SlideShare a Scribd company logo
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
1
Securing Operating Systems
Simplifying Security.
Module 2
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
2
In its latest edition of Security Intelligence Report that Microsoft released on May 12, 2011, the company reveals that the 
infection rate on Windows 7 rose over 30% in H2‐2010, while that on Windows XP dropped over 20%.
Says Principal Group Program Manager Jeff Williams for Microsoft Malware Protection Center, the rate of contamination on 
Windows 7 increased, that's because of more malware attacks prevailing in cyber space. Computerworld.com published this 
on May 12, 2011.
Notably, during July‐December 2010, there was a mean rate of more than 4 32‐bit Windows 7 computers getting infected 
for every 1,000 such computers, a rise of 33% compared to about 3 such PCs getting infected for every 1,000 during H1‐
2010.
Malware Contamination on Windows 7 High, While for XP Low
http://www.spamfighter.com
May 21, 2011
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
3
Apple ‐‐ and many Mac users ‐‐ argue that Mac OS X has a special recipe for security that makes it less 
likely to be infected with malware. Many security researchers counter that the Mac's seeming immunity 
stems not from its security, but from its lack of market share.
The debate may finally be settled.
The emergence of a serious malware construction kit for the Mac OS X seems to mimic a 2008 prediction 
by a security researcher. The prediction comes from a paper written in IEEE Security & Privacy (in .pdf), 
which used game theory to predict that Macs would become a focus for attackers as soon as Apple hit 16 
percent market share.
Last week, security researchers pointed to a construction kit for creating Trojans for the Mac OS X as a 
major issue for Mac users. Currently, three countries ‐‐ Switzerland, Luxembourg and the United States ‐‐
have Mac market share around that level.
Mac Malware Goes From Game
to Serious
http://www.csoonline.com
May 11, 2011
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
4
Module Objectives
System Security
Threats to System Security
How Does Malware Propagate?
Guidelines for Windows Operating 
System Security
Two‐Way Firewall Protection in 
Windows
Windows Encrypting File System (EFS)
How to Hide Files and Folders?
Windows Security Tools
Guidelines for Securing Mac OS X
Resources on the Internet for 
Computer Security
Operating System Security 
Checklists
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
5
Module Flow
System Security
Threats to System 
Security
How Does
Malware Propagate?
Guidelines for Windows OS Security
Windows Encrypting 
File System (EFS)
Windows Security 
Tools
Guidelines for Securing 
Mac OS X
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
6
System Security
Every operating 
system and 
application is 
subject to 
security flaws
Software vendors 
usually develop 
patches to address 
these flaws
Users have to 
install the 
patches and 
configure the 
software
System 
compromise can 
be prevented by 
applying security 
patches in a 
timely manner
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
7
Module Flow
System Security
Threats to System 
Security
How Does
Malware Propagate?
Guidelines for Windows OS Security
Windows Encrypting 
File System (EFS)
Windows Security 
Tools
Guidelines for Securing 
Mac OS X
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
8
Threats to System Security
Virus
A program that replicates by 
copying itself to other 
programs, system boot sectors, 
or documents, and alters or 
damages the computer files and 
applications
Worm
A self‐replicating virus 
that does not alter files 
but resides in computer 
memory and replicates 
itself
Backdoor
An unauthorized mean of 
accessing the system and 
bypassing the security 
mechanisms
Trojan
A program that seems 
to be legitimate but acts 
maliciously, when 
executed
Logic Bomb
A program that releases a 
virus or a worm
Rootkit
A set of programs or 
utilities that allows 
someone to maintain 
root‐level access to the 
system
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
9
Keylogger 
Password Cracking 
Keylogger is a hardware device 
or small software program that 
monitors and records each 
keystroke on a user's  
computer keyboard
Password cracking is the process 
of identifying or recovering an 
unknown or forgotten password
Spyware 
Spyware includes Trojans and 
other malicious software that 
steals personal information 
from the system without the 
users’ knowledge. Example: 
Keylogger
Threats to System Security
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
10
Password Cracking
Trying different 
passwords until 
one works
Tricking people to 
reveal their password 
or other information 
that can be used to 
guess the password
It uses a pre‐
defined list of 
words
Trying combinations
of all the characters 
until the correct 
password is 
discovered
Watching someone 
type the password
Password cracking is the process of identifying or recovering an unknown or forgotten password
Victim
Attacker
Server
Original Connection
Attacker gets the 
password of the victim
Sniff
Guessing
Brute 
Forcing
Dictionary
Attack
Shoulder 
Surfing
Social
Engineering
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
11
Module Flow
System Security
Threats to System 
Security
How Does
Malware Propagate?
Guidelines for Windows OS Security
Windows Encrypting 
File System (EFS)
Windows Security 
Tools
Guidelines for Securing 
Mac OS X
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
12
How Does Malware Propagate?
Through Email
Attachments
Emails containing 
attachments may 
include malware 
Clicking the 
attachment installs a 
malicious program on 
the computer
A virus create an 
autorun.inf file that is a 
system hidden and a 
read‐only file
When the user opens the 
pen drive  files, the 
autorun.inf is executed 
and copies the virus files 
