course ilt security unit objectives configure operating system and file system security install a...
TRANSCRIPT
![Page 1: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/1.jpg)
Cou
rse
ILT
Security
Unit objectives Configure operating system and file
system security Install a fingerprint scanner and card
reader Manage the human aspects of security
![Page 2: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/2.jpg)
Cou
rse
ILT
Topic A
Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of
security
![Page 3: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/3.jpg)
Cou
rse
ILT
User accounts
Object that represents a user of the computer– Name, password, group membership
User Administrator Guest
![Page 4: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/4.jpg)
Cou
rse
ILT
Groups
Management tool for applying security settings to multiple users
Users Administrators Power Users
![Page 5: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/5.jpg)
Cou
rse
ILT
Active Directory
Management framework Centralized database of security data Domains Forests Organizational units
![Page 6: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/6.jpg)
Cou
rse
ILT
Activity A-1
Securing access to the operating system
![Page 7: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/7.jpg)
Cou
rse
ILT
File system security
Logical organization scheme for files Windows supports:
– File Allocation Table (FAT)– FAT32– NTFS
Only NTFS supports security
![Page 8: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/8.jpg)
Cou
rse
ILT
NTFS advantages
Larger disks Security Compression and encryption Disk quotas Recovery logging
![Page 9: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/9.jpg)
Cou
rse
ILT
Activity A-2
Choosing the correct file systemfor security
![Page 10: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/10.jpg)
Cou
rse
ILT
NTFS security
Security tab in Properties dialog box Permissions are cumulative Explicit permissions override inherited
permissions Permissions are inherited unless
blocked Set permissions on folders and files
![Page 11: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/11.jpg)
Cou
rse
ILT
NTFS permissions
Full control Modify Read and Execute List Folder Contents Read Write Special Permissions
![Page 12: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/12.jpg)
Cou
rse
ILT
Enabling the Security tab
1. Open Windows Explorer
2. Choose Tools, Folder Options
3. Activate the View tab
4. Clear the checkbox beside Use simple file sharing
5. Click OK
![Page 13: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/13.jpg)
Cou
rse
ILT
Activity A-3
Configuring file access restrictions
![Page 14: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/14.jpg)
Cou
rse
ILT
Encryption
Scrambling of data Public key cryptography
– Pairs of keys– Whichever encrypts, the pair decrypts
Encrypting file system (EFS)
![Page 15: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/15.jpg)
Cou
rse
ILT
Activity A-4
Encrypting files
![Page 16: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/16.jpg)
Cou
rse
ILT
Authentication mechanisms
Biometric devices Smart cards Fobs Digital certificates
![Page 17: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/17.jpg)
Cou
rse
ILT
Authentication
Identity validated Workgroup vs. domain Local computer vs. domain Network authentication
![Page 18: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/18.jpg)
Cou
rse
ILT
Protocols
Kerberos v5– Supported by: Windows 2000, Windows
XP, and Windows Server 2003
NTLM– Supported by Windows NT, Windows 9x
![Page 19: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/19.jpg)
Cou
rse
ILT
Activity A-5
Understanding authentication technologies
![Page 20: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/20.jpg)
Cou
rse
ILT
Security policies
Password Policy Account Lockout Policy Audit Policy User Rights Assignments Security Options Encrypting File System Software Restriction Policies IP Security Policies
![Page 21: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/21.jpg)
Cou
rse
ILT
Activity A-6
Using local security policies to setpassword restrictions
![Page 22: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/22.jpg)
Cou
rse
ILT
Topic B
Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of
security
![Page 23: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/23.jpg)
Cou
rse
ILT
A fingerprint scanner
![Page 24: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/24.jpg)
Cou
rse
ILT
Activity B-1
Installing a fingerprint reader
![Page 25: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/25.jpg)
Cou
rse
ILT
Smart card and reader
![Page 26: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/26.jpg)
Cou
rse
ILT
Installing IdentiPHI Basic
1. Install the card reader and its drivers
2. Install the IdentiPHI Basic software
3. Configure IdentiPHI Basic to accept smart cards
4. Enroll a smart card and set a secure PIN for that card
![Page 27: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/27.jpg)
Cou
rse
ILT
Activity B-2
Installing a card reader
![Page 28: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/28.jpg)
Cou
rse
ILT
Activity B-3
Installing the IdentiPHI Basic software
![Page 29: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/29.jpg)
Cou
rse
ILT
Activity B-4
Configuring IdentiPHI Basic to accept smart cards
![Page 30: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/30.jpg)
