Submit Search
Upload
Cscu module 02 securing operating systems
•
0 likes
•
104 views
Sejahtera Affif
Follow
semoga menambah wawasan serta bermanfaat untuk Anda
Read less
Read more
Science
Report
Share
Report
Share
1 of 77
Download now
Download to read offline
Recommended
Attack of the killer virus!
Attack of the killer virus!
UltraUploader
Analysis of rxbot
Analysis of rxbot
UltraUploader
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
Digital Pymes
Cscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
AVG Technologies AU
viruses
viruses
khadija habib
MainPaper_4.0
MainPaper_4.0
varun4110
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
ianpoblete13
Recommended
Attack of the killer virus!
Attack of the killer virus!
UltraUploader
Analysis of rxbot
Analysis of rxbot
UltraUploader
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
Digital Pymes
Cscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
AVG Technologies AU
viruses
viruses
khadija habib
MainPaper_4.0
MainPaper_4.0
varun4110
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
ianpoblete13
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
mobileironmarketing
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
Cscu module 02 securing operating systems
Cscu module 02 securing operating systems
Sejahtera Affif
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
Diane M. Metcalf
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk Wwiscop
Juan Carlos Carrillo
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
Solomon Sunday Oyelere
History of Computer Virus
History of Computer Virus
Ammy Vijay
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
Microsoft Ideas
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software Diversification
FoCAS Initiative
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
George Braga
Presentation on virus
Presentation on virus
Protik Roy
New Wordpad Document
New Wordpad Document
shoib_245
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
UltraUploader
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
AGILLY
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Happiest Minds Technologies
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
Secunia
E-threat landscape report H1 2012
E-threat landscape report H1 2012
BitDefenderRo
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks Malware
Aditya K Sood
Virus
Virus
safi Ullah
Workshop 23th October 2013
Workshop 23th October 2013
SocialEnergy
Cscu module 09 securing email communications
Cscu module 09 securing email communications
Sejahtera Affif
Cscu power point
Cscu power point
tabercreative
More Related Content
What's hot
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
mobileironmarketing
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
Cscu module 02 securing operating systems
Cscu module 02 securing operating systems
Sejahtera Affif
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
Diane M. Metcalf
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk Wwiscop
Juan Carlos Carrillo
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
Solomon Sunday Oyelere
History of Computer Virus
History of Computer Virus
Ammy Vijay
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
Microsoft Ideas
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software Diversification
FoCAS Initiative
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
George Braga
Presentation on virus
Presentation on virus
Protik Roy
New Wordpad Document
New Wordpad Document
shoib_245
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
UltraUploader
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
AGILLY
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Happiest Minds Technologies
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
Secunia
E-threat landscape report H1 2012
E-threat landscape report H1 2012
BitDefenderRo
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks Malware
Aditya K Sood
Virus
Virus
safi Ullah
What's hot
(19)
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Cscu module 02 securing operating systems
Cscu module 02 securing operating systems
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk Wwiscop
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
History of Computer Virus
History of Computer Virus
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software Diversification
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
Presentation on virus
Presentation on virus
New Wordpad Document
New Wordpad Document
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
E-threat landscape report H1 2012
E-threat landscape report H1 2012
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks Malware
Virus
Virus
Viewers also liked
Workshop 23th October 2013
Workshop 23th October 2013
SocialEnergy
Cscu module 09 securing email communications
Cscu module 09 securing email communications
Sejahtera Affif
Cscu power point
Cscu power point
tabercreative
Cscu module 07 securing network connections
Cscu module 07 securing network connections
Sejahtera Affif
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
Sejahtera Affif
Kurikulum & modul 1
Kurikulum & modul 1
Sejahtera Affif
Lead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to Guide
SlideShare
Viewers also liked
(7)
Workshop 23th October 2013
Workshop 23th October 2013
Cscu module 09 securing email communications
Cscu module 09 securing email communications
Cscu power point
Cscu power point
Cscu module 07 securing network connections
Cscu module 07 securing network connections
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
Kurikulum & modul 1
Kurikulum & modul 1
Lead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to Guide
