SlideShare a Scribd company logo
Security Highlights of Windows 7
                                                 Windows 7, the latest operating system release from Microsoft®, contains new
                                                 security features which might be of interest to many DoD and Intelligence
                                                 Community customers. This guide highlights many of these security features and
                                                 is for information purposes only. It should in no way be construed as an NSA
                                                 endorsement of the product.

                                                 Security Development Lifecycle
                                                 In 2002, Bill Gates stated that security is a major issue and declared “Trustworthy
                                                 Computing” the company’s highest priority. Since then, Microsoft developed the
                                                 Security Development Lifecycle (SDL) methodology, which utilizes secure design
                                                 principles such as threat modeling, component isolation, least privilege, and source
                                                 code testing. A fundamental goal of the SDL process is to reduce the attack surface.
                                                 Since adoption of the SDL process, the number of Common Vulnerabilities and
                                                 Exposures (CVE) on Microsoft products in the National Vulnerability Database has
                                                 declined. Windows Vista was the first operating system that was fully developed under
                                                 the SDL process. In Windows 7, the SDL process continues via retention of original
                                                 or enhanced security features from Windows Vista and the introduction of several new
                                                 security features.

                                                 Windows 7 Security Features
               OVERVIEW                          Internet Explorer 8 (IE8): Utilizes Data Execution Protection (DEP), provided the
                                                 hardware supports it, and Address Space Layout Randomization (ASLR) by default to
 Many DoD and Intelligence Community
 customers have a variety of security needs.     help protect against malicious code execution and incorporates the most recent anti-
 Operating Systems are just one component        phishing technology and improved restrictions on ActiveX controls.
 that is relied upon to satisfy these security
 needs. This guide highlights many of the        AppLocker: Replaces Software Restriction Policy (SRP) and provides greater
 new security features in Windows 7, just
                                                 flexibility to govern which applications are allowed to run and from which locations.
 one of the many commercial operating
 systems available.
                                                 Domain Name System (DNS) Security Extensions: Designed to prevent DNS
                                                 spoofing, such as DNS cache poisoning, by providing data integrity for DNS client
         SECURITY FEATURES                       resolvers through digitally signed response to DNS queries.

 - Internet Explorer 8                           Bitlocker To Go: Provides encryption support for mass storage devices such as USB
 - AppLocker                                     flash devices and external hard drives. Support for password-protection and certificate-
 - DNS Security Extensions                       based authentication is available for IEEE 1667 compliant USB devices.
 - BitLocker To Go
                                                 Improved User Account Control (UAC): Retains same level of security with fewer
 - Improved User Access Control
                                                 prompts. This is achieved by a reduction in the number of applications that require
 - Biometric & Smart Card Enhancements           elevated privilege, and customization of threat levels for UAC prompts.
 - Direct Access
 - Advanced Firewall Polices                     Biometric & Smart Card Enhancements: Automates plug-and-play driver
                                                 installation without user intervention. Supports fingerprint reader and Elliptic Curve
                                                 Cryptography for Windows Logon.


                         The Information Assurance Mission at NSA



SNAC DoD 9800 Savage Rd., Ft. Meade, MD 20755-6704 410-854-6632 DSN: 244-6632 FAX: 410-854-6604 www.nsa.gov/snac
Direct Access: Provides seamless and secure access to enterprise resources without the need for a Virtual Private Network
 (VPN). Leverages Internet Protocol 6 (IPv6) and Internet Protocol security (IPSec) to provide secure network infrastructure.

 Advanced Firewall Policies: Allows IT administrators to more easily manage firewall policy by providing the ability to apply
 separate rules for remote and local client connections to the domain.

 Security Features Retained From Windows Vista
 Buffer Overflow Protection: Buffer overflows are a common source of vulnerabilities used to gain control of an operating
 system. Windows 7 retains or improves security features from Vista to help mitigate this issue, including the use of DEP
 (provided the hardware supports it), ASLR, stack and heap canaries, and exception handling protection.

 Least Privilege: Limits the damage from exploiting a service by executing it with its own credentials, restricting access to critical
 resources. Also, administrator accounts are restricted to user-level permissions by default, limiting the scope of potentially
 dangerous operations such as web surfing or email reading.

