Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003



Similar documents
Medical Networks and Operating Systems

Section 12 MUST BE COMPLETED BY: 4/22

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

Chapter 5: Fundamental Operating Systems

PC Security and Maintenance

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Chapter 5: Operating Systems Part 1

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Chapter 15: Computer and Network Security

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Contents. McAfee Internet Security 3

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Computer Viruses: How to Avoid Infection

Windows Operating Systems. Basic Security

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Business ebanking Fraud Prevention Best Practices

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Kaspersky Endpoint Security 10 for Windows. Deployment guide

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

How to easily clean an infected computer (Malware Removal Guide)

Spyware Doctor Enterprise Technical Data Sheet

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Windows XP/Vista/7 Directory Structures

Chapter 4 Application, Data and Host Security

Spyware Analysis. Security Event - April 28, 2004 Page 1

System Security Policy Management: Advanced Audit Tasks

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

1 Introduction. Agenda Item: Work Item:

EUCIP IT Administrator - Fundamentals Syllabus Version 1.0

BROWSER AND SYSTEM REQUIREMENTS

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

Maintaining, Updating, and Protecting Windows 7

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Windows Embedded Standard 7 (WES7) Administration Guide

4.1 Introduction 4.2 Explain the purpose of an operating system Describe characteristics of modern operating systems Control Hardware Access

Introduction to Free Computer Tools

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000

Lecture 6: Operating Systems and Utility Programs

Windows Server 2008 R2 Essentials

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

How to Install Windows 7 software

Online Banking Fraud Prevention Recommendations and Best Practices

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

A+ Practical Applications Solution Key

Revo Uninstaller - User's Guide

Sophos Endpoint Security and Control Help

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

How To Manage A Network Safely

Symantec Protection for SharePoint Servers Implementation Guide

Chapter 4. System Software. What You Will Learn... Computers Are Your Future. System Software. What You Will Learn... Starting the Computer

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

FortKnox Personal Firewall

BUDGETARY OFFER INVITES FOR PROCUREMENT OF COMPREHENSIVE ANTIVIRUS SECURITY SOLUTION FOR DESKTOP COMPUTERS

Auslogics BoostSpeed 5 Manual

Sophos Enterprise Console Help

Client Server Messaging Security 3.5 for Small and Medium Business. Administrator s Guide

Practice test Domain-2 Security (Brought to you by RMRoberts.com)

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008

Sophos Endpoint Security and Control Help. Product version: 11

Discovering Computers

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Configuring and Administering Windows 7

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Reliance Bank Fraud Prevention Best Practices

Chapter 15: Advanced Networks

E-Business, E-Commerce

Spyware. Summary. Overview of Spyware. Who Is Spying?

Operating Systems. and Windows

Sophos for Microsoft SharePoint startup guide

Course 50322B: Configuring and Administering Windows 7

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Introduction to Computer Security Table of Contents

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Chapter 4. Operating Systems and File Management

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Understand Backup and Recovery Methods

PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009

Cyber Security Awareness

70-685: Enterprise Desktop Support Technician

General Service Level Agreement

Kaspersky Small Office Security User Guide

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Airtel PC Secure Trouble Shooting Guide

Transcription:

Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003

Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while selecting an OS OS optimization Advances OS preventive maintenance and troubleshooting Computer Security Security threats Security: prevention and troubleshooting

Advanced Operating Systems

Review OS purpose 1. Communicate with hardware RAM, HD,CPU, keyboard, mouse, Drivers 2. User interface Visual representation of the computer (GUI and CLI) 3. Platform for applications Run, use, and shutdown programs 4. Organizing and manipulating Programs and Data Add, move, and delete files and folders

Review OS types Single-tasking vs. Multi-tasking Single-user vs. Multi-user Multithreading Embedded 32-bit vs. 64-bit Desktop OS vs. Network OS Multi-processing Refers to HW

OS Other features Remote Desktop Network Sharing Scalable CPU Support Encrypted File System (EFS) Enhanced Security Network Operating Systems (NOS) A server enables clients to share resources Increased functionalities and management Network protocols HTTP, FTP, POP3, DHCP,

OS Windows directory structure You might need to know the location of data Manual clean out Structure can differ between OS versions XP: c:\documents and Settings\User_name\My_Documents\ W7: c:\users\user_name\documents\ XP: c:\windows\temp\ W7: c:\users\user_name\appdata\local\temp\ Specific purpose User File Location System File Location Temporary Files Program Files