Similar to Cscu module 02 securing operating systems
Symantec intelligence report august 2015
Symantec intelligence report august 2015
Symantec
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Bitdefender
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
Sejahtera Affif
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
Sejahtera Affif
Computer and internet crime.pptx
Computer and internet crime.pptx
GeromePantalonia
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
Комсс Файквэе
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Augstore
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
Prime Infoserv
C3
C3
Praveen Malisetty
Protecting Against the New Wave of Malware
Protecting Against the New Wave of Malware
GFI Software
Hacking 10 2010
Hacking 10 2010
Felipe Prado
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Trend Micro
0926182320 Sophos[1]
0926182320 Sophos[1]
guest043f27
Bot software spreads, causes new worries
Bot software spreads, causes new worries
UltraUploader
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
RapidSSLOnline.com
2015 Microsoft Vulnerabilities Report
2015 Microsoft Vulnerabilities Report
Avecto
Information security
Information security
Appin Faridabad
Cscu module 13 securing mobile devices
Cscu module 13 securing mobile devices
Sejahtera Affif
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
Souman Guha
Information security in todays world
Information security in todays world
Sibghatullah Khattak
Similar to Cscu module 02 securing operating systems
(20)
Symantec intelligence report august 2015
Symantec intelligence report august 2015
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
Computer and internet crime.pptx
Computer and internet crime.pptx
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
C3
C3
Protecting Against the New Wave of Malware
Protecting Against the New Wave of Malware
Hacking 10 2010
Hacking 10 2010
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
0926182320 Sophos[1]
0926182320 Sophos[1]
Bot software spreads, causes new worries
Bot software spreads, causes new worries
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
2015 Microsoft Vulnerabilities Report
2015 Microsoft Vulnerabilities Report
Information security
Information security
Cscu module 13 securing mobile devices
Cscu module 13 securing mobile devices
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
Information security in todays world
Information security in todays world
Recently uploaded
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
PABOLU TEJASREE
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
aasikanpl
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
WildaNurAmalia2
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
Murugaveni B
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2
John Carlo Rollon
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024
innovationoecd
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VIRUS - 123455555555555555555555555555555555555555
VIRUS - 123455555555555555555555555555555555555555
kikilily0909
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
Patrick Diehl
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
FarihaAbdulRasheed
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
BerniceCayabyab1
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
PRINCE C P
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
soniya singh
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
aasikanpl
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
PirithiRaju
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
riyaescorts54
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
tahreemzahra82
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
AyushiRastogi48
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by na
JASISJULIANOELYNV
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Eran Akiva Sinbar
Recently uploaded
(20)
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
VIRUS - 123455555555555555555555555555555555555555
VIRUS - 123455555555555555555555555555555555555555
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by na
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Cscu module 02 securing operating systems
1.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 1 Securing Operating Systems Simplifying
Security. Module 2
2.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 2 In its latest edition of Security Intelligence Report that Microsoft released on May 12, 2011, the company reveals that the infection rate on Windows 7 rose over 30% in H2‐2010, while that on Windows XP dropped over 20%. Says Principal Group Program Manager Jeff Williams for Microsoft Malware Protection Center, the rate of contamination on Windows 7 increased, that's because of more malware attacks prevailing in cyber space. Computerworld.com published this on May 12, 2011. Notably, during July‐December 2010, there was a mean rate of more than 4 32‐bit Windows 7 computers getting infected for every 1,000 such computers, a rise of 33% compared to about 3 such PCs getting infected for every 1,000 during H1‐ 2010. Malware Contamination on Windows 7 High, While for XP Low http://www.spamfighter.com May 21, 2011
3.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 3 Apple ‐‐ and many Mac users ‐‐ argue that Mac OS X has a special recipe for security that makes it less likely to be infected with malware. Many security researchers counter that the Mac's seeming immunity stems not from its security, but from its lack of market share. The debate may finally be settled. The emergence of a serious malware construction kit for the Mac OS X
