NET 311 D INFORMATION SECURITY

Similar documents
2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

Looking to get your Start Button Back? Try Classic Shell. It very easy to use and free.

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

ANNOYING COMPUTER PROBLEMS

How to remove Adware from Mozilla Firefox

CleanMyPC User Guide

Transitioning Teacher Websites

Windows SIG Volunteers are not paid, because they are worthless, but because they are priceless!

Browser Guide for PeopleSoft

Activation Screen Virus

How To Remove Virus From Windows OS

Lesson 4: Web Browsing

Looking at the Internet with Google Chrome & Firefox. Scoville Memorial Library Claudia Cayne - September, 2010

Manually Remove Of Xp Internet Security Protect

Maintaining Computer. Disk cleanup, Disk Defragmenter Recycle bin, Security

FAQ. Safe Anywhere PC 12. Disclaimer:

TxEIS on Internet Explorer 8

EDGE, MICROSOFT S BROWSER

Duo Self-Enrollment Guide for Android Tablets

KNOXPLANS for New Users

Portal Recipient Guide. The Signature Approval Process

A weekly Spa Day for your Computer

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it.

How to Export a Report in Cognos Analytics

How to Jailbreak an ipod. Felicia Jimenez Bao Lam Elmer Martinez Lauren Messenger TECM 2700 Terry Smith class

Browser Support Internet Explorer

Manually Remove Of Xp Internet Security Protect Virus Manually

(electronic mail) is the exchange of computer-stored messages by telecommunication.

College of Pharmacy Windows 10

Step 7 How to convert a YouTube Video to Music As I mentioned in the YouTube Introduction, you can convert a Video to a MP3 file using Free Video To

Password & Tutorials Packet

Manual Removal Norton Internet Security Won't Open Or

ABF Software Issues Caused by Anti-Virus Programs

How To Delete Cookies In Vista Firefox Windows 7 Ultimate

MFA Instructions. Getting Started. 1. Go to Apps, select Play Store 2. Search for Microsoft Authenticator 3. Click Install

stickapp anti-virus password manager vpn client free Security & Productivity Apps for SafeStick stickapps.co.uk

Auslogics BOOSTSPEED USER MANUAL. auslogics.

IT Essentials v6.0 Windows 10 Software Labs

Windows Help document Part A

CDH Top 5. Free Recommended Cyber Security Tools. 1. Malwarebytes 2. CCleaner 3. Norton Safe Web 4. EaseUS Todo Backup 5.

Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight Sandboxie.lwp revised

Contents Overview... 1 References... 1 Packing Up... 3 Reset the PC... 5 Restoring the PC... 6 Restoring the Data Files and Applications...

Wesleyan University. PeopleSoft - Configuring Web Browser Settings

Reports/Invoices/Work Orders/Purchase Orders Do Not Show When Printing

PISA 2018 COMPUTER-BASED SCHOOL QUESTIONNAIRE: PRINCIPAL S MANUAL

Recommended Browser Settings

Duo Self-Enrollment Guide for ipads

Browser Configuration Reference

Page Topic 02 Log In to KidKare 02 Using the Navigation Menu 02 Change the Language

COMMON WINDOWS 10 QUESTIONS & ANSWERS

KNOXPLANS for New Users

Windows 7 Basic Computer Course

Password & Tutorials Packet

INTERNET SAFETY IS IMPORTANT

Perceptive Experience Web Scan

Recommended Browser Settings

9L0-412 Q&As. OS X Support Essentials 10.8 Exam. Pass Apple 9L0-412 Exam with 100% Guarantee

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

File Maintenance Windows 7 Word What is File Maintenance?

Windows 10 Tips and Tricks

EasySites Quickstart Guide. Table Of Contents

Puma Energy elearning Hub. How To Guide for Staff Includes FAQs and Troubleshooting Guide

Remote Deposit Capture (CC21) Software Installation Guide for Firefox or Internet Explorer

Deployment User Guide

Google Drive: Access and organize your files

Latest version of google chrome for windows

IN THIS CLASS WE ARE GOING TO LEARN THE BASIC FEATURES OF WINDOWS 8.1 WITH HANDS ON TRAINING THE CLASS WILL RUN ON THE SPEED OF THE AVERAGE STUDENT

Optimizing Smart Phones

COMPUTER HEALTH CHECKLIST

Even a non-technical user can even operate it with ease.the user can do any task in CCS with just a few clicks.

User Guide Online Backup

FUN TECH TIPS 101 SUMMER CLOVIS UNIFIED SCHOOL DISTRICT INFORMATION TECHNOLOGY SERVICES Prepared by Tanie McKinzie, TSS III

Learners Guide. Overview. Introduction. How do I log in to ecooper University? Welcome to the ecooper University Learners Guide!