into the system
Through Infected
Websites
Visiting compromised 
sites may result in 
installation of 
malicious software, 
designed to steal 
personal information, 
on users computer
Through USB
Memory Sticks
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
13
How Does Malware
Propagate ?
http://www.sonicwall.com
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
14
Through Fake Codec
If the user is prompted to download and install a 
decoder to watch the video, the codec may be a 
malicious program that would be downloaded onto 
the system
Through Shared Folders
Malware may propagate via network shares
The malware can spread by creating copies of itself in 
shared folders
How Does Malware Propagate?
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
15
Through Fake Antivirus
Antivirus 2009 is a fake antivirus that performs a fake 
scan of the users’ system and shows viruses that are 
not present on the system
Clicking the Register or Scan buttons downloads
malware onto the system
Through Downloads
Downloading software, music, photos, and videos from 
untrusted websites may also cause downloading a 
malicious file infected with a virus, worm, Trojan, etc.
A large number of malicious applications are available 
over the Internet with a description that may trick 
users into downloading them
How Does Malware Propagate?
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
16
Peer‐to‐peer (P2P) file sharing enables sharing 
of music, audio, images, documents, and 
software programs between two computers 
over the Internet
Shared files may contain security risks such as 
viruses, spyware, and other malicious software
Attackers can share malware disguised as a 
useful application
P2P networks can be used to illegally distribute
the copyrighted material that may attract civil 
and/or criminal penalties
http://www.entertane.com
How Does Malware Propagate?
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
17
Module Flow
System Security
Threats to System 
Security
How Does
Malware Propagate?
Guidelines for Windows OS Security
Windows Encrypting 
File System (EFS)
Windows Security 
Tools
Guidelines for Securing 
Mac OS X
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
18
Guidelines for Windows
Operating System Security
Lock the System, When
Not in Use
Create Strong User Password
Disable the Guest Account
Lock Out Unwanted Guests
Apply Software Security Patches
Use Windows Firewall
Use NTFS
Kill Unnecessary Processes
Configure Audit Policy
Rename the Administrator
Account
Use Windows Encrypting File 
System
Hide Files and Folders
Disable Start up Menu
Disable Simple File Sharing
Use Windows User Account 
Control (UAC)
Implement Malware 
Prevention
Disable Unnecessary Services
Enable BitLocker
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
19
Lock the System When Not in Use
Press the ‘Windows’ and ‘L’ keys together on the keyboard to lock the system
Click Start   Lock
Right‐click on the Desktop and select Personalize  Screensaver  select the time and 
check “On resume, display logon screen”
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
20
1. To create a password, go to Start  Control Panel  Select User Accounts  click 
Manage another account
2. Click User name for whom the password has to be changed and choose Create a 
password (If the password is already set, this option will be Change your password )
3. In the Create a password for user’s account window, type the password to be assigned 
to the selected user and confirm the password
4. Provide a password hint (optional)
5. If a password is already assigned to the user account and are trying to change it, 
Windows will ask you to verify the current password
6. Click the Create/Change Password button
Note: Use strong passwords for logging into the system
Create a Strong User Password
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
21
Change Windows User Password:
Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
22
Disable the Guest Account:
Windows 7
Click Start  right click Computer  select
Manage
When the Computer Management window 
opens, go to Local Users and Groups 
Users
Verify that the Guest account is disabled by 
looking at the     icon 
If the account is not disabled, double‐click 
the account name to open its Properties
window
In the Guest account's properties window 
 select the checkbox next to Account is 
disabled  click OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
23
Lock Out Unwanted Guests in
Windows 7
Go to Control Panel  click 
Administrative Tools
Double‐click the Local Security 
Policy  Account Policies 
double‐click the Account 
Lockout Policy  double‐click
Account Lockout Threshold
At the Account lockout threshold 
Properties window, enter the 
number of invalid logins (e.g., 3)
Click OK and Close
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
24
Click Start  right click Computer  click 
Manage
In the Computer 
Management window  click 
Local Users and Groups 
select Users
Rename the Administrator
Account inWindows 7
Right click on user Admin or Administrator 
select Rename  type the new name for 
account and click OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
25
Right click on the Taskbar  select 
Properties  click Start Menu tab
Uncheck both Store and display recently 
opened programs in the Start menu and 
Store and display recently opened items 
in the Start menu and the taskbar  click 
Apply  click OK
Disable Start up Menu inWindows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
26
•
Windows Updates in
Windows 7
Windows Updates 
Click Start  Control 
Panel  select System 
and Security 
Select Windows Update
 Change Settings
Choose how Windows can 
install updates
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
27
Pointers for Updates
Always patch the OS and 
applications to the latest 
patch levels
Ensure that you are 
downloading patches only 
from authentic sources ‐‐
