Download Mark Boyer - Methods of securing data in window networks

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer file wikipedia , lookup

Business intelligence wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Computer security wikipedia , lookup

Transcript
Methods of Securing Data in Windows Networks
Mark Boyer
COSC 352
10/2/2008
The process of securing data in windows networks is a very important task, especially if
you are involved with a company or business. The loss or theft of data from a top secret sector of
a company could be catastrophic. Items such as people’s personal files, bank account
information, and things of that nature need to be protected with the up most importance. There
are multiple tools that we can use to help secure windows machines and networks. Some of these
tools deal with authentication, authorization, setting file permissions, encryption, VPN’s,
malware protection, and wireless security.
Windows goes about securing the authentication process by using tools such as password
length, password complexity, password age, and account lockout. Password length has to do with
setting up the minimum and maximum length of the password that a user uses to log on to their
user name. Windows XP uses the option of anywhere from 0 to 128 characters to be used.
Anywhere from 8 to 16 characters is an adequate length for a good password. Then there is the
complexity setting within the password policies section of the administrator tools. This setting
can either be enabled or disabled. If it is enabled the user has to meet three out of four special
requirements while creating their passwords. These four requirements include the use of
uppercase letters, lowercase letters, numbers, and special characters. This setting will only let the
user create a new password if it meets at least three or four of these requirements. Another
technique that is used to verify authentication is account lock out. With this setting the
administrator has the ability to specify how many times a user can enter the wrong password
before they are locked out of the system. This can help to stop brute force attacks on a users
account and prevent a hacker from guessing a users password and falsely being identified as
legitimate user. Once the user is locked out of the system the administrator can either choose to
unlock the password automatically, over a specified period of time, or manually by himself or by
another permitted individual. The final thing that I found to help an admin using windows to
authenticate users is the ability to restrict login times and locations. With this setting they are
able to specify the times of the day, days of the week, and location (computer) that they are
allowed to access the system from. Some of the reasons for this are to secure, important data
from being stolen from outside the company. Another involves the backup process; they usually
do not want any users logged on during the backup process so that there is nothing that can
possibly interfere with it.
Another thing that administrators can do is authorize what a user is allowed to have
access to once they have been authenticated. They can go about this by using one of two
programs. These programs are called sharing permissions and NTFS permissions. Sharing
permissions allows the admin to set restrictions on what folders a user is able to view over the
network. This permission is only able to be applied to folders and not files, in turn though all
permissions that are assigned to a folder are also assigned to all the files within that folder. One
of the problems with this is that the permissions that are assigned are not applied to users
accessing the network locally, meaning they will still have access to all files within your system.
The other form of assigning file permissions NTFS permissions is basically an upgraded version
of sharing permissions. It has the same ability to assign permissions to folders but it can also
assign permissions to files as well. Also it has the ability to restrict local users as well as users
over the network. Another ability that it has is to assign permissions to individual users and
groups of users as well. The NTFS permissions use a set of six standard permissions and 14
special permissions to restrict a user’s access to the system. Some of the six standard permissions
include read, write, full control, and modify. Some of the 14 special permissions include read
attributes, create files/write data, create folders/append data, delete, change permissions, and read
permissions. With these two tasks an administrator can protect their system much better than
they can without them.
The next topic that I need to talk about involves securing Windows networks is,
encryption. To start things off you need a good definition of encryption. Encryption is the
process of turning a segment of data into cipher text, something unreadable, by using a program
that uses a cipher to encrypt and decrypt the message. There are two ways, which the book talks
about, of encrypting in windows systems. The first is IP Security (IPSec) and the second is
Encrypting File systems (EFS). IPSec is probably the most popular method encrypting data. It
works by creating and validating a connection between two devices. This can be done in one of
three ways the first is a preshared key, which is a special key entered on both devices
communicating by an administrator. Second is Kerberos authentication, this is also a way of
using a special key but instead of the admin creating it the OS does. This makes the process
much more secure than the preshared key, because it eliminates the chance for human error.
Then last are digital certificates, these use a third party know as the Certification Authority (CA)
to authenticate. Each device must have applied for a digital certificate from the Certification
