SlideShare una empresa de Scribd logo
1 de 22
PROTECT THE COMPUTER Chapter 10
CHAPTER OVERVIEW AND OBJECTIVES ,[object Object],[object Object],[object Object],[object Object],[object Object]
WINDOWS UPDATE
CRITICAL UPDATES AND SERVICE PACKS
WINDOWS OPERATING SYSTEM UPDATES
DRIVER UPDATES ,[object Object],[object Object]
AUTOMATIC UPDATES
SOFTWARE UPDATE SERVICES (SUS) ,[object Object],[object Object],[object Object],[object Object]
INTERNET CONNECTION FIREWALL ,[object Object],[object Object],[object Object],[object Object]
ENABLING INTERNET CONNECTION FIREWALL
SECURITY LOGGING
ENABLING ICMP OPTIONS
SUPPORTING SERVICE DEFINITIONS
TROUBLESHOOTING INTERNET CONNECTION FIREWALL ,[object Object],[object Object],[object Object]
TROUBLESHOOTING VIRUS ATTACKS ,[object Object],[object Object],[object Object],[object Object]
ANTIVIRUS SOFTWARE ,[object Object],[object Object],[object Object]
ANTIVIRUS SIGNATURE UPDATES ,[object Object],[object Object],[object Object]
COMMON VIRUS WARNING SIGNS ,[object Object],[object Object],[object Object],[object Object],[object Object]
VIRUS RECOVERY ,[object Object],[object Object],[object Object]
MICROSOFT BASELINE SECURITY ANALYZER
SUMMARY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SUMMARY (CONT.) ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )Kashyap Mandaliya
 
Quick Heal
Quick HealQuick Heal
Quick Healdheva B
 
CMTPS (Cloud-base Multi-engine Threat Prevention System)
CMTPS (Cloud-base Multi-engine Threat Prevention System)CMTPS (Cloud-base Multi-engine Threat Prevention System)
CMTPS (Cloud-base Multi-engine Threat Prevention System)Wahied Bozorg-Tabar
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security Zack Fabro
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?AlienVault
 
Freeware malwale removal software
Freeware malwale removal softwareFreeware malwale removal software
Freeware malwale removal softwarecharliedavibrown
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Securityvenkasureantivirus
 
Alien vault _policymanagement
Alien vault _policymanagementAlien vault _policymanagement
Alien vault _policymanagementMarjo'isme Yoyok
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Sarah Isaacs
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019Ivanti
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?MenloSecurity
 
CentOS Implementation - Who Will Support you?
CentOS Implementation - Who Will Support you?CentOS Implementation - Who Will Support you?
CentOS Implementation - Who Will Support you?Sébastien Grimonet
 
Antivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendorsAntivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendorsUltraUploader
 
Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? AlienVault
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 

La actualidad más candente (20)

Virus part1
Virus part1Virus part1
Virus part1
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
QuickHeal Anti-Virus
QuickHeal Anti-VirusQuickHeal Anti-Virus
QuickHeal Anti-Virus
 
Quick Heal
Quick HealQuick Heal
Quick Heal
 
CMTPS (Cloud-base Multi-engine Threat Prevention System)
CMTPS (Cloud-base Multi-engine Threat Prevention System)CMTPS (Cloud-base Multi-engine Threat Prevention System)
CMTPS (Cloud-base Multi-engine Threat Prevention System)
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?
 
Freeware malwale removal software
Freeware malwale removal softwareFreeware malwale removal software
Freeware malwale removal software
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Alien vault _policymanagement
Alien vault _policymanagementAlien vault _policymanagement
Alien vault _policymanagement
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Mdm with config mgr nico
Mdm with config mgr nicoMdm with config mgr nico
Mdm with config mgr nico
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
CentOS Implementation - Who Will Support you?
CentOS Implementation - Who Will Support you?CentOS Implementation - Who Will Support you?
CentOS Implementation - Who Will Support you?
 
Antivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendorsAntivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendors
 
Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3?
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 

Destacado

English Presentations for Non-English Subjects
English Presentations for Non-English SubjectsEnglish Presentations for Non-English Subjects
English Presentations for Non-English SubjectsEvi Sofiawati
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networkingRaja Waseem Akhtar
 
Lean software development tips and tricks - Agile Tour Dublin 2014
Lean software development tips and tricks - Agile Tour Dublin 2014Lean software development tips and tricks - Agile Tour Dublin 2014
Lean software development tips and tricks - Agile Tour Dublin 2014Augusto Evangelisti
 
Agile lean software development principles
Agile  lean software development principlesAgile  lean software development principles
Agile lean software development principlesEyna Hamdzah
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPVuz Dở Hơi
 
Cost vs. Risk: Finding the right balance for hedge fund administration
Cost vs. Risk: Finding the right balance for hedge fund administrationCost vs. Risk: Finding the right balance for hedge fund administration
Cost vs. Risk: Finding the right balance for hedge fund administrationGrant Thornton LLP
 
Chapter10 Server Administration
Chapter10     Server  AdministrationChapter10     Server  Administration
Chapter10 Server AdministrationRaja Waseem Akhtar
 
Did shakespeare really exist?
Did shakespeare really exist?Did shakespeare really exist?
Did shakespeare really exist?zmounscarr
 
Web App Sec Nessus
Web App Sec NessusWeb App Sec Nessus
Web App Sec NessusAung Khant
 
Vulnerability Management using Open Source Tools v1.0
Vulnerability Management using Open Source Tools v1.0Vulnerability Management using Open Source Tools v1.0
Vulnerability Management using Open Source Tools v1.0Vikram Mehta
 
RES Online Seminar Een gratis werkplek voor iedereen
RES Online Seminar Een gratis werkplek voor iedereenRES Online Seminar Een gratis werkplek voor iedereen
RES Online Seminar Een gratis werkplek voor iedereenRES Software Nederland
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaHanaysha
 
Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation...
Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation...Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation...
Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation...Margolis Healy
 
XSS Tunnelling
XSS TunnellingXSS Tunnelling
XSS TunnellingAung Khant
 
LEadership Theories Snap Shot
LEadership Theories Snap ShotLEadership Theories Snap Shot
LEadership Theories Snap Shotdmdk12
 
First Principles Vulnerability Assessment
First Principles Vulnerability AssessmentFirst Principles Vulnerability Assessment
First Principles Vulnerability AssessmentManuel Brugnoli
 
Navigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireNavigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireDavid Strom
 

Destacado (20)

English Presentations for Non-English Subjects
English Presentations for Non-English SubjectsEnglish Presentations for Non-English Subjects
English Presentations for Non-English Subjects
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Lean software development tips and tricks - Agile Tour Dublin 2014
Lean software development tips and tricks - Agile Tour Dublin 2014Lean software development tips and tricks - Agile Tour Dublin 2014
Lean software development tips and tricks - Agile Tour Dublin 2014
 
Week 11
Week 11Week 11
Week 11
 
Agile lean software development principles
Agile  lean software development principlesAgile  lean software development principles
Agile lean software development principles
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
Cost vs. Risk: Finding the right balance for hedge fund administration
Cost vs. Risk: Finding the right balance for hedge fund administrationCost vs. Risk: Finding the right balance for hedge fund administration
Cost vs. Risk: Finding the right balance for hedge fund administration
 
Chapter10 Server Administration
Chapter10     Server  AdministrationChapter10     Server  Administration
Chapter10 Server Administration
 
penetration testing
penetration testingpenetration testing
penetration testing
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
Did shakespeare really exist?
Did shakespeare really exist?Did shakespeare really exist?
Did shakespeare really exist?
 
Web App Sec Nessus
Web App Sec NessusWeb App Sec Nessus
Web App Sec Nessus
 
Vulnerability Management using Open Source Tools v1.0
Vulnerability Management using Open Source Tools v1.0Vulnerability Management using Open Source Tools v1.0
Vulnerability Management using Open Source Tools v1.0
 
RES Online Seminar Een gratis werkplek voor iedereen
RES Online Seminar Een gratis werkplek voor iedereenRES Online Seminar Een gratis werkplek voor iedereen
RES Online Seminar Een gratis werkplek voor iedereen
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq Hanaysha
 
Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation...
Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation...Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation...
Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation...
 
XSS Tunnelling
XSS TunnellingXSS Tunnelling
XSS Tunnelling
 
LEadership Theories Snap Shot
LEadership Theories Snap ShotLEadership Theories Snap Shot
LEadership Theories Snap Shot
 
First Principles Vulnerability Assessment
First Principles Vulnerability AssessmentFirst Principles Vulnerability Assessment
First Principles Vulnerability Assessment
 
Navigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireNavigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaire
 

Similar a 70-272 Chapter10

Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesInformation Technology
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS VulnerabilitiesSecurityTube.Net
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking   chapter 8 - Windows Vulnerabilities - Eric VanderburgEthical hacking   chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric VanderburgEric Vanderburg
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02technext1
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseRishu Mehra
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureOPSWAT
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Amit Gatenyo
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed FirewallMike Wallen
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksMarcelo Silva
 
How Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingHow Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingMicrosoft TechNet
 

Similar a 70-272 Chapter10 (20)

Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking   chapter 8 - Windows Vulnerabilities - Eric VanderburgEthical hacking   chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
CoreSecurity
CoreSecurityCoreSecurity
CoreSecurity
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed Firewall
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS Attacks
 
How Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingHow Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve Supporting
 

Más de Gene Carboni

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResumeGene Carboni
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessGene Carboni
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingGene Carboni
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingGene Carboni
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsGene Carboni
 
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Gene Carboni
 
Lesson 5 - Managing Devices
Lesson 5 - Managing DevicesLesson 5 - Managing Devices
Lesson 5 - Managing DevicesGene Carboni
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Gene Carboni
 
Lesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesLesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesGene Carboni
 
Lesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsLesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsGene Carboni
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting ProcessGene Carboni
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business TransactionsGene Carboni
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business EnvironmentGene Carboni
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7Gene Carboni
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGene Carboni
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGene Carboni
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGene Carboni
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Gene Carboni
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Gene Carboni
 

Más de Gene Carboni (20)

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResume
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting Process
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
 
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
 
Lesson 5 - Managing Devices
Lesson 5 - Managing DevicesLesson 5 - Managing Devices
Lesson 5 - Managing Devices
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
 
Lesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesLesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and Libraries
 
Lesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsLesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System Configurations
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting Process
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business Transactions
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business Environment
 
7th ed ppt ch07
7th ed ppt ch077th ed ppt ch07
7th ed ppt ch07
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing Disks
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7
 