preferably the vendor site
Use patch 
management tools for 
easier updating–there 
are several free tools
Do not send patches 
through email
Do not open executable 
files from sources of 
questionable integrity
Choose to be notified by 
the vendor about 
vulnerability 
announcements
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
28
Apply Software Security Patches
1
2
3
4
5
Updates can be installed automatically or manually
Automatic updates can be installed on a scheduled 
basis
Updates must be installed from the vendor’s website 
The update process can be hidden and restored
Software updates are used to keep the OS and other 
software up‐to‐date
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
29
Open Windows Firewall by clicking the Start button  click Control Panel
In the search box, type Firewall  click Windows Firewall
In the left pane, click Turn Windows Firewall ON or OFF
Configuring Windows Firewall in
Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
30
Adding New Programs in Windows
Firewall in Windows 7
1. Click Start  Control Panel  type Firewall in the 
search box  press Enter
2. Click Allow a program through Windows Firewall
3. Click Change Settings
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
31
4. Click Allow another Program
5. The Add A Program window opens, which lists pre‐installed programs 
Click Browse to add a program (if required)
Adding New Programs in Windows
Firewall in Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
32
6. Navigate to the Location of the program  select its executable file  click Open
7. Click Add  click OK to exit the Windows Firewall
The change is applied to the list of added programs
Adding New Programs in Windows
Firewall in Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
33
Removing/Disabling Programs Rules
from the Windows Firewall in Windows 7
Click Start  Control Panel  search 
Windows Firewall  go to Allow a 
Program through Windows Firewall 
click Change Settings
Select the rule you want to 
Remove/Disable
To Disable any rule for any specific 
network location, uncheck its 
respective checkbox  click OK
To remove any program completely 
from the allowed program list, click 
Remove  click YES  click OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
34
Advance settings in Windows Firewall allow users to create custom rules
Steps to create a new rule:
1. Click Start  Control Panel  search for firewall  click Check Firewall Status  click 
Advanced Settings
Creating a New Windows Firewall
Rule in Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
35
2. In the Windows Firewall with Advanced Security window, click Inbound Rules  click New Rule
3. The New Inbound Rule Wizard opens  select the type of rule (Program, Port, Predefined, and Custom 
rules) you would like to create  click Next
Creating a New Windows Firewall
Rule in Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
36
4. Select the type of protocol (TCP/UDP) and provide the port numbers or select the option All 
Local Ports for the rule you want to be applied  click Next
5. Decide what Action to take when a connection matches the specified condition (here, Allow 
the Connection)  click Next
Creating a New Windows Firewall
Rule in Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
37
6. Select a Profile for which the rule has to be applied  click Next
7. Give a Name to the newly created Rule and description (optional)  click Finish
The rule is created and it allows TCP Inbound traffic to all the ports.
Note: To create a rule for Outbound traffic, follow the same steps. But select UDP protocol 
and enter 5679 as the port number
Creating a New Windows Firewall
Rule in Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
38
Two-Way Firewall Protection in
Windows
Click the Start button  type wf.msc 
or Firewall in search bar  press 
Enter
Click the Windows Firewall with 
Advanced Security icon
This management interface displays 
the inbound and outbound rules
Click Windows Firewalls Properties
A dialog box with several tabs will 
appear
For each profile‐‐Domain, Private, and 
Public‐‐change the setting to Block, 
and then click OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
39
Close any open programs 
running on the partition or 
logical drive to be 
converted
Click Start  All Programs 
Accessories, right‐click 
Command Prompt, and then 
click Run as administrator. 
Type the password or provide 
confirmation if prompted
In the Command Prompt, 
type convert drive_letter:
/fs:ntfs, where 
drive_letter is the letter of 
the drive to be converted to 
NTFS, and then press ENTER
Type the name of the 
volume you want to convert, 
and then press ENTER
Always Use NTFS
NTFS file system provides better performance and security for data on hard disks and partitions than 
the FAT file system
Convert partitions that use the earlier FAT16 or FAT32 file system to NTFS by using the convert
command
Note: Converting a partition from FAT to NTFS does not affect the data on it. 
You need to restart the computer for the NTFS conversion if the partition 
contains system files.
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
40
Module Flow
System Security
Threats to System 
Security
How Does
Malware Propagate?
Guidelines for Windows OS Security
Windows Encrypting 
File System (EFS)
Windows Security 
Tools
Guidelines for Securing 
Mac OS X
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
41
Windows Encrypting File System (EFS)
Windows Encrypting File System (EFS) allows 
Windows 7 system users to encrypt files and folders 
in an NTFS formatted disk drive
Right‐click the file to be encrypted  select 
Properties on the General tab  click the Advanced
button. The Advanced attributes dialog box appears.
There are two options under Compress or Encrypt 
attributes, Compress contents to save disk space 
and Encrypt contents to secure data
Select Encrypt contents to secure data  click OK to 