Authority. Once they have them communication can then take place. They send their messages
then they each verify with the CA to be sure they are who they are and then the messages are
decrypted and delivered. Along with the three ways of authentication there are three different
policies that are used for IPSec in windows. They are Client (respond only), meaning that it only
uses a secure communicator if the other device suggests it. The second policy is Server (request
security), meaning that it requests secure communication if it is available. If it is not available it
continues the communication insecurely. Then the third form of policy is SecureServer (require
security), meaning that it requires both parties to support secure communication in order to
communicate. If they both do not then the communication process is terminated. This process
helps to secure all data that is sent over the computers network connection. What about if
someone gains access to your hard drive? That is where Encrypting File Systems (EFS) comes
in. The EFS gives the user that creates a given file the ability to encrypt it so that only they or the
data recovery agent can decrypt and read it. The data recovery agent most of the time is the
administrator of the system the user has saved the file on. In doing this the encrypted file is
protected from anyone else being able to access it.
The next securing measure is the VPN. A VPN is a temporary or permanent connection
across a network such as the internet that uses encryption to send and receive data. This is very
useful for securing data transmissions and I will leave it at that, because this is another person’s
topic.
Another important device in securing windows networks are firewalls. Firewalls are
hardware or software programs that inspect in going and outgoing packets and weeds out any
that are undesired. Windows has included a firewall within its operating systems called Windows
firewall. This device’s purpose is to keep out hackers and what not that try to break into your
system. There are many different brands of firewall software that you can download to help
better secure your computer. Some of them include ZoneAlarm Firewall, Armor2net Personal
Firewall 3.12, Commando Firewall Pro, and Tiny Personal Firewall 6.5. Overall fire walls can be
very useful in keeping out “want to be hackers”.
The next thing that I would like to talk about is malware protection. Malware is any type
of software that is meant to cause harm or disruption to any computer system. Four different
types of malware are viruses, worms, Trojans, and spyware. A virus is a program that spreads by
replicating itself into other programs or documents. Its main goal is to corrupt or delete files that
are in the system. Next are worms they also replicate themselves but they are self contained and
do not need any outside help to spread over a network they can do it themselves. Their goals are
to send emails, delete files, create backdoors, and use up the networks bandwidth. Trojans are the
next topic I would like to talk about, they are programs that appear to be something useful, such
as free software but they are really something else in disguise. They do have programs out there
that attempt to catch these malicious programs before they are able to cause any harm on the
computer. These programs are called antivirus software. There are many different types of this
software out there ranging form free to fairly expensive. Some examples of this software
includes AVG Anti-Virus Free Addition, AVAST home addition, Avira Antivir Personal – Free
Antivirus, Norton AntiVirus, and McAfee Virus Scan Plus. Another form and final that I listed is
Spyware, this is a program that collects info about activities on a computer that they are on and
reports them back to the user the put them there. These reports are later used mainly for
marketing purposes such as add pop ups. There is also software out there that can get rid of
spyware on a computer system. Some of these software applications include Ad-Aware 2008,
Spybot – Search & Destroy, Spyware Doctor 5.5, and SpywareBlaster 4.1. With the use of any of
these antivirus, and spyware software you can help increase the security of your system then it
was before they were installed but the main thing that you have to remember is to update. If you
do not your protection becomes weaker and weaker as time goes on.
The final topic I would like to talk about dealing with windows security is wireless
security. As more and more devices and places become wireless we need to learn how to better
protect wireless networks from war drivers. There are five ways that the book lists to do this. The
first is using a Service Set Identifier (SSID), this is a alphanumeric label that identifies on LAN
from another. Second is the wired equivalency protocol (WEP), this provides data encryption in
a network and it uses a static encryption key. Thirdly is 802.11i (WPA2), this provides better
encryption and encrypting key handling. Then lastly is MAC address filtering, this is used on
smaller networks and restricts network access to specific MAC addresses.
These are the main ways that I have learned from the book and internet about securing all
of these topics. I feel that they are all very useful in setting up a secure network, but no matter
what you do you need to make sure that everything is kept up to date and is prepared for the
newest and most popular types of attacks. Remember also that security is worth the cost if it
protects data that is important to the future of your business or company.
Works Cited
Cnet. Retrieved October 1, 2008, Web site: http://www.download.com
Windows IT Library. Retrieved October 1, 2008, Web site
http://www.windowsitlibrary.com
Greg Tomsho, Ed Tittle, David Jhonson. (2007) Guide to Networking Esentials, Fifth
Edition.