Win Security - Gt

Embed Size (px)

Citation preview

  • 8/2/2019 Win Security - Gt

    1/15

    Click to edit Master subtitle style

    4/20/12

    Presented byGaurav tiwaric.s.e. vi sem, b10905CS091043

    INSTITUTE OF TECHNOLOGY

    AND MANAGEMENT

    PRESENTATIONON

    "WINDOWS SECURITY"

  • 8/2/2019 Win Security - Gt

    2/15

    4/20/12

    INTRODUCTION

    Windows Security is aconcept of protectinginternal files ,confidential data ,programs and otherimportant informationstored in any OS

    Windows NT, XP, Vistaetc. from malaciousprogrammes andintruders

    No user wishes to make

  • 8/2/2019 Win Security - Gt

    3/15

    Click to edit Master subtitle style

    4/20/12

    The Windows Security Center consists of three major

    components:A control panel,a Windows Service, and,an application programming interface that is

    provided by Windows Management Instrumentation.

    WINDOWS SECURITY

  • 8/2/2019 Win Security - Gt

    4/15

    4/20/12

    THREATS FOR WINDOWS

    Virus, Worms, Trojans, Adwares

    Windows Registry and

    Group Policy

    Command promptand System Files

    Harmful softwares

  • 8/2/2019 Win Security - Gt

    5/15

    4/20/12

    Virus : A virus is basically an executable file/code that is designedsuch that it is able to infect documents, has the ability to survive byreplicating itself and is also able to avoid detection.

    Worms :Worms, unlike viruses dont need the host to attachthemselves to. They merely make functional copies of themselves anddo this repeatedly till they eat up all the available space on acomputers memory. Usually, they cause harm to the network byconsuming bandwidth.

  • 8/2/2019 Win Security - Gt

    6/15

    4/20/12

    Trojans: In computers, a Trojan horse is a program in whichmalicious or harmful code is contained inside apparentlyharmless programming or data in such a way that it can getcontrol remotely and do its chosen form of damage, such asruining the file allocation table on your hard disk.

    Adwares:Adware or advertising-supported softwareis any software package which automatically plays, displays,or downloads advertisements to a computer after thesoftware is installed on it or while the application is beingused.

  • 8/2/2019 Win Security - Gt

    7/154/20/12

    Common Loopholes

    Easy accessibility to Windows Registry and itsEditing.

    Easy accessibility to Host files and other systemfiles.

    Easy accessibility to Group Policy.

  • 8/2/2019 Win Security - Gt

    8/154/20/12

    Easy accessibility to Command prompt andRun menu.Easy to Crack Administrator and User password

    using Ophcrack Live CD .Presence of .exe files for installation of anyprogrammes / softwares.

  • 8/2/2019 Win Security - Gt

    9/15

    4/20/12

    Windows Registry And Group Policy

    TheWindows Registryis a database that stores settings and optionsfor Microsoft Windows Operating Systems. It contains information andsettings for hardware, operating system software and other usefuldetails.

    Group policy is like a database to define and control how programs,network resources, and the operating system behave for users andcomputers in a Computer organization.

  • 8/2/2019 Win Security - Gt

    10/15

    4/20/12

    Security : Registry And Group Policy

    Since Registry is the central database ofWindows O.S. any kind of malicious setting can leadto a great trouble for the user. For e.g.

    Disabling right click on desktop.(Registry)Disabling Windows Menu Bar. (Registry)

    Adding alarming text to IEs title bar. (Registry)

    Disable Log off and Shutdown button from Start

    button (Group Policy)Disable Task Manager (Group Policy)

  • 8/2/2019 Win Security - Gt

    11/15

    4/20/12

    Command Prompt And System Files

    cmd.exe or command prompt is the command-lineinterpreter on OS/2, Windows CE and on Windows-NTbased operating systems.

    These files store system settings and variables used by the

    DOS and Windows operating systems; also containsfunctions that are used to run the operating system; SYS filestypically should not be edited.

  • 8/2/2019 Win Security - Gt

    12/15

    4/20/12

    Security: Cmd prompt and System Files

    Several default commands of command prompt like, net userif used improperly can be called as a security flaw.

    IP address, MAC address etc. can be changed throughcommand prompt.

    If System file like host file is modified, several sites may beblocked.

    System may not respond if explorer.exe is modified.

    Services.msc is the shortcut through run for Services, little

    change to such services may be destructive.

  • 8/2/2019 Win Security - Gt

    13/15

    4/20/12

    Harmful Softwares

    Ophcrack live CD: This tool lets us crack/bypassAdministrator password quite simply just using theCD.

    Password Recovery Softwares like, Advanced ZipPassword Recovery Software.

    Exe binders like, webco

    VB scripts, .BAT files etc.

    Key loggers like Ardamax key logger.

  • 8/2/2019 Win Security - Gt

    14/15

    4/20/12

    Counter measures for securing windows

    Always install good antivirus with proper updatepatches.

    Delete harmful files such as winlogon.exe

    Lock vulnerable applications like, registry, gpeditetc.

    Always select strong and most uncommon passwordformat consisting of symbols.

    Always scan the system to verify if any Trojan anymalware is installed on any port.

    At last proper monitoring is essential.

  • 8/2/2019 Win Security - Gt

    15/15

    Click to edit Master subtitle style

    4/20/12

    THANKYOU