USER GUIDE GigaCentral Android User Guide

Remove Manually Norton Internet Security 2012 Will Not Start

PowerTeacher Administrator User Guide. PowerTeacher Gradebook

Setting up the Master Computer

University of Massachusetts

SmartCVS Tutorial. Starting the putty Client and Setting Your CVS Password

Recipient USER GUIDE

How To Completely Remove Java Windows 8.1 And Go Back

Select "Folder from the list that appears in the pop-up screen in the bottom right corner.

WHEN YOUR COMPUTER SLOWS TO A CRAWL

Windows Mail Files Backup And Restore Windows 7 Not Working After Installing Acronis

BMW Group ebox Partner Archive Hotline

PRINCESS NOURA BINT ABDUL RAHMAN UNIVERSITY PREPARATORY YEAR SECOND SEMESTER ( / ) Computer skills (CMP-001) MODULE :2

Airtel PC Secure Trouble Shooting Guide

Click on the icon that includes both GO MATH AND World Geography. 7 th Grade World Geography Name:

Accessing CharityMaster data from another location

Frequently Asked Questions

Date: Version: 1.1

Version 5.0 September P Xerox App Gallery. App Gallery User Guide

Steps to View Online Lectures

Technology Checklist for End of the School Year. To prepare your classroom technology for summer, please confirm that the following are done:

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

CANVAS DEEP INTEGRATION WITH LAUNCHPAD (FOR INSTRUCTORS)

Learning Center Computer and Security Settings

Jigsaw Troubleshooting Tips

Your Own Virtual Playground. CS 1585 :: Doug McGeehan

Transcription:

1 NET 311 D INFORMATION SECURITY Networks and Communication Department TUTORIAL 6 :Securing Your Windows 8 System

4 Steps to secure your windows 8 system 2 1. Configure Windows 8 Settings. 2. Installing Security Software. 3. Securing Your Internet. 4. Post-Configuration Clean-up.

Step 1: Configure Windows 8 Settings. 3 Step 1 :Configure Windows 8 Settings. Creating a Strong Password Update Windows Privacy setting Disable Dumpfile Creation Set Bios Password (optional) Configure firewall Extra security setting Password Upon Wakeup Setting New to Windows login features

Step 1: Configure Windows 8 Settings. 4 Creating a Strong Password 1. Begin by navigating to the sidebar and selecting Settings. 2. Select Change PC Settings click Users (left panel) 3. Select Change your password or Create a password (if you don t have password before) 4. Create a new password using the following criteria: Length of 8-16 characters Use at least 3 of the 4 following character sets: Uppercase Alphabetic Characters Lowercase Alphabetic Characters Numeric Characters Special Characters (!@#$%^&*)

Step 1: Configure Windows 8 Settings cont. 5 2. Click on Change PC Settings 1. Click on Settings

Step 1: Configure Windows 8 Settings cont. 6 1 2

Step 1: Configure Windows 8 Settings cont. 7 (When adding a Password hint, make sure it is useful but not too revealing.)

Step 1: Configure Windows 8 Settings cont. 8 Password Upon Wake-up Setting This will ensure that when you leave your computer, it will require a password to wake-up after the screen saver is turned on. 1. Begin by navigating to the sidebar and selecting Settings. 2. Select Change PC Settings, then click on Users (left panel). 3. From Require a password after the display is off for list specify the time

Step 1: Configure Windows 8 Settings cont. 9 New to Windows login features It is recommended using either one of these options for mobile devices with no sensitive information. These methods can be easily compromised given the right tools and amount of time, however, both are beneficial to the user by making a device easier to log into. 1. Picture Password 1. Navigate to the sidebar and select Settings. 2. Select Change PC Settings, and click Users on the left panel. 3. Select Create a picture password.

Step 1: Configure Windows 8 Settings cont. 10 2. PIN-login 1. Navigate to the sidebar and select Settings. 2. Select Change PC Settings, and click Users on the left panel. 3. Then select Create a PIN This will prompt you for your password and walk you through making a 4- digit PIN. 4. Be sure to pick a smart PIN (nothing anyone else can figure out) A few bad PINS: 1234, 1212, 1111, (last 4 digits of phone), (4-digit address)

Step 1: Configure Windows 8 Settings cont. 11 Update Windows The second step to securing Windows 8 is to make sure the operating system is up to date. Windows updates provide patches for security holes and weaknesses. These are released on a regular basis. 1. Navigate to the sidebar and select Settings. 2. Select Control Panel. 3. Click System and Security, and then select Windows Update. 4. Select Check for updates. 5. Then go to Change Settings. Ensure that Install updates automatically (recommended) is on. 6. Select Updates will be automatically installed during the maintenance window. Ensure that the time which is selected is a time that your system will be powered on.

