Host. Computer system #1. Host Hardening
|
|
- Eugenia Little
- 5 years ago
- Views:
Transcription
1 Host Hardening Series of actions to be taken in order to make it hard for an attacker to successfully attack computers in a network environment (March 28, 2016) Abdou Illia Spring 2016 Host In network computing, the term host refers to a computer that hosts and delivers service to other computers By extension, any device with an IP address is called a host Question: What kind of device can be a host? 2 Computer system #1 Intel Core i7 Processor (3.20GHz) 2GB SDRAM PC3200 (800MHz), Dual Channel 1TB Serial ATA 7200rpm Hard Disk Drive 16x Multi-Format DVD Writer (DVD±R/±RW) Gateway 7-Bay Tower Case Integrated Ultra ATA Controller (1) PCI-E x16 Expansion Slot, (1) PCI-E x1, (3) PCI with 2 available for use (7) USB 2.0 (6 in back and 1 in front in the media card reader), (2) IEEE 1394 Firewire Ports, Parallel, Serial and (2) PS/2 20" Black LCD Flat Panel Display (19" viewable) Gateway Premium 104+ Keyboard Two-Button PS/2 Wheel Mouse Napster 2.0 and 150 Song Sampler Intel High Definition Audio GMAX Speakers with Subwoofer 56K PCI data/fax modem 10/100/1000 (Gigabit) Ethernet Microsoft Office 2010 Professional on DVD 3 1
2 Computer Hardware & Software Productivity Software Operating System Computer Hardware 4 Computer system #2 Intel Core i7 Processor (3.20GHz) 2GB SDRAM PC3200 (800MHz), Dual Channel 1TB Serial ATA 7200rpm Hard Disk Drive 16x Multi-Format DVD Writer (DVD±R/±RW) Gateway 7-Bay Tower Case Integrated Ultra ATA Controller (1) PCI-E x16 Expansion Slot, (1) PCI-E x1, (3) PCI with 2 available for use (7) USB 2.0 (6 in back and 1 in front in the media card reader), (2) IEEE 1394 Firewire Ports, Parallel, Serial and (2) PS/2 20" Black LCD Flat Panel Display (19" viewable) Gateway Premium 104+ Keyboard Two-Button PS/2 Wheel Mouse Napster 2.0 and 150 Song Sampler Intel High Definition Audio GMAX Speakers with Subwoofer 56K PCI data/fax modem 10/100/1000 (Gigabit) Ethernet Windows 7 Professional Google Chrome 16 installed 5 Microsoft Office 2010 Professional installed Computer Hardware & Software Web browser Productivity Software Operating System Computer Hardware 6 2
3 Computer system #3 Intel Core i7 Processor (3.20GHz) 2GB SDRAM PC3200 (800MHz), Dual Channel 1TB Serial ATA 7200rpm Hard Disk Drive 16x Multi-Format DVD Writer (DVD±R/±RW) Gateway 7-Bay Tower Case Integrated Ultra ATA Controller (1) PCI-E x16 Expansion Slot, (1) PCI-E x1, (3) PCI with 2 available for use (7) USB 2.0 (6 in back and 1 in front in the media card reader), (2) IEEE 1394 Firewire Ports, Parallel, Serial and (2) PS/2 20" Black LCD Flat Panel Display (19" viewable) Gateway Premium 104+ Keyboard Two-Button PS/2 Wheel Mouse Napster 2.0 and 150 Song Sampler Intel High Definition Audio GMAX Speakers with Subwoofer 56K PCI data/fax modem 10/100/1000 (Gigabit) Ethernet Windows Server 2008 Enterprise installed Internet Explorer 8 installed 7 IIS 6.0 installed Computer Hardware & Software Web service software (IIS, Apache,...) Web browser Productivity Software Operating System Client & server application programs Computer Hardware 8 Your knowledge about Host hardening Which of the following is most likely to make a computer system unable to perform any kind of work or to provide any service? a) Client application programs get hacked b) Server application programs (web service software, database service, network service, etc.) get hacked c) The operating system get hacked d) The connection to the network/internet get shut down 9 3
4 OS Vulnerability test 2013 by omnired.com OS tested: Win XP, Win Server 2003, Vista Ultimate, Win 7 OS market share Mac OS Classic, OS X 10.4 Server, OS X 10.4 Tiger FreeBSD 6.2, Solaris 10, Fedora Core 6, Slackware 11.0, Suse Enterprise 10, Ubuntu 6.10 Tools used to test vulnerabilities: Scanning tools (Track, Nessus) Network mapping (Nmap command) All host with OS installation defaults Results Microsoft's Windows and Apple's OS X are ripe with remotely accessible vulnerabilities and allow for executing malicious code The UNIX and Linux variants present a much more robust exterior to the outside Once patched, however, both Windows and Apple s OS are secure. 10 Your knowledge about Host hardening You performed an Out-of-the-box installation of Windows XP and Linux FreeBSD 6.2 on two different computers. Which computer is likely to be more secure? a) Windows XP b) Linux FreeBSD 6.2 c) They will have the same level of security What needs to be done, first, in order to prevent a hacker from taking over a server with OS installation defaults that has to be connected to the Internet? a) Lock the server room b) Configure the firewall to deny all inbound traffic to the server c) Download and install patches for known vulnerabilities 11 Security Baseline Because it s easy to overlook something in the hardening process, businesses need to adopt a standard hardening methodology: standard security baseline Need to have different security baseline for different kind of host; i.e. Different security baselines for different OS and versions Different security baselines for different types of server applications (web service, service, etc.) Different security baselines for different types of client applications. 12 4