 Malware Protection: Provides defense-in-depth protection such as anti-phishing technology, and Windows Defender that
 offers spyware scanning.

 Kernel Protection: Helps prevent rootkit installation via kernel patch protection, which checks the internal kernel data
 structures for changes (a feature available only on 64-bit versions), and driver signature verification, which ensures code
 authenticity (enabled by default for both 32-bit and 64-bit versions).

 Firewall: A bi-directional firewall, filtering both incoming and outgoing network connections, for defending against
 malicious activity.

 BitLocker: A capability to encrypt hard-drive operating system disk volumes, providing data integrity and confidentiality.
 When using BitLocker on a machine with a Trusted Platform Module, the boot sequence performs an additional check of the
 startup code to ensure system integrity.

 Security Conclusion
 A preliminary System and Network Analysis Center (SNAC) analysis has determined that the new Windows 7 security
 features, coupled with the use of the SDL process throughout the development cycle, has assisted in the delivery of a more
 secure product. Windows 7 security features target major avenues of traditional operating system attacks. Because no product
 is error-free, it is inevitable that security weaknesses will be discovered and new classes of attacks will be invented. Therefore,
 before deploying any product into an operational environment, information systems security engineering should be applied to
 address the threats, assess the risks, and minimize potential damage.




 Microsoft, BitLocker, AppLocker, Direct Access, Windows 7 and Windows Vista are either registered trademarks or are trademarks of Microsoft Corporation in
 the United States and/or other countries. The Systems and Network Analysis Center, Information Assurance Directorate, Security Highlights of Windows 7 is an
 independent publication and is not affiliated with, nor has it been authorized, sponsored, or otherwise approved by Microsoft Corporation.




                        The Information Assurance Mission at NSA



SNAC DoD 9800 Savage Rd., Ft. Meade, MD 20755-6704 410-854-6632 DSN: 244-6632 FAX: 410-854-6604 www.nsa.gov/snac

More Related Content

What's hot

UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
Cisco Case Studies
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
Louise Berri Lange
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
Javier Gonzalez
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
Intel IT Center
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
Javier Gonzalez
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
Javier Gonzalez
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
Javier Gonzalez
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
SafeNet
 
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3
Javier Gonzalez
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysMarcel Winandy
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
Creus Moreira Carlos
 
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Sal Velasco
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
Javier Gonzalez
 
Wp defending-against-sql-injection
Wp defending-against-sql-injectionWp defending-against-sql-injection
Wp defending-against-sql-injectioncheinyeanlim
 
Windows Vista Security
Windows Vista SecurityWindows Vista Security
Windows Vista Security
simplysuperb007
 

What's hot (20)

UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
 
NetWitness Overview
NetWitness OverviewNetWitness Overview
NetWitness Overview
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Wp defending-against-sql-injection
Wp defending-against-sql-injectionWp defending-against-sql-injection
Wp defending-against-sql-injection
 
Windows Vista Security
Windows Vista SecurityWindows Vista Security
Windows Vista Security
 

Viewers also liked

Packaging Event 2008
Packaging Event 2008Packaging Event 2008
Packaging Event 2008
Roel van Bueren
 
Managing your images with Deployment Image Servicing & Management (DISM) – wi...
Managing your images with Deployment Image Servicing & Management (DISM) – wi...Managing your images with Deployment Image Servicing & Management (DISM) – wi...
Managing your images with Deployment Image Servicing & Management (DISM) – wi...
Vijay Raj
 
Building an standard image for windows7
Building an standard image for windows7Building an standard image for windows7
Building an standard image for windows7
AMMAR MANZAR
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, Tools
Roel van Bueren
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-labDPA
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
Jerry Bishop
 

Viewers also liked (6)

Packaging Event 2008
Packaging Event 2008Packaging Event 2008
Packaging Event 2008
 
Managing your images with Deployment Image Servicing & Management (DISM) – wi...
Managing your images with Deployment Image Servicing & Management (DISM) – wi...Managing your images with Deployment Image Servicing & Management (DISM) – wi...
Managing your images with Deployment Image Servicing & Management (DISM) – wi...
 