seems to mimic a 2008 prediction by a security researcher. The prediction comes from a paper written in IEEE Security & Privacy (in .pdf), which used game theory to predict that Macs would become a focus for attackers as soon as Apple hit 16 percent market share. Last week, security researchers pointed to a construction kit for creating Trojans for the Mac OS X as a major issue for Mac users. Currently, three countries ‐‐ Switzerland, Luxembourg and the United States ‐‐ have Mac market share around that level. Mac Malware Goes From Game to Serious http://www.csoonline.com May 11, 2011
4.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 4 Module Objectives System Security Threats to System Security How Does Malware Propagate? Guidelines for Windows Operating System Security Two‐Way Firewall Protection in Windows Windows Encrypting File System (EFS) How to Hide Files and Folders? Windows Security Tools Guidelines for Securing Mac OS X Resources on the Internet for Computer Security Operating System Security Checklists
5.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 5 Module Flow System Security Threats to System Security How Does Malware Propagate? Guidelines for Windows OS Security Windows Encrypting File System (EFS) Windows Security Tools Guidelines for Securing Mac OS X
6.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 6 System Security Every operating system and application is subject to security flaws Software vendors usually develop patches to address these flaws Users have to install the patches and configure the software System compromise can be prevented by applying security patches in a timely manner
7.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 7 Module Flow System Security Threats to System Security How Does Malware Propagate? Guidelines for Windows OS Security Windows Encrypting File System (EFS) Windows Security Tools Guidelines for Securing Mac OS X
8.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 8 Threats to System
Security Virus A program that replicates by copying itself to other programs, system boot sectors, or documents, and alters or damages the computer files and applications Worm A self‐replicating virus that does not alter files but resides in computer memory and replicates itself Backdoor An unauthorized mean of accessing the system and bypassing the security mechanisms Trojan A program that seems to be legitimate but acts maliciously, when executed Logic Bomb A program that releases a virus or a worm Rootkit A set of programs or utilities that allows someone to maintain root‐level access to the system
9.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 9 Keylogger Password Cracking Keylogger is a hardware device or small software program that monitors and records each keystroke on a user's computer keyboard Password cracking is the process of identifying or recovering an unknown or forgotten password Spyware Spyware includes Trojans and other malicious software that steals personal information from the system without the users’ knowledge. Example: Keylogger Threats to System
Security
10.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 10 Password Cracking Trying different passwords until one works Tricking
people to reveal their password or other information that can be used to guess the password It uses a pre‐ defined list of words Trying combinations of all the characters until the correct password is discovered Watching someone type the password Password cracking is the process of identifying or recovering an unknown or forgotten password Victim Attacker Server Original Connection Attacker gets the password of the victim Sniff Guessing Brute Forcing Dictionary Attack Shoulder Surfing Social Engineering
11.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 11 Module Flow System Security Threats to System Security How Does Malware Propagate? Guidelines for Windows OS Security Windows Encrypting File System (EFS) Windows Security Tools Guidelines for Securing Mac OS X
12.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 12 How Does Malware
Propagate? Through Email Attachments Emails containing attachments may include malware Clicking the attachment installs a malicious program on the computer A virus create an autorun.inf file that is a system hidden and a read‐only file When the user opens the pen drive files, the autorun.inf is executed and copies the virus files into the system Through Infected Websites Visiting compromised sites may result in installation of malicious software, designed to steal personal information, on users computer Through USB Memory Sticks
13.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 13 How Does Malware Propagate
? http://www.sonicwall.com
14.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 14 Through Fake Codec If the user is prompted to download and install a decoder
to watch the video, the codec may be a malicious program that would be downloaded onto the system Through Shared Folders Malware may propagate via network shares The malware can spread by creating copies of itself in shared folders How Does Malware Propagate?
15.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 15 Through Fake Antivirus Antivirus 2009 is a fake antivirus that performs a fake scan of the users’ system and shows viruses that are not present on the system Clicking the Register or Scan buttons downloads malware onto the system Through Downloads Downloading software, music, photos, and videos from untrusted websites
may also cause downloading a malicious file infected with a virus, worm, Trojan, etc. A large number of malicious applications are available over the Internet with a description that may trick users into downloading them How Does Malware Propagate?
