and is vigilant, so as to prevent
any threats. With thousands of viruses releasing every day, here are some things to note -
Prevention is better than cure, right?
1. Antivirus software priority - it should be the first thing you must install after getting a computer.
2. Never opt for 'Trial version', either purchase a full version, or use the free version with lesser
features. The problem with trial version is, that once it is expired, it will stop protecting your
system and trouble you with constant security alerts, which means, your computer is at risk
while you are battling with security alerts.
3. Always keep your antivirus software updated, most of the antivirus softwares update
automatically. However for some reason if they are not able to, update manually.
So why does it needs to be updated?
Companies that make these softwares release new virus Signatures or 'patterns' every week and in
some cases even daily. The antivirus on your computer must learn about those new threats, so it
downloads the new patterns from the server, while ensuring that you are protected from the latest
viruses.
Virus Sources
There is no prime source of viruses, they can come up from just anywhere. However, here are some
things you should be aware of -
1. EXE Files- Exe files are executable files that windows uses to execute or start any program,
application or even a software.
2. Exe can contain viruses, even spyware designed to track your system, Always scan a file before
opening it
3. Websites - Never accept a link from anyone whom you don't know. There are websites on the
internet specially designed to compromise your computer, they may be in a form of internet
chat, a forum, a game, or even music.
4. USB Flash Drives- we all share data, and use USB flash drives to carry our data with us. If you use
your disk on an infected system, your disk will catch that virus, and will begin infecting every
computer you insert it in. Always scan a USB flash drive before opening it.
Firewall
So what is a firewall?
In simple terms, It is an application that is designed to control and analyze the network traffic coming in
and out of your computer.
It is like your pet dog that only allows certain people into your house, while preventing unauthorized
people or intruders, at the same time alerting you at various occasions.
So why is a firewall important?
Everything that is in your computer needs to be protected. Your personal documents, photos, financial
information, even your passwords. When your computer is connected to the internet, your data is
susceptible to theft. Major corporations spend millions of dollars just on firewalls. According to a recent
news report, Sony's Play Station was hacked, and a lot of data was leaked. This cost the company
millions of dollars.
Taking little bit of care about your computer security and escalating it, can be very beneficial.
Does Windows have an in-built firewall?
For starters, newer versions of windows like the windows 7, has an amazing inbuilt firewall, also known
as the windows firewall, It allows granular control over your systems' networking, even defining rules for
applications that are installed in your computer.
Windows firewall also has different profiles like 'home network' and 'public network'. This allows easy
one click configuration, wherein you change the settings depending on the location you are using.
When you're connected to a public network like a library or a coffee shops' wireless network, you may
want to block all incoming connections and can select the public network profile.
At home or work, where you may be sharing files over the network, you can easily switch to the home
network profile.
You can access windows firewall by - clicking the Start button clicking Control Panel, clicking Security,
and then clicking Windows Firewall.
Make sure that your firewall is set to 'ON'
For advanced users, you can even install a free third-party firewall like "Comodo Firewall". It is one of
the most advanced, and free firewalls that I have encountered and the one I personally use. This is
however not recommended for basic users, since its configuration requires a very good understanding
of the windows operating systems and its architecture, and about TCP/IP.
Security tips and tricks
1. Be cautious with your computer Administrator passwords, never store them anywhere, always
memorize them, they are the key to your system. Someone who is trying to gain remote access
to your system won't get through if he cannot guess your password. Try to include a
combination of special characters, numbers and letters for your password.
2. Download softwares only from reputed websites, these include Cnet.com, FileHippo.com,
Soft32.com.
3. These websites never host malicious softwares, and always scan them with an antivirus before
hosting them.
4. Always scan your USB flash drives with your antivirus before opening it.Simply Right-click your
disk in My computer, and select 'Scan with' - your antivirus
5. Run a full system scan every month. This will help removing any viruses that have crawled in.
6. Never turn off your anti-virus software or your firewall. Many a times people suggest turning
them off.
7. If possible, get a security expert to analyze your computer once a month. A security expert will
check your computer in great detail and will suggest you to remove any programs that
may compromise your computer.
8. Windows update - Always use windows update and set it to automatic. Windows updates are
critical system patches that escalate your system security or patch any vulnerability that was
otherwise found by Microsoft security experts. Many people don't realize the significance of
Windows Update,until they are infected.
9. User account control - User account control is a security feature in windows that should always
be 'ON', it prevents the execution of malicious code.
10. Web Browser - Always update to a newer version of a web browser, they are better, faster and
more secure. Because everything today is web-based, security of your web browser is the most
important thing.
11. User Accounts - Always keep the guest account disabled, and create a new administrator
account for yourself. Never use the default administrator account.
These are the basic steps that you can use to secure your Windows computer.