Step 1: Configure Windows 8 Settings cont. 12 2. Click on Control Panel 1. Click on Settings

Step 1: Configure Windows 8 Settings cont. 13 1 3 4 28-Mar-15

Step 1: Configure Windows 8 Settings cont. 14 When this step is complete, the Windows Update screen should look like this: 28-Mar-15

Step 1: Configure Windows 8 Settings cont. 15 Privacy Settings 1. Navigate to the sidebar and select Settings, then click Change PC Settings. 2. Select Privacy on the left panel. 3. Set the following: Let apps use my location OFF Let apps use my name and account picture OFF Help improve Windows Store by sending URLs for web content that apps use Choose Either

Step 1: Configure Windows 8 Settings cont. 16 1

Step 1: Configure Windows 8 Settings cont. 17 Disable Dump file Creation A dump file can be a useful troubleshooting tool when either the system or application crashes and causes the infamous "Blue Screen of Death". However, they also can provide a hacker with potentially sensitive information such as application passwords. 1. Navigate to the sidebar and select Settings. 2. Select PC info 3. Select Advanced System Settings, and then select the Advanced tab. 4. Select Settings under the Startup and Recovery section. 5. Under Write debugging information, change the drop down box setting to (none). 6. Select OK

Step 1: Configure Windows 8 Settings cont. 18 2. Click on PC info 1. Click on Settings

Step 1: Configure Windows 8 Settings cont. 19 1 2 3

Step 1: Configure Windows 8 Settings cont. 20 4 5

Step 1: Configure Windows 8 Settings cont. 21 Set Bios Password (optional) For extra security, you can set the bios password so that the computer cannot boot without entering a password. This will require you to enter two passwords to start up your system (bios and Windows) and is normally not required

Step 1: Configure Windows 8 Settings cont. 22 Configure your Firewall 1. Navigate to the sidebar and select Settings. 2. Select Control Panel, and click System and Security. 3. Select Windows Firewall. 4. Select Turn Windows Firewall on or off. 5. Ensure that the Windows Firewall is turned on for Private and Public networks. 6. Now go back to the Windows Firewall page, select Advanced Settings. 7. Select Properties on the right panel, go to the Logging section and select Customize. 8. Edit settings to log Dropped Packets and Successful Connections.

Step 1: Configure Windows 8 Settings cont. 23 1 2 3

Step 1: Configure Windows 8 Settings cont. 24 4 5

Step 1: Configure Windows 8 Settings cont. 25 6 7

Example of firewall log file 26 The log will open in Notepad automatically. It may look gibberish but it does contain a lot of useful information there. Each log entry has a total of up to 16 pieces of information but the most useful ones are the first eight columns, which include Date, Time, Action, Protocol, Source IP, Destination IP, Source Port, and Destination Port.

Step 1: Configure Windows 8 Settings cont. 27 Extra security settings 1. Navigate to the sidebar and select Settings. 2. Select Control Panel, and click System and Security. 3. Select Action Center. 4. On the left panel, select Change User Account Control settings. 5. Slide the bar all the way to the top. Click OK. (This will ensure that all apps making changes to your system are authorized to do so.) 6. Within the Action Center (under the Security section), select Change Settings next to Turn on Windows SmartScreen. 7. Select the top option for maximum security ( Get administrator approval before running an unrecognized app from the Internet ). Having this setting selected will ensure that you approve anything trying to run on your computer from the internet.

Step 1: Configure Windows 8 Settings cont. 28 1 2

Step 1: Configure Windows 8 Settings cont. 29 1 2

Step 1: Configure Windows 8 Settings cont. 30 3 4

Step 2: Installing Security Software. 31 Step 2: Installing Security Software Third party security suite Anti-malware software

Step 2: Installing Security Software 32 Third party security suites There are many choices for 3rd party security suites. There are many free and many paid ones, the one you choose is up to you. Well-known suites include Avira/Avast/ Comodo (Free), or Norton/McAfee (Paid). You may want to search the web for one that meets your needs (cost vs. security vs. performance). This guide will show you how to secure a computer with Avira ( If you choose to use a different security suite, use similar settings) 1. Open up your browser, go to Avira official website 2. Download the software 3. Update it, then perform the initial scan,

Example : Avira antivirus 33 2 1

Step 2: Installing Security Software cont. 34 Anti-Malware Software If you notice weird pop-ups or strange computer activities, possibly very annoying activity, you may have malware or spyware. Sometimes this is easy to get rid of by using free third-party software. Try one of these: 1. AdwCleaner 2. Malwarebytes 3. HiJackThis