16.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 16 Peer‐to‐peer (P2P) file sharing enables sharing of music, audio, images, documents, and software programs between two computers over the Internet Shared files may contain security risks such as viruses, spyware, and other malicious software Attackers can share malware disguised as a useful application P2P networks can be used to illegally distribute the copyrighted material that may attract civil and/or criminal penalties http://www.entertane.com How Does Malware
Propagate?
17.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 17 Module Flow System Security Threats to System Security How Does Malware Propagate? Guidelines for Windows OS Security Windows Encrypting File System (EFS) Windows Security Tools Guidelines for Securing Mac OS X
18.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 18 Guidelines for Windows Operating
System Security Lock the System, When Not in Use Create Strong User Password Disable the Guest Account Lock Out Unwanted Guests Apply Software Security Patches Use Windows Firewall Use NTFS Kill Unnecessary Processes Configure Audit Policy Rename the Administrator Account Use Windows Encrypting File System Hide Files and Folders Disable Start up Menu Disable Simple File Sharing Use Windows User Account Control (UAC) Implement Malware Prevention Disable Unnecessary Services Enable BitLocker
19.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 19 Lock the System
When Not in Use Press the ‘Windows’ and ‘L’ keys together on the keyboard to lock the system Click Start Lock Right‐click on the Desktop and select Personalize Screensaver select the time and check “On resume, display logon screen”
20.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 20 1. To create a password, go to Start
Control Panel Select User Accounts click Manage another account 2. Click User name for whom the password has to be changed and choose Create a password (If the password is already set, this option will be Change your password ) 3. In the Create a password for user’s account window, type the password to be assigned to the selected user and confirm the password 4. Provide a password hint (optional) 5. If a password is already assigned to the user account and are trying to change it, Windows will ask you to verify the current password 6. Click the Create/Change Password button Note: Use strong passwords for logging into the system Create a Strong User Password
21.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 21 Change Windows User
Password: Windows 7
22.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 22 Disable the Guest
Account: Windows 7 Click Start right click Computer select Manage When the Computer Management window opens, go to Local Users and Groups Users Verify that the Guest account is disabled by looking at the icon If the account is not disabled, double‐click the account name to open its Properties window In the Guest account's properties window select the checkbox next to Account is disabled click OK
23.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 23 Lock Out Unwanted
Guests in Windows 7 Go to Control Panel click Administrative Tools Double‐click the Local Security Policy Account Policies double‐click the Account Lockout Policy double‐click Account Lockout Threshold At the Account lockout threshold Properties window, enter the number of invalid logins (e.g., 3) Click OK and Close
24.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 24 Click Start right click Computer
click Manage In the Computer Management window click Local Users and Groups select Users Rename the Administrator Account inWindows 7 Right click on user Admin or Administrator select Rename type the new name for account and click OK
25.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 25 Right click on the Taskbar
select Properties click Start Menu tab Uncheck both Store and display recently opened programs in the Start menu and Store and display recently opened items in the Start menu and the taskbar click Apply click OK Disable Start up Menu inWindows 7
26.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 26 • Windows Updates in Windows
7 Windows Updates Click Start Control Panel select System and Security Select Windows Update Change Settings Choose how Windows can install updates
27.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 27 Pointers for Updates Always patch the OS and applications
to the latest patch levels Ensure that you are downloading patches only from authentic sources ‐‐ preferably the vendor site Use patch management tools for easier updating–there are several free tools Do not send patches through email Do not open executable files from sources of questionable integrity Choose to be notified by the vendor about vulnerability announcements
28.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 28 Apply Software Security
Patches 1 2 3 4 5 Updates can be installed automatically or manually Automatic updates can be installed on a scheduled basis Updates must be installed from the vendor’s website The update process can be hidden and restored Software updates are used to keep the OS and other software up‐to‐date
29.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 29 Open Windows Firewall by clicking the Start button click Control Panel In the search box, type Firewall
click Windows Firewall In the left pane, click Turn Windows Firewall ON or OFF Configuring Windows Firewall in Windows 7
30.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 30 Adding New Programs