close the Compress or Encrypt Attributes dialog box 
 click Apply 
An Encryption Warning dialog box appears, check 
any of the two options: Encrypt the file and its 
parent folder and Encrypt the file only  click OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
42
• Right‐click the file to be decrypted 
select Properties
• On the General tab, click the 
Advanced button. An Advanced 
Attributes dialog box appears
• There are two options under 
Compress or Encrypt Attributes, 
Compress contents to save disk space 
and Encrypt contents to secure data
• Uncheck Encrypt contents to secure 
data  click OK to close the 
Compress/Encrypt Attributes dialog 
box  apply the settings  click OK
How to Decrypt a File Using EFS in
Windows?
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
43
Using Windows Defender
Windows Defender is an antispyware software that offers real‐time protection against spyware and other potentially 
malicious programs infecting the computer
To turn Windows Defender ON or OFF  open Windows Defender by clicking the Start button  click All Programs  click
Windows Defender or type Windows Defender in the search space 
Click Tools  click Options  click Administrator  select or clear the Use Windows Defender check box  click Save
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
44
Enable BitLocker inWindows 7
1. BitLocker Drive Encryption provides better data protection by encrypting an entire Windows operating system 
volume 
2. The hard drive and any removable media on the computer can be encrypted
3. Encrypted removable media can be decrypted and re‐encrypted on any Windows 7 computer
4. Click Start  click Computer  Right click on any drive and select the option Turn on BitLocker… 
Note: BitLocker is available only in the Enterprise and Ultimate editions of Windows Vista and Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
45
Launching EventViewer in
Windows 7
Windows XP Windows 7
Event Viewer is a built‐in Windows utility that allows users to view and manage the event logs, gather 
information about hardware and software problems, and monitor Windows security events
To start Event Viewer in Windows 7  click Start  Control Panel  System and Security
Administrative Tools  Event Viewer
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
46
1. Event Viewer categorizes events into five types: 
Error, Warning, Information, Audit Success, and 
Audit Failure
2. Each event log is differentiated by its level and 
contains header information and a description of 
the event
3. Each event header contains a detailed description 
of the level, date, time, source, event ID, and task 
category
Event Viewer: Events
and How to Read Logs
on the System
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
47
A service is a long‐running executable that 
performs specific functions without 
requiring any user intervention
Services normally start during the system 
start up or booting
Some services load automatically, while 
others are called when a program is used
To view running services, click Start 
Control Panel  Administrative Tools 
double‐click Services
Alternatively, select Start  type 
services.msc in search bar  press ENTER
Once the Services window is loaded, the 
user can turn off any unneeded services
Disabling Unnecessary Services in
Windows 7
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
48
Killing Unwanted Processes
Killing a process
Press [Alt]+ [Ctrl] + [Del] keys simultaneously  click 
Task Manager
In Task Manager go to Processes tab  select the 
Process  click End Process
Alternatively, right click on a selected target process 
 select End Process
Killing a Process Tree
Run the Task Manager  select the target process 
right‐click and select End Process Tree
Kill or terminate unnecessary and suspicious processes to increase system performance and protect system 
against malwares   
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
49
Finding Open Ports Using Netstat Tool
Knowing open ports, and services and applications associated with these ports helps in detecting the presence 
of malware such as virus, worms, Trojans, etc. in the system
Malware generally open ports to receive or send data packets from attackers
Netstat, a Windows inbuilt utility, can be used to determine open ports in the system and associated 
applications
Click Start  All Programs  Accessories, right‐click Command Prompt, and then click Run as administrator. 
Type the password or provide confirmation if prompted
Type netstat –b in the command prompt window to see the open ports and associated applications
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
50
Configuring Audit Policy
1. Click Start  type secpol.msc in 
search bar, and press Enter
2. Click Local Policies  select Audit 
Policy  double‐click the Audit 
account logon events policy 
check the Success and Failure boxes
 click Apply  click OK
3. Similarly, change the security 
setting for all the policies listed in 
the right hand pane of Local 
Security Policy window
4. Close the Local Security Policy
window
Audit policies should be configured to identify attempted or successful attacks on system and network
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
51
How to Hide Files and Folders?
Right‐click the file or folder to be hidden  click Properties  under Attributes
check Hidden  click Apply  click OK
On the Organize menu from Windows Explorer  click Folder and search options
On the View tab, Select the Do not show hidden files and folders option
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
52
Disable Simple File Sharing in
Windows
1. Go to Start  Control Panel  Folder 
Options
2. From the Folder Options window 
select the View tab
3. Scroll to the bottom of the Advanced 
Settings pane
4. Uncheck the checkbox for Using 
sharing wizard (for Windows 7) 
click OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
53
Raise the UAC Slider Bar inWindows 7