5 Options for Security Baselines Organizations use different standards OS vendors baselines and tools e.g. Follow MS Installation procedure and use Microsoft Baseline Security Analyzer (MBSA) Standards Agencies baselines e.g. CobiT* Security Baseline Companies own security baselines Security Baseline to be implemented by Server administrators known as systems admin * Control Objectives for Information and Related Technology 13 Elements of Hardening Physical security Secure installation and configuration Fix known vulnerabilities Remove/Turn off unnecessary services (applications) Harden all remaining applications Manage users and groups Manage access permissions For individual files and directories, assign access permissions to specific users and groups Back up the server regularly Advanced protections A c c b o a r s d e i l n i g n e t o 14 Example of Security Baseline for Win XP Clients OS Installation Create a single partition on HDD Format disk using NTFS file system Install Win XP and Service Pack 3 Fixing OS vulnerabilities Download and install latest patches Turn on Windows Automatic Updates checking Configure Windows Firewall Block incoming connections except KeyAccess and Remote Assistance Turn off unnecessary services Turn off Alerter, Network Dynamic Data Exchange, telnet Application Installation Centrally assign applications using group policies Fixing applications vulnerabilities Turn on each application s automatic update checking 15 5
6 Hardening servers The 5 P s of security and compliance: Proper Planning Prevents Poor Performance Plan the installation Identify The purpose of the server. Example: provides easy & fast access to Internet services The services provided on the server Network service software (client and server) The users or types of users of the server Determine Privileges for each category of users If and how users will authenticate How appropriate access rights will be enforced Which OS and server applications meet the requirements The security baseline(s) for installation & deployment Install, configure, and secure the OS according to the security baseline Install, configure, and secure server software according to sec. baseline Test the security Add network defences Monitor and Maintain 16 Hardening servers (cont.) Choose the OS that provides the following: Ability to restrict admin access (Administrator vs. Administrators) Granular control of data access Ability to control executables Ability to log activities Host-based firewall Support for strong authentication and encryption Disable or remove unnecessary services or applications If no longer needed, remove rather than disable to prevent re-enabling Additional services increases the attack vector More services can increase host load and decrease performance Reducing services reduces logs and makes detection of intrusion easier If a service is not used for now, disable it 17 Hardening servers (cont.) Configure user authentication Remove or disable unnecessary accounts (e.g. Guest account) Change names and passwords for default accounts Disable inactive accounts Assign rights to groups not individual users Don't permit shared accounts if possible Configure time sync Enforce appropriate password policy Use 2-factor authentication when necessary Always use encrypted authentication 18 6
7 UNIX / Linux Hardening Many versions of UNIX No standards guideline for hardening User can select the user interface Graphic User Interface (GUI) Command-Line Interfaces (CLIs) or shells CLIs are case-sensitive with commands in lowercase except for file names 19 UNIX / Linux Hardening Three ways to start services Start a service manually (a) through the GUI, (b) by typing its name in the CLI, or (c) by executing a batch file that does so Using the inetd program to start services when requests come in from users Using the rc scripts to start services automatically at boot up Inetd = Internet daemon; i.e. a computer program that runs in the background 20 UNIX / Linux Hardening Starting services upon client requests Services not frequently used are dormant Requests do not go directly to the service Requests are sent to the inetd program which is started at server boot up Program A Program B Program C Program D 4. Start and Process This Request inetd 3. Program C 2. Port Client Request To Port 123 Port 23 Program A Port 80 Program B Port 123 Program C Port 1510 Program D /etc/inetd.config 21 7