in Windows Firewall in Windows 7 1. Click Start Control Panel type Firewall in the search box press Enter 2. Click Allow a program through Windows Firewall 3. Click Change Settings
31.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 31 4. Click Allow another Program 5. The Add A Program window opens, which lists pre‐installed programs Click Browse
to add a program (if required) Adding New Programs in Windows Firewall in Windows 7
32.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 32 6. Navigate to the Location of the program
select its executable file click Open 7. Click Add click OK to exit the Windows Firewall The change is applied to the list of added programs Adding New Programs in Windows Firewall in Windows 7
33.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 33 Removing/Disabling Programs Rules from
the Windows Firewall in Windows 7 Click Start Control Panel search Windows Firewall go to Allow a Program through Windows Firewall click Change Settings Select the rule you want to Remove/Disable To Disable any rule for any specific network location, uncheck its respective checkbox click OK To remove any program completely from the allowed program list, click Remove click YES click OK
34.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 34 Advance settings in Windows Firewall allow users to create custom rules Steps to create a new rule: 1. Click Start
Control Panel search for firewall click Check Firewall Status click Advanced Settings Creating a New Windows Firewall Rule in Windows 7
35.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 35 2. In the Windows Firewall with Advanced Security window, click Inbound Rules
click New Rule 3. The New Inbound Rule Wizard opens select the type of rule (Program, Port, Predefined, and Custom rules) you would like to create click Next Creating a New Windows Firewall Rule in Windows 7
36.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 36 4. Select the type of protocol (TCP/UDP) and provide the port numbers or select the option All Local Ports for the rule you want to be applied click Next 5.
Decide what Action to take when a connection matches the specified condition (here, Allow the Connection) click Next Creating a New Windows Firewall Rule in Windows 7
37.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 37 6. Select a Profile for which the rule has to be applied
click Next 7. Give a Name to the newly created Rule and description (optional) click Finish The rule is created and it allows TCP Inbound traffic to all the ports. Note: To create a rule for Outbound traffic, follow the same steps. But select UDP protocol and enter 5679 as the port number Creating a New Windows Firewall Rule in Windows 7
38.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 38 Two-Way Firewall Protection
in Windows Click the Start button type wf.msc or Firewall in search bar press Enter Click the Windows Firewall with Advanced Security icon This management interface displays the inbound and outbound rules Click Windows Firewalls Properties A dialog box with several tabs will appear For each profile‐‐Domain, Private, and Public‐‐change the setting to Block, and then click OK
39.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 39 Close any open programs running on the partition or logical drive to be converted Click Start All Programs Accessories, right‐click Command Prompt, and then click Run as administrator. Type the password or provide confirmation if prompted In the Command Prompt, type convert drive_letter: /fs:ntfs, where drive_letter
is the letter of the drive to be converted to NTFS, and then press ENTER Type the name of the volume you want to convert, and then press ENTER Always Use NTFS NTFS file system provides better performance and security for data on hard disks and partitions than the FAT file system Convert partitions that use the earlier FAT16 or FAT32 file system to NTFS by using the convert command Note: Converting a partition from FAT to NTFS does not affect the data on it. You need to restart the computer for the NTFS conversion if the partition contains system files.
40.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 40 Module Flow System Security Threats to System Security How Does Malware Propagate? Guidelines for Windows OS Security Windows Encrypting File System (EFS) Windows Security Tools Guidelines for Securing Mac OS X
41.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 41 Windows Encrypting File
System (EFS) Windows Encrypting File System (EFS) allows Windows 7 system users to encrypt files and folders in an NTFS formatted disk drive Right‐click the file to be encrypted select Properties on the General tab click the Advanced button. The Advanced attributes dialog box appears. There are two options under Compress or Encrypt attributes, Compress contents to save disk space and Encrypt contents to secure data Select Encrypt contents to secure data click OK to close the Compress or Encrypt Attributes dialog box click Apply An Encryption Warning dialog box appears, check any of the two options: Encrypt the file and its parent folder and Encrypt the file only click OK
42.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 42 • Right‐click the file to be decrypted select Properties • On the General
tab, click the Advanced button. An Advanced Attributes dialog box appears • There are two options under Compress or Encrypt Attributes, Compress contents to save disk space and Encrypt contents to secure data • Uncheck Encrypt contents to secure data click OK to close the Compress/Encrypt Attributes dialog box apply the settings click OK How to Decrypt a File Using EFS in Windows?
