No Worms or Infections Permitted.


77 views
Uploaded on:
Category: Product / Service
Description
No Worms or Infections Permitted How to keep your PC Lab/Classroom PCs Sheltered and Secure: Ernest Staats erstaats@gcasda.org MS Data Confirmation, MCSE, CNA, CWNA, CCNA, Security+, I-Net+, Network+, Server+, A+ otherwise called Geek
Transcripts
Slide 1

No Worms or Viruses Allowed How to keep your PC Lab/Classroom PCs Safe and Secure: Ernest Staats erstaats@gcasda.org MS Information Assurance, MCSE, CNA, CWNA, CCNA, Security+, I-Net+, Network+, Server+, A+ otherwise called Nerd Resources accessible @ http://www.gcasda.org/tech/index.asp?id=118

Slide 2

Look at Physical Issues: Clean Inside/Outside Vacuum consoles and different parts Clean Mice Environment around the PC Physical Security

Slide 3

Protection from Spyware and different types of Malware: Hardware Filtering machines Removal of access routines Gateway firewalls Network based IDS/IPS Software OS locking programming Imaging Eliminate unneeded administrations Update the OS AV and Spyware instruments

Slide 4

Software Options to shield from Malware-Firewalls Desktop Firewall arrangements Antivirus it’s about the overhauls and notice capacities Desktop locking programming Browser Replacements and securing Firefox (or others) over IE Updates for IE

Slide 5

Locking down workstations: Clean Slate - Fortress Grand Deep Freeze - Faronics Shared Computer Toolkit – Microsoft (This item is free yet just works with XP SP2 (ace or home)) ZEN - Novell

Slide 6

Establish a Standardized Image: Ghost Most alternatives superb control focus Novell ZEN Works well on the off chance that you have the Novell Products True Image Less extravagant yet at the same time a decent arrangement of components Snapshot One of the least expensive items however functions admirably

Slide 7

Eliminate Unneeded Services: Windows A rundown of windows administrations can be situated on tech republics site. Windows XP http://techrepublic.com.com/5138-10877-5747817.html?tag=search Windows 2003 server http://techrepublic.com.com/5138-10879-5766252.html?tag=search Linux 101: An extensive rundown of Linux administrations.. http://techrepublic.com.com/5139-3513-6018189.html Macintosh Securing you\'re PC: Macintosh Quick-Click Guide http://computing.geology.ucdavis.edu/security/CyberSafety-MacQuickClick.php#checklist

Slide 8

Windows Services are expelled from Windows frameworks by either uninstalling them with the Add/Remove Programs , by turning them off with a control board or registry disabling so as to set, or them with the Services control board found under regulatory instruments. Running the charge netstat –a gives a rundown of every open port on a framework. A rundown of windows administrations can be situated on tech republics site. Win XP http://techrepublic.com.com/5138-10877-5747817.html?tag=search Windows 2003 server http://techrepublic.com.com/5138-10879-5766252.html?tag=search

Slide 9

Linux administrations can be begun or ceased either from the charge line or structure a graphical setup instrument The summon line obliges one altering records in the/and so forth/rc.d sub-catalogs The most widely recognized spots are in/and so on/inetd.conf , in the/and so on/rc1.d,/and so forth/rc2.d , and so forth registries, and in the startup scripts. Administrations accessible through the inetd administration are turned on and off by just remarking them out of the/and so on/inetd.conf record While there are a few diverse graphical devices relying upon the Linux flavor you are utilizing a large portion of them will run ntsysv which can be utilized to check or uncheck administrations to keep running at start up (Run level particular.) Some forms of Linux utilization Service Configuration ( serviceconf ) gui system to turn administrations on and off. To totally evacuate an administration, erase the executable records from the framework that begin the administration. Normal administrations are in/usr/sbin and have names that begin with “in.” and end with “d”. in.ftpd The netstat –a charge records every single open port

Slide 10

Macintosh running OS 9 and prior has the greater part of its administrations controlled with a control board. Administrations can be turned on and off with the control board and the product can be uprooted utilizing the Extensions Manager control board to evacuate the control board or augmentation that keeps up the administration. OS X regular administrations are turned on and off utilizing System Preferences . Permit Remote Login check box turns on the ssh convention. (Comprehend what you are turning on) open a terminal window and execute the netstat –a order to show all open system ports.