User Account Control (UAC) helps the user to make critical decisions while installing software
Click Start  Control Panel  Action Center  Change User Account Control Settings 
Raise/Adjust the UAC slider bar to Always notify
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
54
Module Flow
System Security
Threats to System 
Security
How Does
Malware Propagate?
Guidelines for Windows OS Security
Windows Encrypting 
File System (EFS)
Windows Security 
Tools
Guidelines for Securing 
Mac OS X
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
55
Windows Security Tools: Microsoft
Security Essentials
http://www.microsoft.com
Microsoft Security Essentials 
provides real‐time protection 
for a home PC that guards 
against viruses, spyware, and 
other malicious software
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
56
KeePass is a password 
manager that manages 
passwords in a secure way 
and carries all passwords in 
one database, which is locked 
with one master key or a 
key‐disk
The databases are encrypted
using current known secure 
encryption algorithms (AES‐
256 and Twofish)
Windows Security Tools: KeePass
Password Safe Portable
http://portableapps.com
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
57
http://www.pctools.com
Windows Security Tools: Registry
Mechanic
1. Registry Mechanic offers tools to speed up and improve the stability of Windows7, Windows Vista, or 
Windows XP PC
2. Registry Mechanic safely cleans, repairs, and optimizes the registry and automatically backs up changes 
for future recovery
3. Permanently erases Internet activity, personal files, and free space to keep information away from 
prying eyes
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
58
http://www.microsoft.com
Windows Security Tools:Windows
Defender
Windows Defender helps protect a 
computer against pop‐ups, slow 
performance, and security threats 
caused by spyware and other 
unwanted software by detecting and 
removing known spyware from a 
computer
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
59
Module Flow
System Security
Threats to System 
Security
How Does
Malware Propagate?
Guidelines for Windows OS Security
Windows Encrypting 
File System (EFS)
Windows Security 
Tools
Guidelines for Securing 
Mac OS X
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
60
Step 1: Enabling and Locking Down the
Login Window
Click Apple menu  System 
Preferences  Accounts 
Login options  Display Login 
Windows as  Name and 
Password
Uncheck Automatically login as: 
 Check Hide the Sleep, Restart, 
and Shut Down buttons 
 Uncheck Enable fast users
switching if not used
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
61
Step 2: Configuring Accounts
Preferences
From the Apple menu choose System 
Preferences  from the View menu 
choose Accounts  select the username 
whose password you want to change
Click Reset Password (Mac OS X v10.3 and 
v10.4) or Change Password (Mac OS X 
v10.5 or later)
Enter a new password in both the 
Password and Verify fields  click the 
Reset Password (Mac OS X v10.3 and 
v10.4) or the Change Password (Mac OS X 
v10.5 or later)
If a dialog box appears with the message 
Your Keychain password will be changed 
to your new account password,  click 
OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
62
Never create accounts 
that are shared by 
several users
Each user should have his or 
her own standard or 
managed account
Individual accounts are 
necessary to maintain 
accountability
Administrators should only 
use their administrator
accounts for administration 
purposes
Step 3: Guidelines for Creating
Accounts
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
63
Step 4: Securing the Guest Account
The guest account must be used for 
temporary access to the system
The guest account should be 
disabled by default as it does not 
require a password to login to the 
computer
If the guest account is enabled, 
Enable Parental Controls to limit 
what the user can do
If the user permits the guest 
account to access shared folders, an 
attacker can easily attempt to 
access shared folders without a 
password
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
64
Step 5: Controlling Local Accounts
with Parental Controls
Network
Traffic Analysis
Open System Preferences  click 
Accounts
If the lock icon is locked  click the 
lock icon and provide an 
Administrator name and Password
Select the user account to be 
managed with parental controls 
select the Enable Parental Controls
checkbox
Click Open Parental Controls  click 
System, Content, Mail & iChat, Time 
Limits, and Logs
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
65
Step 6: Use Keychain Settings
Keychain stores passwords on the disk in an encrypted form and it is difficult for a non‐root user to 
sniff a password between applications
Go to Applications  Utilities  Keychain Access  Edit  Change settings for Keychain "login" 
Check Lock after  change minutes of inactivity to the desired number of minutes  check Lock
when sleeping  click Save
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
66
Step 7: Use Apple Software Update
Mac OS X includes an automatic software update tool to patch the majority of Apple applications
Software Update often includes important security updates that should be applied to a user’s machine
To update software :
 Open Software Update preferences  click the Scheduled Check pane
 Deselect  Download updates automatically  click Check Now
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
67
Step 8: Securing Date & Time Preferences
1. Open Date & Time preferences  in the Date & Time pane, enter a secure and trusted 
NTP server in the Set date & time automatically field
2. Click the Time Zone button  choose a Time Zone
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
68
Step 9: Securing Network Preferences
It is recommended to disable unused 
hardware devices listed in Network 
preferences
Open Network preferences  from the 
