SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Security Highlights of Windows 7
                                                 Windows 7, the latest operating system release from Microsoft®, contains new
                                                 security features which might be of interest to many DoD and Intelligence
                                                 Community customers. This guide highlights many of these security features and
                                                 is for information purposes only. It should in no way be construed as an NSA
                                                 endorsement of the product.

                                                 Security Development Lifecycle
                                                 In 2002, Bill Gates stated that security is a major issue and declared “Trustworthy
                                                 Computing” the company’s highest priority. Since then, Microsoft developed the
                                                 Security Development Lifecycle (SDL) methodology, which utilizes secure design
                                                 principles such as threat modeling, component isolation, least privilege, and source
                                                 code testing. A fundamental goal of the SDL process is to reduce the attack surface.
                                                 Since adoption of the SDL process, the number of Common Vulnerabilities and
                                                 Exposures (CVE) on Microsoft products in the National Vulnerability Database has
                                                 declined. Windows Vista was the first operating system that was fully developed under
                                                 the SDL process. In Windows 7, the SDL process continues via retention of original
                                                 or enhanced security features from Windows Vista and the introduction of several new
                                                 security features.

                                                 Windows 7 Security Features
               OVERVIEW                          Internet Explorer 8 (IE8): Utilizes Data Execution Protection (DEP), provided the
                                                 hardware supports it, and Address Space Layout Randomization (ASLR) by default to
 Many DoD and Intelligence Community
 customers have a variety of security needs.     help protect against malicious code execution and incorporates the most recent anti-
 Operating Systems are just one component        phishing technology and improved restrictions on ActiveX controls.
 that is relied upon to satisfy these security
 needs. This guide highlights many of the        AppLocker: Replaces Software Restriction Policy (SRP) and provides greater
 new security features in Windows 7, just
                                                 flexibility to govern which applications are allowed to run and from which locations.
 one of the many commercial operating
 systems available.
                                                 Domain Name System (DNS) Security Extensions: Designed to prevent DNS
                                                 spoofing, such as DNS cache poisoning, by providing data integrity for DNS client
         SECURITY FEATURES                       resolvers through digitally signed response to DNS queries.

 - Internet Explorer 8                           Bitlocker To Go: Provides encryption support for mass storage devices such as USB
 - AppLocker                                     flash devices and external hard drives. Support for password-protection and certificate-
 - DNS Security Extensions                       based authentication is available for IEEE 1667 compliant USB devices.
 - BitLocker To Go
                                                 Improved User Account Control (UAC): Retains same level of security with fewer
 - Improved User Access Control
                                                 prompts. This is achieved by a reduction in the number of applications that require
 - Biometric & Smart Card Enhancements           elevated privilege, and customization of threat levels for UAC prompts.
 - Direct Access
 - Advanced Firewall Polices                     Biometric & Smart Card Enhancements: Automates plug-and-play driver
                                                 installation without user intervention. Supports fingerprint reader and Elliptic Curve
                                                 Cryptography for Windows Logon.


                         The Information Assurance Mission at NSA



SNAC DoD 9800 Savage Rd., Ft. Meade, MD 20755-6704 410-854-6632 DSN: 244-6632 FAX: 410-854-6604 www.nsa.gov/snac
Direct Access: Provides seamless and secure access to enterprise resources without the need for a Virtual Private Network
 (VPN). Leverages Internet Protocol 6 (IPv6) and Internet Protocol security (IPSec) to provide secure network infrastructure.

 Advanced Firewall Policies: Allows IT administrators to more easily manage firewall policy by providing the ability to apply
 separate rules for remote and local client connections to the domain.

 Security Features Retained From Windows Vista
 Buffer Overflow Protection: Buffer overflows are a common source of vulnerabilities used to gain control of an operating
 system. Windows 7 retains or improves security features from Vista to help mitigate this issue, including the use of DEP
 (provided the hardware supports it), ASLR, stack and heap canaries, and exception handling protection.

 Least Privilege: Limits the damage from exploiting a service by executing it with its own credentials, restricting access to critical
 resources. Also, administrator accounts are restricted to user-level permissions by default, limiting the scope of potentially
 dangerous operations such as web surfing or email reading.

 Malware Protection: Provides defense-in-depth protection such as anti-phishing technology, and Windows Defender that
 offers spyware scanning.