Building an standard image for windows7
Building an standard image for windows7Building an standard image for windows7
Building an standard image for windows7
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, Tools
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 

Similar to Security Lock Down Your Computer Like the National Security Agency (NSA)

Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
BlackBerry
 
Lock it Down with Nutanix Security
Lock it Down with Nutanix SecurityLock it Down with Nutanix Security
Lock it Down with Nutanix Security
NEXTtour
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
Savinder Puri
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 
K7 Total Security Datasheet
K7 Total Security DatasheetK7 Total Security Datasheet
K7 Total Security Datasheet
K7 Computing Pvt Ltd
 
Overview of Microsoft Sql Server Security
Overview of Microsoft Sql Server SecurityOverview of Microsoft Sql Server Security
Overview of Microsoft Sql Server Security
Gary Manley, MA, PMP
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Jan Ketil Skanke
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
Teemu Tiainen
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
BATbern
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure Sphere
Mirco Vanini
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
SHIVA101531
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
Luigi Perrone
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009
Tobias Koprowski
 

Similar to Security Lock Down Your Computer Like the National Security Agency (NSA) (20)

Windows 7
Windows 7Windows 7
Windows 7
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Lock it Down with Nutanix Security
Lock it Down with Nutanix SecurityLock it Down with Nutanix Security
Lock it Down with Nutanix Security
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
K7 Total Security Datasheet
K7 Total Security DatasheetK7 Total Security Datasheet
K7 Total Security Datasheet
 
Overview of Microsoft Sql Server Security
Overview of Microsoft Sql Server SecurityOverview of Microsoft Sql Server Security
Overview of Microsoft Sql Server Security
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure Sphere
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009
 

More from José Ferreiro

EMBA_brochure_2012-2013
EMBA_brochure_2012-2013EMBA_brochure_2012-2013
EMBA_brochure_2012-2013José Ferreiro
 
Shanghai train central station
Shanghai train central stationShanghai train central station
Shanghai train central station
José Ferreiro
 
Canadian Federal Government - Digital Economy leadership white paper
Canadian Federal Government - Digital Economy leadership white paperCanadian Federal Government - Digital Economy leadership white paper
Canadian Federal Government - Digital Economy leadership white paper
José Ferreiro
 
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
José Ferreiro
 
The most amazing bridges in the world
The most amazing bridges in the worldThe most amazing bridges in the world
The most amazing bridges in the world
José Ferreiro
 
e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation
José Ferreiro
 
e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation
José Ferreiro
 
Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)
José Ferreiro
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
José Ferreiro
 
Distributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweatDistributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweat
José Ferreiro
 
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
José Ferreiro
 
Beginning Android Development
Beginning Android DevelopmentBeginning Android Development
Beginning Android Development
José Ferreiro
 
The most amazing world roads
The most amazing world roadsThe most amazing world roads
The most amazing world roads
José Ferreiro
 
Main challenges to achieving Millenium Development Goals (MDGs) by 2015
Main challenges to achieving Millenium Development Goals (MDGs) by 2015Main challenges to achieving Millenium Development Goals (MDGs) by 2015
Main challenges to achieving Millenium Development Goals (MDGs) by 2015
José Ferreiro
 
Information Systems used in the framework of the TIR Convention : ITDBonline+
Information Systems used in the framework of the TIR Convention : ITDBonline+Information Systems used in the framework of the TIR Convention : ITDBonline+
Information Systems used in the framework of the TIR Convention : ITDBonline+
José Ferreiro
 
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
José Ferreiro
 
Information Systems and Technologies used in the framework of the TIR Convention
Information Systems and Technologies used in the framework of the TIR ConventionInformation Systems and Technologies used in the framework of the TIR Convention
Information Systems and Technologies used in the framework of the TIR Convention
José Ferreiro
 
Mikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
Mikhael Gorbachev - Resetting the Nuclear Disarmament AgendaMikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
Mikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
José Ferreiro
 