43.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 43 Using Windows Defender Windows Defender is an antispyware
software that offers real‐time protection against spyware and other potentially malicious programs infecting the computer To turn Windows Defender ON or OFF open Windows Defender by clicking the Start button click All Programs click Windows Defender or type Windows Defender in the search space Click Tools click Options click Administrator select or clear the Use Windows Defender check box click Save
44.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 44 Enable BitLocker inWindows
7 1. BitLocker Drive Encryption provides better data protection by encrypting an entire Windows operating system volume 2. The hard drive and any removable media on the computer can be encrypted 3. Encrypted removable media can be decrypted and re‐encrypted on any Windows 7 computer 4. Click Start click Computer Right click on any drive and select the option Turn on BitLocker… Note: BitLocker is available only in the Enterprise and Ultimate editions of Windows Vista and Windows 7
45.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 45 Launching EventViewer in Windows
7 Windows XP Windows 7 Event Viewer is a built‐in Windows utility that allows users to view and manage the event logs, gather information about hardware and software problems, and monitor Windows security events To start Event Viewer in Windows 7 click Start Control Panel System and Security Administrative Tools Event Viewer
46.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 46 1. Event Viewer categorizes events into five types: Error, Warning, Information, Audit Success, and Audit Failure 2. Each event log is differentiated by its level
and contains header information and a description of the event 3. Each event header contains a detailed description of the level, date, time, source, event ID, and task category Event Viewer: Events and How to Read Logs on the System
47.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 47 A service is a long‐running executable that performs specific functions without requiring any user intervention Services normally start during the system start up or booting Some services load automatically, while others are called when a program is used To view running services, click Start Control Panel
Administrative Tools double‐click Services Alternatively, select Start type services.msc in search bar press ENTER Once the Services window is loaded, the user can turn off any unneeded services Disabling Unnecessary Services in Windows 7
48.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 48 Killing Unwanted Processes Killing
a process Press [Alt]+ [Ctrl] + [Del] keys simultaneously click Task Manager In Task Manager go to Processes tab select the Process click End Process Alternatively, right click on a selected target process select End Process Killing a Process Tree Run the Task Manager select the target process right‐click and select End Process Tree Kill or terminate unnecessary and suspicious processes to increase system performance and protect system against malwares
49.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 49 Finding Open Ports
Using Netstat Tool Knowing open ports, and services and applications associated with these ports helps in detecting the presence of malware such as virus, worms, Trojans, etc. in the system Malware generally open ports to receive or send data packets from attackers Netstat, a Windows inbuilt utility, can be used to determine open ports in the system and associated applications Click Start All Programs Accessories, right‐click Command Prompt, and then click Run as administrator. Type the password or provide confirmation if prompted Type netstat –b in the command prompt window to see the open ports and associated applications
50.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 50 Configuring Audit Policy 1.
Click Start type secpol.msc in search bar, and press Enter 2. Click Local Policies select Audit Policy double‐click the Audit account logon events policy check the Success and Failure boxes click Apply click OK 3. Similarly, change the security setting for all the policies listed in the right hand pane of Local Security Policy window 4. Close the Local Security Policy window Audit policies should be configured to identify attempted or successful attacks on system and network
51.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 51 How to Hide
Files and Folders? Right‐click the file or folder to be hidden click Properties under Attributes check Hidden click Apply click OK On the Organize menu from Windows Explorer click Folder and search options On the View tab, Select the Do not show hidden files and folders option
52.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 52 Disable Simple File
Sharing in Windows 1. Go to Start Control Panel Folder Options 2. From the Folder Options window select the View tab 3. Scroll to the bottom of the Advanced Settings pane 4. Uncheck the checkbox for Using sharing wizard (for Windows 7) click OK
53.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 53 Raise the UAC
Slider Bar inWindows 7 User Account Control (UAC) helps the user to make critical decisions while installing software Click Start Control Panel Action Center Change User Account Control Settings Raise/Adjust the UAC slider bar to Always notify
54.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 54 Module Flow System Security Threats to System Security How Does Malware Propagate? Guidelines for Windows OS Security Windows Encrypting File System (EFS) Windows Security Tools Guidelines for Securing Mac OS X