More Related Content

Similar to A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf

Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
Hepsijeba
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Microsoft Office How The 2007 System Helps You To Stay Safer
Microsoft  Office  How The 2007 System Helps You To Stay SaferMicrosoft  Office  How The 2007 System Helps You To Stay Safer
Microsoft Office How The 2007 System Helps You To Stay Safer
Oklahoma Dept. Mental Health
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
UltraUploader
 

Similar to A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf (20)

Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Virus
VirusVirus
Virus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Virus project
Virus projectVirus project
Virus project
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
Cyber security
Cyber securityCyber security
Cyber security
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Microsoft Office How The 2007 System Helps You To Stay Safer
Microsoft  Office  How The 2007 System Helps You To Stay SaferMicrosoft  Office  How The 2007 System Helps You To Stay Safer
Microsoft Office How The 2007 System Helps You To Stay Safer
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 

More from MuhammadWaqas779561

More from MuhammadWaqas779561 (20)

UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfUNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
 
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
 
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
 
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfBREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
 
MICHELE TECCHIA.pdf
MICHELE TECCHIA.pdfMICHELE TECCHIA.pdf
MICHELE TECCHIA.pdf
 
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfWHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
 
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
 
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
 
MICHELE TECCHIA BIOGRAPHY.pdf
MICHELE TECCHIA BIOGRAPHY.pdfMICHELE TECCHIA BIOGRAPHY.pdf
MICHELE TECCHIA BIOGRAPHY.pdf
 
INDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfINDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdf
 
ROMANIA TOURS AND VACATIONS.pdf
ROMANIA TOURS AND VACATIONS.pdfROMANIA TOURS AND VACATIONS.pdf
ROMANIA TOURS AND VACATIONS.pdf
 
PATH TO PERMANENT RESIDENCE.pdf
PATH TO PERMANENT RESIDENCE.pdfPATH TO PERMANENT RESIDENCE.pdf
PATH TO PERMANENT RESIDENCE.pdf
 
BIOGRAPHY OF PAUL LIGNIERES.pdf
BIOGRAPHY OF PAUL LIGNIERES.pdfBIOGRAPHY OF PAUL LIGNIERES.pdf
BIOGRAPHY OF PAUL LIGNIERES.pdf
 
MICHELE TECCHIA.pdf
MICHELE TECCHIA.pdfMICHELE TECCHIA.pdf
MICHELE TECCHIA.pdf
 
Jean-Pierre Valentini.pdf
Jean-Pierre Valentini.pdfJean-Pierre Valentini.pdf
Jean-Pierre Valentini.pdf
 
The black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfThe black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdf
 
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfBOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
 
Paul Ligniere.pdf
Paul Ligniere.pdfPaul Ligniere.pdf
Paul Ligniere.pdf
 
Criminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfCriminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdf
 
Yassine Yakouti.pdf
Yassine Yakouti.pdfYassine Yakouti.pdf
Yassine Yakouti.pdf
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Recently uploaded (20)

Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf

  • 1. A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY Today, Information Security is the most important thing to be taken care of while using the Internet. Internet, Being a source of knowledge, learning and entertainment, it is also something that can be misused for malicious and destructive intent. Learn more about configuration settings that could potentially help to improve your Windows Security, protecting and defending your data from malicious actors. So what do I mean by "Securing Windows"? Windows being the most widely used operating system, Its users are vulnerable to data theft, Identity theft and cracking. By taking some precautions and a few good practices, you can secure your Windows computer, easily and effectively. Security is a big field altogether in the world of computers, there are huge corporations that only specialize in security. This article is for the type of security you can use for your home computer and not it is not for huge corporate setups, since they have a much larger perspective. To begin with, let me summarize the points that I am going to cover in this article 1. Understanding Windows processes that run in the background. 2. Antivirus software, and sources of viruses 3. Firewall 4. Security tips and tricks Understanding Windows Processes Every software, application we install in our computer runs as a "process", it is a way that the computer can keep track of running software, close it, or even modify it in some cases. So where can you see them? You can see the processes by following these steps - 1. Right-click the taskbar down below, select "Task Manager" 2. Select the "Processes" tab Or - You can also open Task Manager by pressing (CTRL+SHIFT+ESC) Once you get there, you can see all the processes that are currently running on your computer. This gives you a detailed overview of what exactly is going on in your computer. You can see what process is running, and how much of your system memory are they using. Here is a list of common Windows system processes that can be found there, Ctfmon.exe This is involved with the language/alternative input services in MS-Office. Ctfmon.exe will continue to
  • 2. put itself back into the system startup when you run the MS-Office apps as long as the Text Services and Speech applets in the Control Panel are enabled. Explorer.exe This is the Windows Shell - the desktop, taskbar, icons almost everything that you see in windows is controlled by this process Svchost.exe Svchost.exe (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be stopped or restarted manually. This process manages system services that run from dynamic link libraries (files with extension.dll). Examples for such system services are: "Automatic Updates", "Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more. Winlogon.exe This controls the authentication of Windows users. It is one of the most important system processes. Rundll32.exe This program is part of Windows, and is used to run program code in DLL files as if they were within the actual program. DLL files are a part of the Windows programming. Csrss.exe This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times. When looking at the processes, you can also see the memory they are consuming, using the task manager process list, you can also close a non-responsive program. From the security aspect, any Virus, Spyware will show up in this list, so this is a very important tool that you can use when you feel you have a virus or a spyware installed on your computer. Sometimes you can directly say whether a process is running a virus or not, when you click on it, it will just 'slip' out of your mouse pointer and will change its position, these are the advanced viruses designed to evade from being manually removed. Antivirus Software Antivirus software is one of the first and foremost thing that you must install after getting a new system, or after you have re-installed your operating system. Choosing the right anti-virus software is very important; it is very much dependent how fast your computer is. An Antivirus constantly scans your system's active processes and is vigilant, so as to prevent any threats. With thousands of viruses releasing every day, here are some things to note - Prevention is better than cure, right? 1. Antivirus software priority - it should be the first thing you must install after getting a computer. 2. Never opt for 'Trial version', either purchase a full version, or use the free version with lesser features. The problem with trial version is, that once it is expired, it will stop protecting your system and trouble you with constant security alerts, which means, your computer is at risk while you are battling with security alerts.
  • 3. 3. Always keep your antivirus software updated, most of the antivirus softwares update automatically. However for some reason if they are not able to, update manually. So why does it needs to be updated? Companies that make these softwares release new virus Signatures or 'patterns' every week and in some cases even daily. The antivirus on your computer must learn about those new threats, so it downloads the new patterns from the server, while ensuring that you are protected from the latest viruses. Virus Sources There is no prime source of viruses, they can come up from just anywhere. However, here are some things you should be aware of - 1. EXE Files- Exe files are executable files that windows uses to execute or start any program, application or even a software. 2. Exe can contain viruses, even spyware designed to track your system, Always scan a file before opening it 3. Websites - Never accept a link from anyone whom you don't know. There are websites on the internet specially designed to compromise your computer, they may be in a form of internet chat, a forum, a game, or even music. 4. USB Flash Drives- we all share data, and use USB flash drives to carry our data with us. If you use your disk on an infected system, your disk will catch that virus, and will begin infecting every computer you insert it in. Always scan a USB flash drive before opening it. Firewall So what is a firewall? In simple terms, It is an application that is designed to control and analyze the network traffic coming in and out of your computer. It is like your pet dog that only allows certain people into your house, while preventing unauthorized people or intruders, at the same time alerting you at various occasions. So why is a firewall important? Everything that is in your computer needs to be protected. Your personal documents, photos, financial information, even your passwords. When your computer is connected to the internet, your data is susceptible to theft. Major corporations spend millions of dollars just on firewalls. According to a recent news report, Sony's Play Station was hacked, and a lot of data was leaked. This cost the company millions of dollars. Taking little bit of care about your computer security and escalating it, can be very beneficial. Does Windows have an in-built firewall? For starters, newer versions of windows like the windows 7, has an amazing inbuilt firewall, also known as the windows firewall, It allows granular control over your systems' networking, even defining rules for applications that are installed in your computer.
  • 4. Windows firewall also has different profiles like 'home network' and 'public network'. This allows easy one click configuration, wherein you change the settings depending on the location you are using. When you're connected to a public network like a library or a coffee shops' wireless network, you may want to block all incoming connections and can select the public network profile. At home or work, where you may be sharing files over the network, you can easily switch to the home network profile. You can access windows firewall by - clicking the Start button clicking Control Panel, clicking Security, and then clicking Windows Firewall. Make sure that your firewall is set to 'ON' For advanced users, you can even install a free third-party firewall like "Comodo Firewall". It is one of the most advanced, and free firewalls that I have encountered and the one I personally use. This is however not recommended for basic users, since its configuration requires a very good understanding of the windows operating systems and its architecture, and about TCP/IP. Security tips and tricks 1. Be cautious with your computer Administrator passwords, never store them anywhere, always memorize them, they are the key to your system. Someone who is trying to gain remote access to your system won't get through if he cannot guess your password. Try to include a combination of special characters, numbers and letters for your password. 2. Download softwares only from reputed websites, these include Cnet.com, FileHippo.com, Soft32.com. 3. These websites never host malicious softwares, and always scan them with an antivirus before hosting them. 4. Always scan your USB flash drives with your antivirus before opening it.Simply Right-click your disk in My computer, and select 'Scan with' - your antivirus 5. Run a full system scan every month. This will help removing any viruses that have crawled in. 6. Never turn off your anti-virus software or your firewall. Many a times people suggest turning them off. 7. If possible, get a security expert to analyze your computer once a month. A security expert will check your computer in great detail and will suggest you to remove any programs that may compromise your computer. 8. Windows update - Always use windows update and set it to automatic. Windows updates are critical system patches that escalate your system security or patch any vulnerability that was otherwise found by Microsoft security experts. Many people don't realize the significance of Windows Update,until they are infected. 9. User account control - User account control is a security feature in windows that should always be 'ON', it prevents the execution of malicious code. 10. Web Browser - Always update to a newer version of a web browser, they are better, faster and more secure. Because everything today is web-based, security of your web browser is the most important thing.
  • 5. 11. User Accounts - Always keep the guest account disabled, and create a new administrator account for yourself. Never use the default administrator account. These are the basic steps that you can use to secure your Windows computer.