OS Installation Default Requires user attention Custom Allow users to automate certain activities Unattended Image-based installation Remote installation (RIS)

OS Installation Custom Unattended Administrators create an answer file that instructs the Windows Setup about how to install and configure the OS Image-based installation Copying preconfigured OS and SW applications to computers Remote installation (RIS) Computers without an OS start up and connect to a remote RIS server, which installs the OS

OS Optimization System and Administrative Tools Disk management Disk management utility Disk defragmenter Complete analysis of disk partition Disk partitioning tool Device Manager Task Manager Services Virtual Memory

OS Optimization System and Administrative Tools Services Applications that runs in the background and waits for requests Services may be started, if need, and stopped, for example, for troubleshooting purposes Startup mode Automatic, Manual, Disabled Status Started or Stopped DHCP, Automatic update,

OS Optimization System and Administrative Tools Virtual Memory Optimize the performance of operating systems Uses the hard drive to temporarily store segments of an application or data The OS uses the swap file to mimic RAM Requires administrative privileges to change the size of the swap file Typically, you should let Windows manage the size of the swap file

OS Optimization Software applications Web browsers Cookies Temporary files History Passwords Caching Email clients

OS Command Line Interface DOS CLI or text-based OS How to access the CLI on windows? Commands and switches? How to change directories? How to display the contents of directories? How to edit a file? How to copy files from one location to another? What about copying a entire folder and its contents? How to create and remove a directory? How to navigate to a different directory?

OS Preventive maintenance Schedule Automatic Tasks and Updates Task Scheduler GUI: Taskschd.msc CLI: at command Windows Automatic Update Restore points Problems happen System Restore Takes "snapshots" of critical system and program files, as well as registry settings, and stores this information as restore points

Fundamental Security

Computer and Network Security What is it? Why is it important?

Computer and Network Security What is it? Prevention and detection of unauthorized access and use of equipment and data Data and equipment protection against disasters or hazards Why is it important? Damage or loss of equipment can mean a loss of productivity Repairing and replacing equipment can cost the company time and money Unauthorized use of a network can expose confidential information and reduce network resources Network attacks can lead to all the problems listed above

Security Threats Physical Threats vs. Data Threats Internal Threats vs. External Threats Internal Threats Accidental threats vs. Malicious threats External Threats Unstructured attacks vs. Structured attacks Threats Viruses, Worms, Trojans Adware, Spyware, Grayware DoS Span and Popup windows Social Engineering TCP/IP attacks Data Wiping, Hard Drive Destruction, Recycling

Viruses, Worms, and Trojan Horses Virus Program created by an attacker Collect, alter or destroy information Worm Self-replicating program that uses the network to duplicate its code to the hosts on the network Worms consume bandwidth in a network Trojan horse Program designed to look like one program (game or utility) that does something else

Web Security Tools used to install a program on a computer ActiveX Controls interactivity on web pages Java Allows applets to run within a browser JavaScript Interacts with HTML source code to allow interactive web sites

Adware, Spyware, Grayware Without the user s consent Collect stored information Change the computer configuration Open extra windows Adware Displays advertising, usually in a popup window. Grayware or malware Many grayware attacks are phishing attacks Spyware Phishing is a form of social engineering Persuade the users to provide personal information. Monitors computer activity then sends the information back to a remote machine

Denial of Service (DoS) Form of attack that prevents users from accessing normal services Sends enough requests to overload a resource or even stopping its operation Ping of Death Series of repeated pings intended to crash the receiving computer E-mail Bomb Large quantity of bulk e-mail that overwhelms the e-mail server Distributed DoS Uses many infected computers, called zombies, to launch an attack

Other threats Spans or Junk email Popup windows Social Engineering TCP/IP attacks SYN, DoS, Replay,. Data Wiping Hard Drive Destruction Recycling

Security Procedures Basic Local Security Policy Physical Equipment Protection Data Protection Data Encryption Software Firewall Data Backup File System Security Wireless Security Service Set Identifier (SSID) MAC address filtering Encryption and authentication

Security Prevention Anti-virus Designed to detect, disable, and remove viruses, worms, and Trojan horses Use anti-virus software, options in e-mail software, popup blockers, and common indications of spam to combat spans. Browsers have settings that force the computer user to authorize the downloading or use of ActiveX, Java, or JavaScript Develop and maintain a security plan to protect both data and physical equipment from loss. Keep operating systems and applications up to date and secure with patches and service packs