55.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 55 Windows Security Tools:
Microsoft Security Essentials http://www.microsoft.com Microsoft Security Essentials provides real‐time protection for a home PC that guards against viruses, spyware, and other malicious software
56.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 56 KeePass is a password manager that manages passwords in a secure way and carries all passwords in one database, which is locked with one master
key or a key‐disk The databases are encrypted using current known secure encryption algorithms (AES‐ 256 and Twofish) Windows Security Tools: KeePass Password Safe Portable http://portableapps.com
57.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 57 http://www.pctools.com Windows Security Tools:
Registry Mechanic 1. Registry Mechanic offers tools to speed up and improve the stability of Windows7, Windows Vista, or Windows XP PC 2. Registry Mechanic safely cleans, repairs, and optimizes the registry and automatically backs up changes for future recovery 3. Permanently erases Internet activity, personal files, and free space to keep information away from prying eyes
58.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 58 http://www.microsoft.com Windows Security Tools:Windows Defender Windows Defender helps protect
a computer against pop‐ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from a computer
59.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 59 Module Flow System Security Threats to System Security How Does Malware Propagate? Guidelines for Windows OS Security Windows Encrypting File System (EFS) Windows Security Tools Guidelines for Securing Mac OS X
60.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 60 Step 1: Enabling
and Locking Down the Login Window Click Apple menu System Preferences Accounts Login options Display Login Windows as Name and Password Uncheck Automatically login as: Check Hide the Sleep, Restart, and Shut Down buttons Uncheck Enable fast users switching if not used
61.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 61 Step 2: Configuring
Accounts Preferences From the Apple menu choose System Preferences from the View menu choose Accounts select the username whose password you want to change Click Reset Password (Mac OS X v10.3 and v10.4) or Change Password (Mac OS X v10.5 or later) Enter a new password in both the Password and Verify fields click the Reset Password (Mac OS X v10.3 and v10.4) or the Change Password (Mac OS X v10.5 or later) If a dialog box appears with the message Your Keychain password will be changed to your new account password, click OK
62.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 62 Never create accounts that are shared by several users Each user should have his or her own standard or managed
account Individual accounts are necessary to maintain accountability Administrators should only use their administrator accounts for administration purposes Step 3: Guidelines for Creating Accounts
63.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 63 Step 4: Securing
the Guest Account The guest account must be used for temporary access to the system The guest account should be disabled by default as it does not require a password to login to the computer If the guest account is enabled, Enable Parental Controls to limit what the user can do If the user permits the guest account to access shared folders, an attacker can easily attempt to access shared folders without a password
64.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 64 Step 5: Controlling
Local Accounts with Parental Controls Network Traffic Analysis Open System Preferences click Accounts If the lock icon is locked click the lock icon and provide an Administrator name and Password Select the user account to be managed with parental controls select the Enable Parental Controls checkbox Click Open Parental Controls click System, Content, Mail & iChat, Time Limits, and Logs
65.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 65 Step 6: Use
Keychain Settings Keychain stores passwords on the disk in an encrypted form and it is difficult for a non‐root user to sniff a password between applications Go to Applications Utilities Keychain Access Edit Change settings for Keychain "login" Check Lock after change minutes of inactivity to the desired number of minutes check Lock when sleeping click Save
66.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 66 Step 7: Use
Apple Software Update Mac OS X includes an automatic software update tool to patch the majority of Apple applications Software Update often includes important security updates that should be applied to a user’s machine To update software : Open Software Update preferences click the Scheduled Check pane Deselect Download updates automatically click Check Now
67.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 67 Step 8: Securing
Date & Time Preferences 1. Open Date & Time preferences in the Date & Time pane, enter a secure and trusted NTP server in the Set date & time automatically field 2. Click the Time Zone button choose a Time Zone
68.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 68 Step 9: Securing
Network Preferences It is recommended to disable unused hardware devices listed in Network preferences Open Network preferences from the list of hardware devices, select the hardware device that connects one’s network From the Configure pop‐up menu, choose Manually Enter the user’s static IP address, Subnet Mask, Router, DNS Server, and Search Domain configuration settings Click Advanced in the Configure IPv6 pop‐up menu, choose Off click OK