list of hardware devices, select the 
hardware device that connects one’s 
network
From the Configure pop‐up menu, 
choose Manually
Enter the user’s static IP address, Subnet 
Mask, Router, DNS Server, and Search 
Domain configuration settings
Click Advanced  in the Configure IPv6
pop‐up menu, choose Off  click OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
69
Step 10: Enable Screen Saver Password
To prevent unauthorized access to a system, enable a screen saver password
1. From the Apple menu  select System
Preferences  click Security  click the Lock
icon to make changes
2. If prompted, type the admin userid and 
password
3. In the Security window  click the General
tab  check Require password to wake this 
computer from sleep or screen saver (Leopard) 
or Require password immediately after sleep 
or screen saver begins (Snow Leopard)
4. In addition to the screen saver password, also 
secure the system by selecting:
 Disable automatic login
 Require password to unlock each System 
Preference.
 Use secure virtual memory
 Click the lock icon to prevent further changes
 Close the Security window and restart your 
machine
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
70
Step 11: Set Up FileVault to Keep
Home Folder Secure
Click System Preferences  click 
Security  click FileVault 
click Set Master Password
Create the master password for 
the computer but ensure this 
password is different from user 
account password
Verify the password  click OK
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
71
Step 12: Firewall Security
Mac OS X firewall blocks unwanted network
communication with the computer:
1. Click System Preferences  click Security  click 
Firewall
2. Click the Lock Icon to make changes
3. If prompted, type the admin userid and password
4. By default, the firewall allows all incoming
connections, change the option by clicking the 
second option (Allow only essential services) or 
third option (Set access for specific services and 
applications)
5. Choose which application(s) you want the firewall 
to allow and which to block
6. Click the lock icon to prevent further changes and 
close the Security window
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
72
Internet Fraud Complaint 
Center (IC3)
http://www.ic3.gov
TECS: The Encyclopedia of 
Computer Security 
http://www.itsecurity.com
Virus Bulletin 
http://www.virusbtn.com
Common Vulnerabilities
and Exposures
http://www.cve.mitre.org
Windows Security Guide 
http://www.winguides.com
Stay Safe Online
http://www.staysafeonline.org
CYBERCRIME
http://www.cybercrime.gov
Macintosh Security Site
http://www.securemac.com
Resources on the Internet for
Computer Security
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
73
Module Summary
 Attackers discover new vulnerabilities and bugs to exploit in computer software
 Software vendors usually develop patches to address the problems
 Encryption is the process of converting data into a secret code
 Regularly update the operating system and other applications
 Windows System Restore is used to return one’s computer to an earlier state in 
case of a system failure or other major problem with the system
 Microsoft Security Essentials provides real‐time protection for the PC that guards 
against viruses, spyware, and other malicious software
 Windows Defender helps to protect the system against pop‐ups, slow performance, 
and security threats
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
74
Operating Systems Security Checklist
Install antivirus software and scan the system regularly
Do not open any email from unknown senders
Perform an antivirus scan while downloading
Regularly update the operating system and other applications
Lock the system when not in use
Physically secure the system from unauthorized access
Enable firewall protection and configure all the computer settings for 
high security
Use strong passwords, at least eight characters long, containing both 
letters and numbers
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
75
Operating Systems Security Checklist
Delete the Internet history files, logs, and personal files
Make backups of important data and store them safely
Disable or limit the number of unnecessary accounts
Configure antivirus to check all mediums (CD‐ROMs, email, websites, 
downloaded files, etc.,) for viruses
Use encryption to enhance privacy
Keep up‐to‐date with hotfixes and service packs
Disable AutoRun for the DVD/CD‐ROM
Secure the wireless network
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
76
Use Windows Defender to help prevent spyware and other potentially unwanted software 
from being installed on the computer automatically
User Account Control asks for permission before installing software or opening certain kinds of 
programs that could potentially harm your computer or make it vulnerable to security threats
Back up your files and settings regularly so that if you get a virus or have any kind of 
hardware failure, you can recover your files
Set Windows Update to download and install the latest updates for the computer 
automatically
Windows Firewall can help prevent hackers and malicious software, such as viruses, 
from gaining access to your computer through the Internet
Use Action Center to make sure the firewall is ON, antivirus software is up to date, and 
the computer is set to install updates automatically
Windows 7 Security Checklist
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
77
MAC OS Security Checklist
Securely erase the Mac OS X partition before installation
Set parental controls for managed accounts and Use Password Assistant 
to generate complex passwords
Securely configure Accounts preferences and Date & Time preferences
Install Mac OS X using Mac OS Extended disk formatting
Create an administrator account and a standard account for each 
administrator
Create keychains for specialized purposes
Securely configure Security preferences