 Kernel Protection: Helps prevent rootkit installation via kernel patch protection, which checks the internal kernel data
 structures for changes (a feature available only on 64-bit versions), and driver signature verification, which ensures code
 authenticity (enabled by default for both 32-bit and 64-bit versions).

 Firewall: A bi-directional firewall, filtering both incoming and outgoing network connections, for defending against
 malicious activity.

 BitLocker: A capability to encrypt hard-drive operating system disk volumes, providing data integrity and confidentiality.
 When using BitLocker on a machine with a Trusted Platform Module, the boot sequence performs an additional check of the
 startup code to ensure system integrity.

 Security Conclusion
 A preliminary System and Network Analysis Center (SNAC) analysis has determined that the new Windows 7 security
 features, coupled with the use of the SDL process throughout the development cycle, has assisted in the delivery of a more
 secure product. Windows 7 security features target major avenues of traditional operating system attacks. Because no product
 is error-free, it is inevitable that security weaknesses will be discovered and new classes of attacks will be invented. Therefore,
 before deploying any product into an operational environment, information systems security engineering should be applied to
 address the threats, assess the risks, and minimize potential damage.




 Microsoft, BitLocker, AppLocker, Direct Access, Windows 7 and Windows Vista are either registered trademarks or are trademarks of Microsoft Corporation in
 the United States and/or other countries. The Systems and Network Analysis Center, Information Assurance Directorate, Security Highlights of Windows 7 is an
 independent publication and is not affiliated with, nor has it been authorized, sponsored, or otherwise approved by Microsoft Corporation.




                        The Information Assurance Mission at NSA



SNAC DoD 9800 Savage Rd., Ft. Meade, MD 20755-6704 410-854-6632 DSN: 244-6632 FAX: 410-854-6604 www.nsa.gov/snac

Más contenido relacionado

La actualidad más candente

Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
 
Wp defending-against-sql-injection
Wp defending-against-sql-injectionWp defending-against-sql-injection
Wp defending-against-sql-injection
cheinyeanlim
 

La actualidad más candente (20)

UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
 
NetWitness Overview
NetWitness OverviewNetWitness Overview
NetWitness Overview
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Wp defending-against-sql-injection
Wp defending-against-sql-injectionWp defending-against-sql-injection
Wp defending-against-sql-injection
 
Windows Vista Security
Windows Vista SecurityWindows Vista Security
Windows Vista Security
 

Destacado

Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
DPA
 

Destacado (6)

Packaging Event 2008
Packaging Event 2008Packaging Event 2008
Packaging Event 2008
 
Managing your images with Deployment Image Servicing & Management (DISM) – wi...
Managing your images with Deployment Image Servicing & Management (DISM) – wi...Managing your images with Deployment Image Servicing & Management (DISM) – wi...
Managing your images with Deployment Image Servicing & Management (DISM) – wi...
 
Building an standard image for windows7
Building an standard image for windows7Building an standard image for windows7
Building an standard image for windows7
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, Tools
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 

Similar a Security Lock Down Your Computer Like the National Security Agency (NSA)

Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
BlackBerry
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
Rishu Mehra
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 

Similar a Security Lock Down Your Computer Like the National Security Agency (NSA) (20)

Windows 7
Windows 7Windows 7
Windows 7
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Lock it Down with Nutanix Security
Lock it Down with Nutanix SecurityLock it Down with Nutanix Security
Lock it Down with Nutanix Security
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
K7 Total Security Datasheet
K7 Total Security DatasheetK7 Total Security Datasheet
K7 Total Security Datasheet
 
Overview of Microsoft Sql Server Security
Overview of Microsoft Sql Server SecurityOverview of Microsoft Sql Server Security
Overview of Microsoft Sql Server Security
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure Sphere
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009
 

Más de José Ferreiro

EMBA_brochure_2012-2013
EMBA_brochure_2012-2013EMBA_brochure_2012-2013
EMBA_brochure_2012-2013
José Ferreiro
 
Main challenges to achieving Millenium Development Goals (MDGs) by 2015
Main challenges to achieving Millenium Development Goals (MDGs) by 2015Main challenges to achieving Millenium Development Goals (MDGs) by 2015
Main challenges to achieving Millenium Development Goals (MDGs) by 2015
José Ferreiro
 