Cou
rse
ILT
Activity B-5
Enrolling a smart card with IdentiPHI
![Page 31: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/31.jpg)
Cou
rse
ILT
Activity B-6
Using a smart card
![Page 32: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/32.jpg)
Cou
rse
ILT
Activity B-7
Uninstalling the smart card readerand software
![Page 33: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/33.jpg)
Cou
rse
ILT
Fobs
Keychain sized devices Creates a rolling code Might need username and password,
in addition to fob number Rolling code not random
![Page 34: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/34.jpg)
Cou
rse
ILT
Topic C
Topic A: Operating system security Topic B: Security hardware Topic C: The human aspects of
security
![Page 35: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/35.jpg)
Cou
rse
ILT
Alleviate security weaknesses
Restrict physical access to sensitive systems and data
Create an automated backup schedule Manage data destruction Create a corporate security policy Manage social engineering attacks
![Page 36: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/36.jpg)
Cou
rse
ILT
Physical access restrictions
Lock server rooms Lock PC cases and peripherals Use cameras or motion-sensor alarms Station guards in ultra-sensitive areas
![Page 37: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/37.jpg)
Cou
rse
ILT
Activity C-1
Implementing physical access restrictions
![Page 38: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/38.jpg)
Cou
rse
ILT
Backup
Use to create copies of your files Recover files after system failure Back up any critical data before you
begin troubleshooting Windows Backup is a GUI utility
– Archive selected files and folders– Restore archived files and folders – Make copy of computer’s system state– Copy your computer’s system partition,
boot partition, and files needed to start up the system
![Page 39: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/39.jpg)
Cou
rse
ILT
Backup utility in Windows XP
![Page 40: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/40.jpg)
Cou
rse
ILT
Backup modes
Wizard mode — walk you step-by-step through the process
Advanced mode — provides complete control over file and folder selection
![Page 41: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/41.jpg)
Cou
rse
ILT
Backup utility in Advanced Mode
![Page 42: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/42.jpg)
Cou
rse
ILT
Backup types
Copy Daily Differential Incremental Normal
![Page 43: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/43.jpg)
Cou
rse
ILT
Activity C-2
Backing up files using Wizard mode
![Page 44: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/44.jpg)
Cou
rse
ILT
Activity C-3
Restoring information from a backup
![Page 45: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/45.jpg)
Cou
rse
ILT
Scheduling backups
Daily Weekly Monthly At predefined times On predefined days
continued
![Page 46: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/46.jpg)
Cou
rse
ILT
Scheduling backups, continued
![Page 47: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/47.jpg)
Cou
rse
ILT
Activity C-4
Scheduling a backup
![Page 48: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/48.jpg)
Cou
rse
ILT
Data destruction and migration
Destruction utilities Removable media and drives Paper records Data migration
![Page 49: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/49.jpg)
Cou
rse
ILT
Activity C-5
Examining data destruction techniques
![Page 50: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/50.jpg)
Cou
rse
ILT
Corporate security policies
Contract between company and employees
Heightens awareness Demonstrates commitment Spells out permitted and prohibited
uses of company resources, plus repercussions
Intrusion handling plans Regularly review and update
![Page 51: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/51.jpg)
Cou
rse
ILT
Activity C-6
Considering corporate security policies
![Page 52: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/52.jpg)
Cou
rse
ILT
Social engineering attacks
Social engineering includes:– Tricking users into divulging sensitive
information– Phishing– Dumpster diving– Shoulder surfing– Trojan horse attachments– Sneaking into secure areas through
deception
Training and awareness are best defenses
![Page 53: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/53.jpg)
Cou
rse
ILT
Malicious software
Virus Worm Trojan horse Spam Spyware Adware Grayware
![Page 54: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/54.jpg)
Cou
rse
ILT
Prevention
Training Corporate security policy Antivirus software
![Page 55: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/55.jpg)
Cou
rse
ILT
Activity C-7
Managing social engineering attacks
![Page 56: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/56.jpg)
Cou
rse
ILT
Network security
Firewalls Password management Account management Incidence reporting
![Page 57: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/57.jpg)
Cou
rse
ILT
Activity C-8
Examining network security
![Page 58: Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human](https://reader030.vdocument.in/reader030/viewer/2022032705/56649dda5503460f94ad11a0/html5/thumbnails/58.jpg)
Cou
rse
ILT
Unit summary
Configured operating system and file system security
Installed a fingerprint scanner and card reader
Managed the human aspects of security