More Related Content

What's hot

Email_Security Gateway.pptx
Email_Security Gateway.pptxEmail_Security Gateway.pptx
Email_Security Gateway.pptx
ssuser651fd4
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
AbdullahKanash
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
Lionel Medina
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
Vivek Chauhan
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
sohail awan
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
Information Technology
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
Alireza Ghahrood
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
AwodiranOlumide
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practice
Kate Carruthers
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
Samvel Gevorgyan
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
Business Beam
 
Ch03 Protecting Systems
Ch03 Protecting SystemsCh03 Protecting Systems
Ch03 Protecting Systems
Information Technology
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Edwin A. Opare
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
SlideTeam
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
NBBNOC
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
AmineRached2
 

What's hot (20)

Email_Security Gateway.pptx
Email_Security Gateway.pptxEmail_Security Gateway.pptx
Email_Security Gateway.pptx
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practice
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Ch03 Protecting Systems
Ch03 Protecting SystemsCh03 Protecting Systems
Ch03 Protecting Systems
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
 

Similar to Cscu module 02 securing operating systems

Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
Symantec
 
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Bitdefender
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
Sejahtera Affif
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesSejahtera Affif
 
Computer and internet crime.pptx
Computer and internet crime.pptxComputer and internet crime.pptx
Computer and internet crime.pptx
GeromePantalonia
 