Information Systems used in the framework of the TIR Convention : ITDBonline+
Information Systems used in the framework of the TIR Convention : ITDBonline+Information Systems used in the framework of the TIR Convention : ITDBonline+
Information Systems used in the framework of the TIR Convention : ITDBonline+
José Ferreiro
 

Más de José Ferreiro (20)

EMBA_brochure_2012-2013
EMBA_brochure_2012-2013EMBA_brochure_2012-2013
EMBA_brochure_2012-2013
 
Shanghai train central station
Shanghai train central stationShanghai train central station
Shanghai train central station
 
Canadian Federal Government - Digital Economy leadership white paper
Canadian Federal Government - Digital Economy leadership white paperCanadian Federal Government - Digital Economy leadership white paper
Canadian Federal Government - Digital Economy leadership white paper
 
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
Setting up a private cloud for academic environment with OSS by Zoran Pantic ...
 
The most amazing bridges in the world
The most amazing bridges in the worldThe most amazing bridges in the world
The most amazing bridges in the world
 
e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation
 
e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation e-Customs Services in Border Crossing Facilitation
e-Customs Services in Border Crossing Facilitation
 
Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)Cloud Computing - Why and How? (by Forrester Research, Inc.)
Cloud Computing - Why and How? (by Forrester Research, Inc.)
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
Distributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweatDistributed software services to the cloud without breaking a sweat
Distributed software services to the cloud without breaking a sweat
 
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
Beautiful Latin America by Night (Maravillosa Latinoamérica de noche)
 
Beginning Android Development
Beginning Android DevelopmentBeginning Android Development
Beginning Android Development
 
The most amazing world roads
The most amazing world roadsThe most amazing world roads
The most amazing world roads
 
Main challenges to achieving Millenium Development Goals (MDGs) by 2015
Main challenges to achieving Millenium Development Goals (MDGs) by 2015Main challenges to achieving Millenium Development Goals (MDGs) by 2015
Main challenges to achieving Millenium Development Goals (MDGs) by 2015
 
Information Systems used in the framework of the TIR Convention : ITDBonline+
Information Systems used in the framework of the TIR Convention : ITDBonline+Information Systems used in the framework of the TIR Convention : ITDBonline+
Information Systems used in the framework of the TIR Convention : ITDBonline+
 
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
Lausanne Marathon between the lake and verdant hillsides (2009 Edition)
 
Information Systems and Technologies used in the framework of the TIR Convention
Information Systems and Technologies used in the framework of the TIR ConventionInformation Systems and Technologies used in the framework of the TIR Convention
Information Systems and Technologies used in the framework of the TIR Convention
 
Mikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
Mikhael Gorbachev - Resetting the Nuclear Disarmament AgendaMikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
Mikhael Gorbachev - Resetting the Nuclear Disarmament Agenda
 
MY FIRST MARATHON
MY FIRST MARATHONMY FIRST MARATHON
MY FIRST MARATHON
 
United Nations Office in Geneva: Palais des Nations’ view
United Nations Office in Geneva:Palais des Nations’ viewUnited Nations Office in Geneva:Palais des Nations’ view
United Nations Office in Geneva: Palais des Nations’ view
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Security Lock Down Your Computer Like the National Security Agency (NSA)