Notas del editor

  1. In this chapter, we discuss ways to maintain security in Microsoft Windows XP and Microsoft Windows 2000 Professional. We discuss using Windows Update and Automatic Updates to ensure that critical operating system updates are applied. We teach students how to configure Internet Connection Firewall and discuss use of antivirus tools for the prevention of computer viruses. We finish with a short description of the Microsoft Baseline Security Analyzer.
  2. Windows Update uses the Internet to provide up-to-date critical fixes and operating system updates to users of Windows computers. Users of Microsoft Windows 98 or later versions will be able to scan their computers and download Microsoft-tested patches required by their specific installation. If possible, demonstrate scanning and downloading an update from Windows Update. Explain that users must be using Microsoft Internet Explorer 5 or later to access the features of this site.
  3. Microsoft usually classifies patches for security vulnerabilities as “critical updates.” When Microsoft makes critical updates available, these updates appear in the Critical Updates and Service Packs section of the Windows Update site. Users can select one or more critical updates to be downloaded and installed at once.
  4. The next section of the Windows Update Web site contains updates recommended for the operating system. This list is compiled as the service scans for installed options. These updates provide enhanced reliability of installed components or, occasionally, additional features provided by Microsoft for the operating system. You can explain that upgrades to Microsoft Windows Media Player as well as patches to database access tools are distributed in the Windows Operating System Updates area.
  5. The Driver Updates section contains any updated device drivers available for your system based on the results of the scan. It is not uncommon to see this area empty. Manufacturers often provide updated drivers on their own Web sites, and do not go to the trouble of passing the updates through WHQL.
  6. Windows 2000 (Service Pack 3 and later), Windows XP, and Windows Server 2003 are able to automatically obtain updates from the Windows Update service. These operating systems can be configured to schedule application of these updates, and even to restart if necessary to complete the application. The location of the configuration dialog boxes differs between Windows 2000 and the later versions of Windows. In Windows 2000 (Service Pack 3 and later), configure Automatic Updates from the Automatic Updates tool in Control Panel. In Windows XP and later versions, configure Automatic Updates in the Automatic Updates tab of the System Properties dialog box.
  7. Microsoft provides the Software Update Services (SUS) architecture to enable corporate IT departments to provide automated distribution of patches to client systems. Corporate administrators download and approve updates to be distributed to their client computers. Client computers can be any version of Windows compatible with Automatic Updates. Administrators can also use group policy templates provided for SUS to manage the configuration of the Automatic Updates feature of client operating systems.
  8. You can enable Internet Connection Firewall (ICF) on Windows XP or later systems to prevent outside attackers from gaining access to the system. It is configured by default to disallow any external access not originally initiated from inside the firewall. You can also configure it to allow inbound connections to support hosted services such as Web serving or File Transfer Protocol (FTP). In addition, security logging can be enabled to allow analysis of attack attempts and patterns.
  9. ICF is enabled in the Advanced tab of the Properties dialog box for an Internet connection. Take a few minutes to discuss the ramifications of enabling a service that blocks all inbound traffic. What will happen if this is enabled on an internal interface? What will this do to file sharing? Will other users be able to use your printer? If enabled on the external interface, will this keep instant messaging or file sharing applications from operating properly?
  10. ICF can log dropped packets and successful connections. You can use this information when troubleshooting ICF or when attempting to trace the source of specific attacks. This slide presents the steps to enable security logging. Take note of the default location of the personal firewall log file. The log file can be located from the browse window available from this dialog box or by finding and opening the file with Notepad or a similar text editor. The structure of the log is presented as a header entry in the log file. This describes the format of the log records.
  11. Internet Control Message Protocol (ICMP) is used to allow routers and other Internet hosts to communicate status or configuration information to each other. ICF blocks all ICMP traffic by default to prevent denial-of-service (DoS) attacks. Sometimes, however, it is necessary to temporarily enable specific ICMP functions. You can do this in the ICMP tab of the Advanced Settings dialog box for ICF. This slide depicts enabling the echo request option. This allows the computer to respond to ping packets originating from the Internet. Be sure to explain that it would be wise to disable ICMP again after testing has been completed to block a range of DoS attack vectors.
  12. You can configure ICF to allow inbound connections to services hosted on the ICF computer or another computer on its network. This slide depicts first enabling the standard Hypertext Transfer Protocol (HTTP) service definition, then a custom service definition for a computer game. In your discussion of service definitions, explain that users activating custom service definitions need to know how the service application communicates. They need to know the port number used by the application, and whether it uses Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) for communication.
  13. This slide depicts three of the most common causes of problems with ICF. A user must be an administrator to access the dialog boxes and enable and configure ICF. Enabling ICF on the wrong interface might interfere with normal network communication and does not provide protection from external threats. Failure to activate a service definition results in Internet clients not having access to that service.
  14. This section of the chapter discusses managing antivirus solutions and responding to virus infections. We discuss in broad terms the installation and configuration of an antivirus solution and how to recognize common signs of virus infection. We complete this section by discussing how to recover from a virus infection.
  15. To be effective, you should install an antivirus solution according to the developer’s instructions. This includes properly configuring it to protect all aspects of a computer’s operation, including e-mail, instant messaging, file sharing, and Web browsing. Most major antivirus solutions protect all these communications methods.
  16. An antivirus solution is only as good as its latest signature update. Antivirus vendors work very hard to ensure the latest viruses are detected by their systems. This means they have to provide up-to-date virus signatures to users of their applications. Most major applications do this automatically. Describe the effects of having a two-day-old signature update when a brand new virus enters the wild overnight. Many of the more newsworthy viruses spread quickly because they traveled from system to system before the systems could be updated with detection signatures for the virus. It is like a game of cat and mouse between virus writer and antivirus vendor.
  17. This slide presents a few warning signs of a virus infection. Users should be educated to recognize when something isn’t right and report the symptoms quickly to the support desk. Refer the students to the complete list in the textbook for additional symptoms. As you discuss the symptoms of a virus infection, ask for a show of hands of who has experienced a virus infection. Ask them how they became aware of the infection and what they did to remove it.
  18. The effects of a virus dictate what actions can be taken to remove it and return the affected system to normal operation. Sometimes tools are made available to remove the virus; sometimes you need to make use of a recovery disk. In extreme cases, you might even have to reinstall the system and applications. Ask your students what actions they have taken in the past to remove virus infections.
  19. We finish the chapter by introducing the Microsoft Baseline Security Analyzer (MBSA). This tool, provided free for download from the Microsoft Web site, scans a system and reports on configurations and settings that weaken security. If time permits, run MBSA to scan a classroom computer. Explain the different items on the report and discuss how any deficiencies reported can be remedied.
  20. Microsoft provides the Windows Update tools and services to assist users and administrators with keeping their systems up to date. Tools provided for this purpose include the Windows Update Web site, Automatic Updates built into Windows 2000 Service Pack 3 and later versions, and Software Update Services. ICF protects a computer from external attack. By default, no inbound traffic is permitted. Service definitions must be enabled to allow inbound connections to services. Security logs are available to allow tracking of dropped packets and successful connections.
  21. Antivirus solutions are available to protect systems from e-mail viruses, Internet worms, and chat room viruses. The success of these solutions relies on the availability of up-to-date virus signature files. These applications typically can be configured to obtain signature updates automatically.