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdfObjectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Augstore
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
Prime Infoserv
 
Protecting Against the New Wave of Malware
Protecting Against the New Wave of MalwareProtecting Against the New Wave of Malware
Protecting Against the New Wave of Malware
GFI Software
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malwareDigital Pymes
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
Felipe Prado
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Trend Micro
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!UltraUploader
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]
guest043f27
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
mobileironmarketing
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
RapidSSLOnline.com
 

Similar to Cscu module 02 securing operating systems (20)

Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
 
Computer and internet crime.pptx
Computer and internet crime.pptxComputer and internet crime.pptx
Computer and internet crime.pptx
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdfObjectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
C3
C3C3
C3
 
Protecting Against the New Wave of Malware
Protecting Against the New Wave of MalwareProtecting Against the New Wave of Malware
Protecting Against the New Wave of Malware
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Analysis of rxbot
Analysis of rxbotAnalysis of rxbot
Analysis of rxbot
 

More from Alireza Ghahrood

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
Alireza Ghahrood
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Alireza Ghahrood
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Alireza Ghahrood
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
Alireza Ghahrood
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
Alireza Ghahrood
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
Alireza Ghahrood
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
Alireza Ghahrood
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
Alireza Ghahrood
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
Alireza Ghahrood
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Alireza Ghahrood
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycle
Alireza Ghahrood
 
implement access controls
implement access controlsimplement access controls
implement access controls
Alireza Ghahrood
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanisms
Alireza Ghahrood
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
Alireza Ghahrood
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
Alireza Ghahrood
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
Alireza Ghahrood
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
Alireza Ghahrood
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
Alireza Ghahrood
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connections
Alireza Ghahrood
 

More from Alireza Ghahrood (20)

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
 
ANT Catalog
ANT CatalogANT Catalog
ANT Catalog
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycle
 
implement access controls
implement access controlsimplement access controls
implement access controls
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanisms
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connections
 

Recently uploaded

SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
securexukweb
 
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
Softradix Technologies
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
janhaviconaxweb
 
What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?
VRS Technologies
 
Comprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration ServicesComprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration Services
kleenupdisaster
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
maitaicatamaran
 
Best Catering Event Planner Miso-Hungry.pptx
Best Catering Event Planner  Miso-Hungry.pptxBest Catering Event Planner  Miso-Hungry.pptx
Best Catering Event Planner Miso-Hungry.pptx
Miso Hungry
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
RKIMT
 
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques SupplierAll Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
Trophy-World Malaysia Your #1 Rated Trophy Supplier
 
Earthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving EquipmentsEarthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving Equipments
earthmoverinternatio
 
Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024
time4servers technologies
 
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
gitapress3
 
SIMBA SQUAD : Best seo company in perth
SIMBA SQUAD :  Best seo company in perthSIMBA SQUAD :  Best seo company in perth
SIMBA SQUAD : Best seo company in perth
ridebiler
 
Inspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
Inspect Edge & NSPIRE Inspection Application - Streamline Housing InspectionsInspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
Inspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
inspectedge1
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
AmeliaLauren3
 
Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098
Chandigarh export services garal
 
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
RNayak3
 
Colors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptxColors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptx
Brendon Jonathan
 
Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100
JoyTree Global
 
Importance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime IndustryImportance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime Industry
Blessed Marine Automation
 

Recently uploaded (20)

SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
 
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
 
What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?
 
Comprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration ServicesComprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration Services
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
 
Best Catering Event Planner Miso-Hungry.pptx
Best Catering Event Planner  Miso-Hungry.pptxBest Catering Event Planner  Miso-Hungry.pptx
Best Catering Event Planner Miso-Hungry.pptx
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
 
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques SupplierAll Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
 
Earthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving EquipmentsEarthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving Equipments
 
Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024
 
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...
 
SIMBA SQUAD : Best seo company in perth
SIMBA SQUAD :  Best seo company in perthSIMBA SQUAD :  Best seo company in perth
SIMBA SQUAD : Best seo company in perth
 
Inspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
Inspect Edge & NSPIRE Inspection Application - Streamline Housing InspectionsInspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
Inspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
 
Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098
 
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
 
Colors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptxColors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptx
 
Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100
 
Importance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime IndustryImportance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime Industry
 

Cscu module 02 securing operating systems