8 UNIX / Linux Hardening Turning On/Off unnecessary Services In UNIX Identifying services running at any moment ps command (process status), usually with aux parameters, lists running programs Shows process name and process ID (PID) netstat tells what services are running on what ports Turning Off Services In UNIX kill PID command is used to kill a particular process kill 47 (If PID=47) 22 Advanced Server Hardening Techniques File Integrity Checker Creates snapshot of files: a hashed signature (message digest) for each file After an attack, compares post-hack signature with snapshot This allows systems administrator to determine which files were changed Tripwire is a file integrity checker for Linux/UNIX, Windows, etc.: (ftp://coast.cs.purdue.edu/pub/tools/unix) 23 Advanced Server Hardening Techniques Reference Base 1. Earlier Time File 1 File 2 Other Files in Policy List Tripwire File 1 Signature File 2 Signature 3. Comparison to Find Changed Files 2. After Attack File 1 File 2 Other Files in Policy List Tripwire Post-Attack Signatures File 1 Signature File 2 Signature File Integrity problem: many files change for legitimate reasons. So it is difficult to know which ones the attacker changed. 24 8
9 Other types of host that can be Hardened Internetwork Operating System (IOS) For Cisco Routers, Some Switches, Firewalls Even cable modems with web-based management interfaces 25 9
SOFTWARE TECHNOLOGIES
SOFTWARE TECHNOLOGIES (Week 2, Thursday 1/18/2007) BUS300 - Abdou Illia, Spring 2007 1 LEARNING GOALS Identify the different types of systems software. Explain the main functions of operating systems.
More informationLabSim Mapping Matrix
LabSim Mapping Matrix A+ Guide to Hardware Managing, Maintaining, and Troubleshooting Fourth Edition (220-601) Mapping: LabSim to Chapters LabSim Chapter Reference / 1.0 Computing Overview 1.1 Using the
More informationACER INC. VERITON M200 QUICK SPEC
ACER INC. VERITON M200 QUICK SPEC Designed to meet the demanding needs of your business Veriton M200-Q67 offers uncompromising value for money while focused on providing the maximum expandability that
More informationCS 356 Operating System Security. Fall 2013
CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database
More informationDetailed specifications - ThinkCentre M57 (type 6019, 6066, 6072, 6077, 6087, 9181/ M57p (type 6064, 6067, 6073, 6078, 6088, and 9196)
Страница 1 Detailed specifications - ThinkCentre M57 (type 6019, 6066, 6072, 6077, 6087, 9181/ M57p (type 6064, 6067, 6073, 6078, 6088, and 9196) Applicable countries and regions Architecture Communications
More informationACER INC. VERITON M200 QUICK SPEC
ACER INC. VERITON M200 QUICK SPEC Designed to meet the demanding needs of your business Veriton M200-M61 offers uncompromising value for money while focused on providing the maximum expandability that
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationIT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A Objectives
IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A+ 220-702 Objectives 1.0 Hardware 1.1 Given a scenario, install, configure and maintain personal computer components Storage devices o HDD
More informationHands-On Ethical Hacking and Network Defense Chapter 6 Enumeration
Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 2-22-14 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate NetWare OS targets
More informationHCL Infinity Orb K 6015 (Multimedia PC)
f Save Energy for Benefit of Self and Nation HCL Infinity Orb K 6015 (Multimedia PC) Desktop cabinet Micro ATX cabinet AMD Athlon 64 x 2 Dual Core 3800 + (2*512 KB L2 Cache and 2000 MHz system Bus) Motherboard
More informationThinkCentre M57e systems offer excellent performance at a competitive price
Lenovo Europe Announcement ZG08-0237, dated February 26, 2008 ThinkCentre M57e systems offer excellent performance at a competitive price Description...2 Warranty information... 5 At a glance Benefits
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationHands-On Ethical Hacking and Network Defense 3rd Edition
Hands-On Ethical Hacking and Network Defense 3rd Edition Chapter 8 Desktop and Server OS Vulnerabilities Last updated 3-17-18 Objectives After reading this chapter and completing the exercises, you will
More informationVarious editions of Windows 7
Various editions of Windows 7 ( and their relationship to Windows Vista and XP) Windows 7 Windows Vista Windows XP Starter 1 Starter Starter Home Basic Basic Home Edition Home Premium Home Premium Media
More informationHow NOT To Get Hacked
How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?