MY FIRST MARATHON
MY FIRST MARATHONMY FIRST MARATHON
MY FIRST MARATHON
José Ferreiro
 
United Nations Office in Geneva: Palais des Nations’ view
United Nations Office in Geneva:Palais des Nations’ viewUnited Nations Office in Geneva:Palais des Nations’ view
United Nations Office in Geneva: Palais des Nations’ view
José Ferreiro
 

More from José Ferreiro (20)

EMBA_brochure_2012-2013
EMBA_brochure_2012-2013EMBA_brochure_2012-2013
EMBA_brochure_2012-2013
 
Shanghai train central station
Shanghai train central stationShanghai train central station
Shanghai train central station
 
Canadian Federal Government - Digital Economy leadership white paper
Canadian Federal Government - Digital Economy leadership white paperCanadian Federal Government - Digital Economy leadership white paper
Canadian Federal Government - Digital Economy leadership white paper
 
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
 
The most amazing bridges in the world
The most amazing bridges in the worldThe most amazing bridges in the world
The most amazing bridges in the world
 
e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation
 
e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation
 
Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
Distributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweatDistributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweat
 
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
 
Beginning Android Development
Beginning Android DevelopmentBeginning Android Development
Beginning Android Development
 
The most amazing world roads
The most amazing world roadsThe most amazing world roads
The most amazing world roads
 
Main challenges to achieving Millenium Development Goals (MDGs) by 2015
Main challenges to achieving Millenium Development Goals (MDGs) by 2015Main challenges to achieving Millenium Development Goals (MDGs) by 2015
Main challenges to achieving Millenium Development Goals (MDGs) by 2015
 
Information Systems used in the framework of the TIR Convention : ITDBonline+
Information Systems used in the framework of the TIR Convention : ITDBonline+Information Systems used in the framework of the TIR Convention : ITDBonline+
Information Systems used in the framework of the TIR Convention : ITDBonline+
 
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
 
Information Systems and Technologies used in the framework of the TIR Convention
Information Systems and Technologies used in the framework of the TIR ConventionInformation Systems and Technologies used in the framework of the TIR Convention
Information Systems and Technologies used in the framework of the TIR Convention
 
Mikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
Mikhael Gorbachev - Resetting the Nuclear Disarmament AgendaMikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
Mikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
 
MY FIRST MARATHON
MY FIRST MARATHONMY FIRST MARATHON
MY FIRST MARATHON
 
United Nations Office in Geneva: Palais des Nations’ view
United Nations Office in Geneva:Palais des Nations’ viewUnited Nations Office in Geneva:Palais des Nations’ view
United Nations Office in Geneva: Palais des Nations’ view
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Security Lock Down Your Computer Like the National Security Agency (NSA)