Slide 11

Keep Your Systems Up-to-Date: Updating Windows frameworks Updating Linux frameworks Updating Macintosh frameworks Is your Antivirus current do you know without a doubt

Slide 12

Updating Windows Systems Windows Update Site http://update.microsoft.com/microsoftupdate/v6/default.aspx?ln=en-us The Microsoft Baseline Security Analyzer is a device that incorporates some extra checks of some basic security settings.. This apparatus likewise verifies, That document frameworks are all NTFS If records have unexpiring passwords what number chairman records are on this machine If any records have feeble passwords That the visitor record is handicapped That autologin is crippled That confine mysterious is set as high as could reasonably be expected That Login achievement and disappointment is being examined Download MBSA http://www.microsoft.com/technet/security/instruments/mbsahome.mspx

Slide 13

Updating Linux Systems Maintaining Linux frameworks is much like keeping up Windows frameworks in that there is a programmed overhaul administration accessible for most forms of Linux. Security Tip: Don’t introduce patches for administrations you are not utilizing. Running the patch project will in some cases introduce the administration. On the off chance that the administration is introduced and you don’t need it, just uninstalling it evacuates the defenselessness.

Slide 14

Updating Macintosh Systems Newer Macintosh frameworks (OS 9 and OS X) accompany the Software Update administration. This administration naturally checks with the Apple site for programming redesigns. You can get data about security reports on the Apple Security Updates site page http://docs.info.apple.com/article.html?artnum=61798 Subscribe to the Apple Security-Announce mailing rundown http://www.info.apple.com/subscribe/index.html

Slide 15

Windows Live Safety Center Check for and uproot infections Learn about dangers What ports are open on your PC Improve your PC\'s execution Disk defrag and other tune up settings Get free of garbage on your hard plate http://safety.live.com/site/en-US/default.htm

Slide 16

Windows Defender Windows Defender is a free program that aides ensure your PC against pop-ups, moderate execution, and security dangers brought about by spyware and other undesirable programming. It is a touch of memory pig when checking http://www.microsoft.com/athome/security/spyware/programming/default.mspx

Slide 17

Hardware Options to shield from Malware-A Content separating apparatus Eliminate Floppy , USB, or CD ROM boot access Develop school wide approaches for controlling who has entry to what assets (The most vital stride in the process & organization must support arrangements) Gateway Firewall to ensure the system border Network based IDS/IPS to recognize a nearby contamination on the system

Slide 18

Suggested Practices Use a safeguard in Depth technique Gateway firewalls and substance scanners Server insurance Firewall, AV, spyware filtering, OS overhauling Imaging Desktop assurance Lock the workstations AV and OS upgraded every day Eliminate unneeded administrations Install against spyware programming that will examine day by day Make a picture of the frameworks Use Microsoft’s Baseline Security Analyzer to test frameworks

Slide 19

How to clean a tainted machine: Specialized Boot circle UBCD4Win - http://www.ubcd4win.com/Microsoft AntiSpyware and Windows Defender (free) Other AntiSpyware Antivirus Boot plate repair Trend Micro House Call/one time cleaning Last resort Reformat the PC

Slide 20

Resources Connecting to the Internet Securely; Protecting Home Networks ( http://www.ciac.org/ciac/reports/CIAC-2324_Connecting_to_the_Internet_Securely_Protecting_Home_Networks.pdf ) A rundown of windows administrations can be situated on tech republics site. Windows XP http://techrepublic.com.com/5138-10877-5747817.html?tag=search Windows 2003 server http://techrepublic.com.com/5138-10879-5766252.html?tag=search Linux 101: A complete rundown of Linux administrations.. http://techrepublic.com.com/5139-3513-6018189.html

Slide 21

Resources Continued This PPT and a rundown of assets http://www.gcasda.org/tech/index.asp?id=118 Step by step directions for systems administration http://www.homenethelp.com/web/howto/index.asp Common Ports utilized by trojans (2006) http://www.doshelp.com/Ports/Trojan_Ports.htm MS Windows Defender http://www.microsoft.com/athome/security/spyware/programming/default.mspx MS Windows Live Safety Center http://safety.live.com/website/en-US/default.htm MS Shared PC toolbox http://www.microsoft.com/downloads/details.aspx?familyid=7256D456-E3DA-42EA-857D-92B716077A84&displaylang=en Home PC Firewall Guide (astounding surveys) http://www.firewallg

Recommended
View more...