More informationCompTIA A Practical Application Exam, 2009 Edition
CompTIA A+ 220 702. Practical Application Exam, 2009 Edition Examination Objectives Mapped to Chapters Chapters Domain Hardware 1.0 1.1 Given a scenario, install, configure and maintain personal computer
More informationIntroduction to Operating Systems. Note Packet # 1. CSN 115 Operating Systems. Genesee Community College. CSN Lab Overview
Introduction to Operating Systems Note Packet # 1 CSN 115 Operating Systems Genesee Community College CSN Lab Overview Dual booted Windows/Linux Workstations Linux workstations currently run CentOS and
More informationCELSIUS R670 The new uncompromising high-end workstation
Data Sheet The new uncompromising high-end workstation Issue: April 2009 The CELSIUS R series is the dual-processor platform for the mid-range and high-end segment with a great selection of graphics subsystems.
More informationOperating system hardening
Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications
More informationIOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5
IOPStor: Storage Made Easy Application data, virtual images, client files, email, the types of data central to running a successful business can seem endless. With IOPStor you finally have an advanced
More informationPARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README
PARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README February 18, 2010 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information
More informationHands-On Ethical Hacking and Network Defense Chapter 6 Enumeration
Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 1-11-17 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate *NIX OS targets
More informationCELSIUS R570 Your compact powerhouse workstation
Data Sheet CELSIUS R570 Your compact powerhouse workstation Issue: April 2009 CELSIUS R570 The CELSIUS R series is the dual-processor platform for the mid-range and highend segment with a great selection
More informationNew ThinkCentre M57 systems offer Intel processor technology with the security and software tools to back up and protect your data
Lenovo Europe Announcement ZG08-0275, dated May 13, 2008 New ThinkCentre M57 systems offer Intel processor technology with the security and software tools to back up and protect your data Description...2
More informationOptiPlex 380. OptiPlex: Secure Computing Made Simple. OptiPlex: The esential key to productivity
Offering more form factors and configurations than ever before in an Essential Optiplex desktop, the new Dell is designed to deliver cost-effective business productivity for growing businesses and organizations.
More informationComputer Network Vulnerabilities
Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like
More informationREQUEST FOR PROPOSAL FOR SUPPLY & INSTALLATION OF DESKTOPS AND LAPTOPS. Supply & installation of DESKTOPS and LAPTOPS in the following location.
REQUEST FOR PROPOSAL FOR SUPPLY & INSTALLATION OF DESKTOPS AND LAPTOPS General Scope of Work: Supply & installation of DESKTOPS and LAPTOPS in the following location. Location of Installation: ISI Kolkata,
More informationepldt Web Builder Security March 2017
epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication
More informationTurn On Windows Firewall Manually Windows 7 Remote Desktop
Turn On Windows Firewall Manually Windows 7 Remote Desktop Learn how to use advanced settings for the Windows 7 firewall to create exceptions for specific services. In the right 7 firewall. Don't use Remote
More informationCompTIA A+ Accelerated course for & exams
CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationKey Features. DATA SHEET
DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive
More informationHands-On Ethical Hacking and Network Defense Chapter 6 Enumeration
Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Updated 3-3-18 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate *NIX OS targets Introduction
More informationTurn On Windows Firewall Manually Windows 7 Remote Desktop Through
Turn On Windows Firewall Manually Windows 7 Remote Desktop Through Learn how to use advanced settings for the Windows 7 firewall to create exceptions for specific services. In the right 7 firewall. Don't
More informationGetting Started with VMware Fusion VMware Fusion for Mac OS X Version 1.0
VMware Fusion for Mac OS X Version 1.0 Getting Started with VMware Fusion Revision: 20070806 Item: VMF-ENG-Q307-295 You can find the most up-to-date technical documentation on our Web site at http://www.vmware.com/support/
More informationTENDER NOTIFICATION SUPPLY, INSTALLATION AND COMMISSIONING OF DESKTOP COMPUTERS
TENDER NOTIFICATION SUPPLY, INSTALLATION AND COMMISSIONING OF DESKTOP COMPUTERS Income-tax Department, Bangalore invites tenders from eligible vendors dealing in Desktop computers to supply, install and
More informationLocking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
More informationTOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION
INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security
More informationQuick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.
Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email
More informationOne Dell Way, Round Rock, Texas 78682
Dell Marketing L.P. One Dell Way, Round Rock, Texas 78682 US Air Force QEB 2013A QEB 2013A Multi-Domain Platform Dell OptiPlex 7010 MiniTower The Dell OptiPlex 7010 business client desktop delivers right-sized
More informationPLATO Learning Environment (v2.0) System and Configuration Requirements
PLATO Learning Environment (v2.0) System and Configuration Requirements For Workstations July 30, 2010 Windows XP Home and Professional (SP3) Windows Vista Home/Premium/Business/Ultimate Windows 7 Home/Premium/Business/Ultimate
More informationData Sheet. CELSIUS M470 Your new thoroughbred workstation
Data Sheet CELSIUS M470 Your new thoroughbred workstation Issue: September 2009 CELSIUS M470 The CELSIUS M Series is the single-processor platform with a particularly wellbalanced ratio between price and
More informationSERVER HARDENING CHECKLIST
SERVER HARDENING CHECKLIST WINDOWS 2003 SERVER CHECKLIST This checklist contains server hardening procedures for Windows 2003 Server. The procedures listed in this document are a balance of industry best
More informationContents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7
Contents at a Glance Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7 Chapter 1: Getting Acquainted with Enterprise Linux...9 Chapter 2: Exploring the Desktop...17 Chapter 3: Putting
More informationChapter 12: Advanced Operating Systems
: Advanced Operating Systems IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents,
More informationIntegrated Ultra320 Smart Array 6i Redundant Array of Independent Disks (RAID) Controller with 64-MB read cache plus 128-MB batterybacked
Data Sheet Cisco MCS 7835-H1 THIS PRODUCT IS NO LONGER BEING SOLD AND MIGHT NOT BE SUPPORTED. READ THE END-OF-LIFE NOTICE TO LEARN ABOUT POTENTIAL REPLACEMENT PRODUCTS AND INFORMATION ABOUT PRODUCT SUPPORT.
More informationPart Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP. Short Description. Long Description. Main Specifications
Part Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP Short Description Long Description Main Specifications Brand Form Factor Unit Dimension (DxWxH) Shipping Dimension (DxWxH)
More informationTechnology in Action
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral
More informationSystem Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements
System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the
More informationCORRIGENDUM IN TENDER NO. HWT
BLOCK NO.-, 8 TH FLOOR, UDYOG BHAVAN, SECTOR-, GANDHINAGAR CORRIGENDUM IN TENDER NO. HWT02036353 Form no. T2 (TECHNICAL MINIMUM SPECIFICATIONS) SECTION ( PCs & other items) Sr. No. Item ) PC ( Intel Core
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationPart Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP. Short Description. Long Description. Main Specifications
Part Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP Short Description Long Description Main Specifications Brand Form Factor Unit Dimension (DxWxH) Shipping Dimension (DxWxH)
More informationCyber Essentials Questionnaire Guidance
Cyber Essentials Questionnaire Guidance Introduction This document has been produced to help companies write a response to each of the questions and therefore provide a good commentary for the controls
More informationNetwork Projector Operation Guide
Network Projector Operation Guide Table of contents Preparation...4 Connecting the projector with your computer...4 Wired connection... 4 Wireless connection (for selected models)... 5 QPresenter...8 Minimum
More informationPass Microsoft Exam
Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION
More informationInstalling Cisco APIC-EM on a Virtual Machine
About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing
More informationSecuring CS-MARS C H A P T E R
C H A P T E R 4 Securing CS-MARS A Security Information Management (SIM) system can contain a tremendous amount of sensitive information. This is because it receives event logs from security systems throughout
More informationExtended Specification. P ProDesk 400 G2.5 Core i GHz 4 GB 500 GB. Personal computer small form factor
P ProDesk 400 G2.5 Core i3 4170 3.7 GHz 4 GB 500 GB Localisation Personal computer small form factor English / United Kingdom Processor 1 x Intel Core i3 4170 / 3.7 GHz ( Dual Core ) Cache Memory Cache
More informationDominion SX Release Notes
Dominion SX Release Notes Dominion SX Release Notes and Compatibility Release 3.1.7 April 14, 2009 Document updated June 10, 2010 Contents Applicability... 2 Release Status... 2 Expiration Date of Content...