Example: Malwarebytes 35

Step 3: Securing Your Internet 36 Step 3: Securing Your Internet Secure with IE 10 settings Setting up a share folder Browsers to use

Step 3: Securing Your Internet. 37 Secure with IE 10 settings 1. Navigate to the sidebar and select Settings. 2. Select Control Panel, then click Network and Internet, and choose Internet Options. 3. Go to the Privacy tab and set cookie security to High. 4. Enable the Pop-up Blocker. (Once you have done this, you will need to explicitly add any site that you want to have cookies. This requires a little extra work on you part, but it will virtually eliminate the incredible proliferation of cookies that infect most computers and dramatically compromise your privacy. There are a relatively low number of sites that absolutely require cookies.)

Step 3: Securing Your Internet cont. 38 2

Step 3: Securing Your Internet cont. 39 1 2 3

Step 3: Securing Your Internet cont. 40 Browser(s) to use Choosing a web browser is almost entirely a matter of opinion. Some browsers are more secure than others and some are faster than others. The three prominently used web browsers for the Windows Operating Systems are Internet Explorer, Mozilla Firefox, and Google Chrome. You can see a selection of the top ten browsers and how they are rated here (http://internet-browser-review.toptenreviews.com/ ) Internet explorer is currently recommended for security purposes and Chrome for usability. Most browsers are available free online. Just open Internet Explorer and go to the appropriate website to download one.

2015 Internet Browsers Software Product Comparisons 41

Step 3: Securing Your Internet cont. 42 Setting up a share folder: If you want to share files with other computers on your home network you will need to set up a shared folder/folders. 1. Navigate in Windows Explorer to C: Drive, Users, Public. 2. Right click the folder you want select Properties, then Share, add Authenticated Users with Read permissions. 3. Select Share, go to the Security tab and ensure that there is not an Anonymous or Everyone group with Read or Write permission.

Step 3: Securing Your Internet cont. 43 1 2 3

Step 4: Post-Configuration Clean-Up 44 Step 4: Post Configuration Clean-Up System Protection (restore points) System Backups How to reset settings

Step 4: Post-Configuration Clean-Up 45 System Protection (Restore Points) By turning on system protection, Windows 8 will allow you to create system restore points so you can restore your system to a point before unwanted changes were made to your system. 1. Navigate to the sidebar and select Settings. 2. Click on PC Info. 3. Click System protection on the left panel. 4. Choose Configure (To the right of Configure restore settings, manage disk space, and delete restore points). 5. Select Turn on system protection. 6. Select OK, then Create a Restore Point (i.e. First Restore ).

Step 4: Post-Configuration Clean-Up cont. 46 1 2

Step 4: Post-Configuration Clean-Up cont. 47 3 4

Step 4: Post-Configuration Clean-Up cont. 48 System Back-Ups It is highly recommended that you make a back-up of your system and update it on a regular basis. Doing so will limit the amount of data that is lost in the case that your hard drive crashes or is physically destroyed. To do so you will need an external device that is the same size as or larger than your internal hard drive. 1. Navigate to the sidebar and select Settings. 2. Select Control Panel, click System and Security, and choose File History. 3. Select Windows 7 File Recovery (bottom left of window), then Set up Backup 4. Select the appropriate drive(s) and follow the instructions.

Step 4: Post-Configuration Clean-Up cont. 49 1 2

Step 4: Post-Configuration Clean-Up cont. 50 3

Step 4: Post-Configuration Clean-Up cont. 51 System Back-Ups Another way to regularly backup data onto an external device is to manage the process with third-party software. (Sometimes external devices come with such software). You can try one of these: 1. Smartsync-Pro 2. Recurva 3. Acronis True Image Home

Step 4: Post-Configuration Clean-Up cont. 52 How to reset settings 1. Navigate to the sidebar and select Settings. 2. Click Change PC Settings, and select General on the left panel. 3. Scroll down to the bottom and you will have two options: You can Refresh your PC without affecting your files This will reset settings on the PC to default (used to fix errors) You can Remove everything and reinstall Windows This will delete everything on your computer including files and restore your PC to factory status. (Do NOT use unless ABSOLUTLY NECESSARY or you are getting rid of your computer). 4. To use either one of these with the current PC settings you must go to User Accounts and Family Safety. 5. Select Change User Account Control Settings, and slide the bar to the 3rd highest section. 6. Click OK

Step 4: Post-Configuration Clean-Up cont. 53 1

Reference 54 Smith, A. (2013). Securing your windows 8 system. [pdf file] available from http://www.uc.edu/