  • 1. Security Highlights of Windows 7 Windows 7, the latest operating system release from Microsoft®, contains new security features which might be of interest to many DoD and Intelligence Community customers. This guide highlights many of these security features and is for information purposes only. It should in no way be construed as an NSA endorsement of the product. Security Development Lifecycle In 2002, Bill Gates stated that security is a major issue and declared “Trustworthy Computing” the company’s highest priority. Since then, Microsoft developed the Security Development Lifecycle (SDL) methodology, which utilizes secure design principles such as threat modeling, component isolation, least privilege, and source code testing. A fundamental goal of the SDL process is to reduce the attack surface. Since adoption of the SDL process, the number of Common Vulnerabilities and Exposures (CVE) on Microsoft products in the National Vulnerability Database has declined. Windows Vista was the first operating system that was fully developed under the SDL process. In Windows 7, the SDL process continues via retention of original or enhanced security features from Windows Vista and the introduction of several new security features. Windows 7 Security Features OVERVIEW Internet Explorer 8 (IE8): Utilizes Data Execution Protection (DEP), provided the hardware supports it, and Address Space Layout Randomization (ASLR) by default to Many DoD and Intelligence Community customers have a variety of security needs. help protect against malicious code execution and incorporates the most recent anti- Operating Systems are just one component phishing technology and improved restrictions on ActiveX controls. that is relied upon to satisfy these security needs. This guide highlights many of the AppLocker: Replaces Software Restriction Policy (SRP) and provides greater new security features in Windows 7, just flexibility to govern which applications are allowed to run and from which locations. one of the many commercial operating systems available. Domain Name System (DNS) Security Extensions: Designed to prevent DNS spoofing, such as DNS cache poisoning, by providing data integrity for DNS client SECURITY FEATURES resolvers through digitally signed response to DNS queries. - Internet Explorer 8 Bitlocker To Go: Provides encryption support for mass storage devices such as USB - AppLocker flash devices and external hard drives. Support for password-protection and certificate- - DNS Security Extensions based authentication is available for IEEE 1667 compliant USB devices. - BitLocker To Go Improved User Account Control (UAC): Retains same level of security with fewer - Improved User Access Control prompts. This is achieved by a reduction in the number of applications that require - Biometric & Smart Card Enhancements elevated privilege, and customization of threat levels for UAC prompts. - Direct Access - Advanced Firewall Polices Biometric & Smart Card Enhancements: Automates plug-and-play driver installation without user intervention. Supports fingerprint reader and Elliptic Curve Cryptography for Windows Logon. The Information Assurance Mission at NSA SNAC DoD 9800 Savage Rd., Ft. Meade, MD 20755-6704 410-854-6632 DSN: 244-6632 FAX: 410-854-6604 www.nsa.gov/snac
  • 2. Direct Access: Provides seamless and secure access to enterprise resources without the need for a Virtual Private Network (VPN). Leverages Internet Protocol 6 (IPv6) and Internet Protocol security (IPSec) to provide secure network infrastructure. Advanced Firewall Policies: Allows IT administrators to more easily manage firewall policy by providing the ability to apply separate rules for remote and local client connections to the domain. Security Features Retained From Windows Vista Buffer Overflow Protection: Buffer overflows are a common source of vulnerabilities used to gain control of an operating system. Windows 7 retains or improves security features from Vista to help mitigate this issue, including the use of DEP (provided the hardware supports it), ASLR, stack and heap canaries, and exception handling protection. Least Privilege: Limits the damage from exploiting a service by executing it with its own credentials, restricting access to critical resources. Also, administrator accounts are restricted to user-level permissions by default, limiting the scope of potentially dangerous operations such as web surfing or email reading. Malware Protection: Provides defense-in-depth protection such as anti-phishing technology, and Windows Defender that offers spyware scanning. Kernel Protection: Helps prevent rootkit installation via kernel patch protection, which checks the internal kernel data structures for changes (a feature available only on 64-bit versions), and driver signature verification, which ensures code authenticity (enabled by default for both 32-bit and 64-bit versions). Firewall: A bi-directional firewall, filtering both incoming and outgoing network connections, for defending against malicious activity. BitLocker: A capability to encrypt hard-drive operating system disk volumes, providing data integrity and confidentiality. When using BitLocker on a machine with a Trusted Platform Module, the boot sequence performs an additional check of the startup code to ensure system integrity. Security Conclusion A preliminary System and Network Analysis Center (SNAC) analysis has determined that the new Windows 7 security features, coupled with the use of the SDL process throughout the development cycle, has assisted in the delivery of a more secure product. Windows 7 security features target major avenues of traditional operating system attacks. Because no product is error-free, it is inevitable that security weaknesses will be discovered and new classes of attacks will be invented. Therefore, before deploying any product into an operational environment, information systems security engineering should be applied to address the threats, assess the risks, and minimize potential damage. Microsoft, BitLocker, AppLocker, Direct Access, Windows 7 and Windows Vista are either registered trademarks or are trademarks of Microsoft Corporation in the United States and/or other countries. The Systems and Network Analysis Center, Information Assurance Directorate, Security Highlights of Windows 7 is an independent publication and is not affiliated with, nor has it been authorized, sponsored, or otherwise approved by Microsoft Corporation. The Information Assurance Mission at NSA SNAC DoD 9800 Savage Rd., Ft. Meade, MD 20755-6704 410-854-6632 DSN: 244-6632 FAX: 410-854-6604 www.nsa.gov/snac