More informationQuick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.
Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth
More informationSPECIFICATIONS OF CLUSTER SERVER
SPECIFICATIONS OF CLUSTER SERVER CLUSTER SERVER: Processor - Intel XEON 8 Core E5-2620 V4 Processor ( 2.GHz ) Max Turbo Frequency : 3.0GHz No. of Processors (Std/Max) - 2/2 Cache - 20MB SmartCache Chipset
More informationCisco MCS 7845-H1 Unified CallManager Appliance
Data Sheet Cisco MCS 7845-H1 Unified CallManager Appliance THIS PRODUCT IS NO LONGER BEING SOLD AND MIGHT NOT BE SUPPORTED. READ THE END-OF-LIFE NOTICE TO LEARN ABOUT POTENTIAL REPLACEMENT PRODUCTS AND
More informationFtp Windows 7 64 Bit Requirements Recommendations Memory
Ftp Windows 7 64 Bit Requirements Recommendations Memory RAM. 8 GB or more memory as required by application. *Use Windows 7 64-bit or Mac OS X 10.8 or higher if your computer is equipped with 4 GB of
More informationTable of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup
Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Server Setup Module 1 / Unit 1 Servers and Racks Server Hardware and Software
More informationUPLB-S , SUPPLY AND DELIVERY OF INFORMATION TECHNOLOGY PARTS, ACCESSORIES AND PERIPHERALS TECHNICAL SPECIFICATION FOR THE PUBLIC BIDDING OF:
1 1 BRANDED & BRAND NEW DESKTOP COMPUTER Form Factor: Tower Processor: Intel Pentium processor N3700 (1.6 GHz) Memory: 2GB Dual Channel DDR3 Hard Drive: 500 GB Optical Drive: 8X Super-Multi drive, 9.0
More informationTurn On Windows Firewall Manually Windows 7 Remote Desktop Connection
Turn On Windows Firewall Manually Windows 7 Remote Desktop Connection Learn how to use advanced settings for the Windows 7 firewall to create exceptions for specific services. In the right 7 firewall.
More informationCompTIA A+ Certification ( ) Study Guide Table of Contents
CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System
More informationClient Automation v8.10 Enterprise, Standard, Starter*
Core Installation Satellite Installation Application Management Application Self Service Management Application Management Profiles Patch Management Security And Compliance Management OS Management Out-of-Band
More informationObjectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks
More informationCIS Controls Measures and Metrics for Version 7
Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationIT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems
IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.
More informationAbout the Presentations
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation. You may customize the presentations
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon
More informationPRODUCT SPECIFICATION
A P P E N D I X A PRODUCT SPECIFICATION A-1 Processor Core Logic Processor and Core Logic Mobile Intel Pentium M (Banias), 1.5GHz-1.6GHz, 1 MB L2 with Error Correction Code, or Mobile Intel Pentium M (Dothan),
More informationManually Windows Update Xp Sp3 Iso Bootable
Manually Windows Update Xp Sp3 Iso Bootable Usb Hello, I've downloaded Windows XP Service Pack 3 - ISO-9660 CD Image File from microsoft website. May I know how can I create a bootable USB disk so that
More informationStrategic Infrastructure Security
Strategic Infrastructure Security Course Number: SCPSIS Length: Certification Exam There are no exams currently associated with this course. Course Overview This course picks up right where Tactical Perimeter
More informationChapter 12: Advanced Operating Systems
Chapter 12: Advanced Operating Systems IT Essentials: PC Hardware and Software v4.1 1 Chapter 12 Objectives 12.1 Select the appropriate operating system based on customer needs 12.2 Install, configure,
More informationHost Hardening Achieve or Avoid. Nilesh Kapoor Auckland 2016
Host Hardening Achieve or Avoid Nilesh Kapoor Auckland 2016 Introduction Nilesh Kapoor Senior Security Consultant @ Aura Information Security Core 8 years experience in Security Consulting Co- Author Security
More informationPerceptive TransForm. Technical Specifications. Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x
Perceptive TransForm Technical s Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x Written by: Product Knowledge, R&D Date: May 2018 2008-2018 Hyland Software, Inc. and its
More informationQualifying Minimum Requirements
REQUEST FOR PROPOSAL FOR SUPPLY & INSTALLATION OF DESKTOP General Scope of Work: Supply & installation of DESKTOP in the following location. Locations of Installation: ISI kolkata, 203 B.T. Road, Kolkata
More informationARL 945/ ARL945-B User Reference Manual
ARL 945/ ARL945-B User Reference Manual Specifications Model No ARL945 ARL945-B CPU Intel Core 2 Duo T7500, 2.2GHz Processors (Option: Intel Core 2 Duo T9400, 2.53 GHz) Chipset Intel Gm45 Chipset + ICH9M
More informationSelf-Hosted Hardware and Software Full Requirements
CGM webpractice v7.4 Self-Hosted Hardware and Software Full Requirements 2 Table of Contents Full System Requirements... 3 Server Specifications... 3 Client Computer Specifications... 5 Peripheral Specifications...