69.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 69 Step 10: Enable
Screen Saver Password To prevent unauthorized access to a system, enable a screen saver password 1. From the Apple menu select System Preferences click Security click the Lock icon to make changes 2. If prompted, type the admin userid and password 3. In the Security window click the General tab check Require password to wake this computer from sleep or screen saver (Leopard) or Require password immediately after sleep or screen saver begins (Snow Leopard) 4. In addition to the screen saver password, also secure the system by selecting: Disable automatic login Require password to unlock each System Preference. Use secure virtual memory Click the lock icon to prevent further changes Close the Security window and restart your machine
70.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 70 Step 11: Set
Up FileVault to Keep Home Folder Secure Click System Preferences click Security click FileVault click Set Master Password Create the master password for the computer but ensure this password is different from user account password Verify the password click OK
71.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 71 Step 12: Firewall
Security Mac OS X firewall blocks unwanted network communication with the computer: 1. Click System Preferences click Security click Firewall 2. Click the Lock Icon to make changes 3. If prompted, type the admin userid and password 4. By default, the firewall allows all incoming connections, change the option by clicking the second option (Allow only essential services) or third option (Set access for specific services and applications) 5. Choose which application(s) you want the firewall to allow and which to block 6. Click the lock icon to prevent further changes and close the Security window
72.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 72 Internet Fraud Complaint Center (IC3) http://www.ic3.gov TECS: The Encyclopedia of Computer Security http://www.itsecurity.com Virus Bulletin http://www.virusbtn.com Common Vulnerabilities and Exposures http://www.cve.mitre.org Windows Security Guide http://www.winguides.com Stay Safe Online http://www.staysafeonline.org CYBERCRIME http://www.cybercrime.gov Macintosh Security Site http://www.securemac.com Resources on the
Internet for Computer Security
73.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 73 Module Summary Attackers discover new vulnerabilities and bugs to exploit in computer software
Software vendors usually develop patches to address the problems Encryption is the process of converting data into a secret code Regularly update the operating system and other applications Windows System Restore is used to return one’s computer to an earlier state in case of a system failure or other major problem with the system Microsoft Security Essentials provides real‐time protection for the PC that guards against viruses, spyware, and other malicious software Windows Defender helps to protect the system against pop‐ups, slow performance, and security threats
74.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 74 Operating Systems Security
Checklist Install antivirus software and scan the system regularly Do not open any email from unknown senders Perform an antivirus scan while downloading Regularly update the operating system and other applications Lock the system when not in use Physically secure the system from unauthorized access Enable firewall protection and configure all the computer settings for high security Use strong passwords, at least eight characters long, containing both letters and numbers
75.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 75 Operating Systems Security
Checklist Delete the Internet history files, logs, and personal files Make backups of important data and store them safely Disable or limit the number of unnecessary accounts Configure antivirus to check all mediums (CD‐ROMs, email, websites, downloaded files, etc.,) for viruses Use encryption to enhance privacy Keep up‐to‐date with hotfixes and service packs Disable AutoRun for the DVD/CD‐ROM Secure the wireless network
76.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 76 Use Windows Defender to help prevent spyware and other potentially unwanted software from being installed on the computer automatically User Account Control asks for permission before installing software or opening certain kinds of programs that could potentially harm your computer or make it vulnerable to security threats Back up your files and settings regularly so that if you get a virus or have any kind of hardware failure, you can recover your files Set Windows Update to download and install the latest updates for the computer automatically Windows Firewall can help prevent hackers and malicious software, such as viruses, from gaining access to your computer through the Internet Use Action Center to make sure the firewall is ON, antivirus software is up to date, and the computer is set to install updates automatically Windows 7 Security
Checklist
77.
Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 77 MAC OS Security
Checklist Securely erase the Mac OS X partition before installation Set parental controls for managed accounts and Use Password Assistant to generate complex passwords Securely configure Accounts preferences and Date & Time preferences Install Mac OS X using Mac OS Extended disk formatting Create an administrator account and a standard account for each administrator Create keychains for specialized purposes Securely configure Security preferences
Download now