  • 1. Security Highlights of Windows 7 Windows 7, the latest operating system release from Microsoft®, contains new security features which might be of interest to many DoD and Intelligence Community customers. This guide highlights many of these security features and is for information purposes only. It should in no way be construed as an NSA endorsement of the product. Security Development Lifecycle In 2002, Bill Gates stated that security is a major issue and declared “Trustworthy Computing” the company’s highest priority. Since then, Microsoft developed the Security Development Lifecycle (SDL) methodology, which utilizes secure design principles such as threat modeling, component isolation, least privilege, and source code testing. A fundamental goal of the SDL process is to reduce the attack surface. Since adoption of the SDL process, the number of Common Vulnerabilities and Exposures (CVE) on Microsoft products in the National Vulnerability Database has declined. Windows Vista was the first operating system that was fully developed under the SDL process. In Windows 7, the SDL process continues via retention of original or enhanced security features from Windows Vista and the introduction of several new security features. Windows 7 Security Features OVERVIEW Internet Explorer 8 (IE8): Utilizes Data Execution Protection (DEP), provided the hardware supports it, and Address Space Layout Randomization (ASLR) by default to Many DoD and Intelligence Community customers have a variety of security needs. help protect against malicious code execution and incorporates the most recent anti- Operating Systems are just one component phishing technology and improved restrictions on ActiveX controls. that is relied upon to satisfy these security needs. This guide highlights many of the AppLocker: Replaces Software Restriction Policy (SRP) and provides greater new security features in Windows 7, just flexibility to govern which applications are allowed to run and from which locations. one of the many commercial operating systems available. Domain Name System (DNS) Security Extensions: Designed to prevent DNS spoofing, such as DNS cache poisoning, by providing data integrity for DNS client SECURITY FEATURES resolvers through digitally signed response to DNS queries. - Internet Explorer 8 Bitlocker To Go: Provides encryption support for mass storage devices such as USB - AppLocker flash devices and external hard drives. Support for password-protection and certificate- - DNS Security Extensions based authentication is available for IEEE 1667 compliant USB devices. - BitLocker To Go Improved User Account Control (UAC): Retains same level of security with fewer - Improved User Access Control prompts. This is achieved by a reduction in the number of applications that require - Biometric & Smart Card Enhancements elevated privilege, and customization of threat levels for UAC prompts. - Direct Access - Advanced Firewall Polices Biometric & Smart Card Enhancements: Automates plug-and-play driver installation without user intervention. Supports fingerprint reader and Elliptic Curve Cryptography for Windows Logon. The Information Assurance Mission at NSA SNAC DoD 9800 Savage Rd., Ft. Meade, MD 20755-6704 410-854-6632 DSN: 244-6632 FAX: 410-854-6604 www.nsa.gov/snac
  • 2. Direct Access: Provides seamless and secure access to enterprise resources without the need for a Virtual Private Network (VPN). Leverages Internet Protocol 6 (IPv6) and Internet Protocol security (IPSec) to provide secure network infrastructure. Advanced Firewall Policies: Allows IT administrators to more easily manage firewall policy by providing the ability to apply separate rules for remote and local client connections to the domain. Security Features Retained From Windows Vista Buffer Overflow Protection: Buffer overflows are a common source of vulnerabilities used to gain control of an operating system. Windows 7 retains or improves security features from Vista to help mitigate this issue, including the use of DEP (provided the hardware supports it), ASLR, stack and heap canaries, and exception handling protection. Least Privilege: Limits the damage from exploiting a service by executing it with its own credentials, restricting access to critical resources. Also, administrator accounts are restricted to user-level permissions by default, limiting the scope of potentially dangerous operations such as web surfing or email reading. Malware Protection: Provides defense-in-depth protection such as anti-phishing technology, and Windows Defender that offers spyware scanning. Kernel Protection: Helps prevent rootkit installation via kernel patch protection, which checks the internal kernel data structures for changes (a feature available only on 64-bit versions), and driver signature verification, which ensures code authenticity (enabled by default for both 32-bit and 64-bit versions). Firewall: A bi-directional firewall, filtering both incoming and outgoing network connections, for defending against malicious activity. BitLocker: A capability to encrypt hard-drive operating system disk volumes, providing data integrity and confidentiality. When using BitLocker on a machine with a Trusted Platform Module, the boot sequence performs an additional check of the startup code to ensure system integrity. Security Conclusion A preliminary System and Network Analysis Center (SNAC) analysis has determined that the new Windows 7 security features, coupled with the use of the SDL process throughout the development cycle, has assisted in the delivery of a more secure product. Windows 7 security features target major avenues of traditional operating system attacks. Because no product is error-free, it is inevitable that security weaknesses will be discovered and new classes of attacks will be invented. Therefore, before deploying any product into an operational environment, information systems security engineering should be applied to address the threats, assess the risks, and minimize potential damage. Microsoft, BitLocker, AppLocker, Direct Access, Windows 7 and Windows Vista are either registered trademarks or are trademarks of Microsoft Corporation in the United States and/or other countries. The Systems and Network Analysis Center, Information Assurance Directorate, Security Highlights of Windows 7 is an independent publication and is not affiliated with, nor has it been authorized, sponsored, or otherwise approved by Microsoft Corporation. The Information Assurance Mission at NSA SNAC DoD 9800 Savage Rd., Ft. Meade, MD 20755-6704 410-854-6632 DSN: 244-6632 FAX: 410-854-6604 www.nsa.gov/snac