More informationHardware and Software Full Requirements
CGM webpractice v7.4 Hardware and Software Full Requirements 2 CGM webpractice_v7 4_SystemReq Revised: 2.21.2019 Table of Contents Full System Requirements... 3 Client Computer Specifications... 3 Peripheral
More informationQuickStart Guide for Managing Computers. Version
QuickStart Guide for Managing Computers Version 10.6.0 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100
More informationManually Join Domain Windows 7 Home Edition Workaround
Manually Join Domain Windows 7 Home Edition Workaround It appears you possibly replied to ILUV via email but the solution was never posted here. I currently upgraded to Windows 7 Home Premium from Windows
More informationSCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES
PONDICHERRY DEPARTMENT UNIVERSITY OF PHYSICS SCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES QUOTATION INVITATION FOR THE PURCHASE OF PROCESSOR SERVER Ref: DST Project "Solitons and Modulational Systems"
More informationVI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5
VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE This manual provides a quick introduction to Virtual Iron software, and explains how to use Virtual Iron VI-Center to configure and manage virtual
More informationA Technical Overview of the Lucent Managed Firewall
Lucent Managed Version 2.0 A Technical Overview of the Lucent Managed This document provides a technical overview of the Lucent Managed architecture. Key technical features and potential application scenarios
More informationMcAfee Network Security Platform 9.1
Revision A McAfee Network Security Platform 9.1 (9.1.7.73-9.1.3.11 Manager-M-series, Mxx30-series, and XC Cluster Release Notes) Contents About the release New features Enhancements Resolved Issues Installation
More informationManager Appliance Quick Start Guide
Revision D Manager Appliance Quick Start Guide The Manager Appliance runs on a pre-installed, hardened McAfee Linux Operating System (MLOS) and comes pre-loaded with the Network Security Manager software.
More informationCIS Controls Measures and Metrics for Version 7
Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update
More information6 x 3.5-inch SATA 6Gb/s, SATA 3Gb/s hard drive. 1. The standard system is shipped without HDD. 2. For the HDD compatibility list, please visit :
VS-6112 Pro+ Hardware Spec. Processor Memory HDD Capacity Dual-core Intel processor 4GB RAM 6 x 3.5-inch SATA 6Gb/s, SATA 3Gb/s hard drive NOTE: 1. The standard system is shipped without HDD. 2. For the
More informationThe Center for Internet Security
The Center for Internet Security Measurably reducing risk through collaboration, consensus, & practical security management Content of this Presentation: I. Background II. Univ. of CA Schools Rights and
More informationPRODUCT SPECIFICATION
A P P E N D I X A PRODUCT SPECIFICATION A-1 Processor Core Logic Processor and Core Logic Intel P4 (Prescott) 2.8 ~ 3.6 GHz, FC-mPGA4 Type, 1 MB L2, with Hyper Threading Technology Mobile Intel P4 (Prescott)
More information2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product.
GA-1310 Welcome 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45085373 5 May 2009 WELCOME 3 WELCOME This Welcome document provides
More informationARP 945 User Reference Manual
ARP 945 User Reference Manual Specifications Model No ARP945 ARP945-B CPU Intel Core 2 Duo T7500 (2.2GHz) Processors (Option: T9400, 2.53GHz) Slots Intel Gm45 Chipset + ICH9M Slot 3x PCI-E (x8) full-size
More informationThe Cisco MCS 7835-H2 can run any of the following Cisco applications:
Cisco MCS 7835-H2 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks enabling easy collaboration every time from any workspace. Product
More informationPerceptive DataTransfer
Perceptive DataTransfer System Overview Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: May 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc.,
More information