0% found this document useful (0 votes)
72 views15 pages

Win Security - GT

This document summarizes a presentation on Windows security. It discusses the components of Windows security, including the control panel, service, and API. It outlines threats like viruses, worms, Trojans, and adware. It describes common security issues like easy access to the registry, group policy, and system files from the command prompt. It provides examples of how the registry and group policy can be exploited. Finally, it recommends countermeasures like installing antivirus software, deleting harmful files, and using strong passwords.

Uploaded by

Varsha Jain
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views15 pages

Win Security - GT

This document summarizes a presentation on Windows security. It discusses the components of Windows security, including the control panel, service, and API. It outlines threats like viruses, worms, Trojans, and adware. It describes common security issues like easy access to the registry, group policy, and system files from the command prompt. It provides examples of how the registry and group policy can be exploited. Finally, it recommends countermeasures like installing antivirus software, deleting harmful files, and using strong passwords.

Uploaded by

Varsha Jain
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

INSTITUTE OF TECHNOLOGY AND MANAGEMENT

Click to edit Master subtitle style PRESENTATION

ON "WINDOWS SECURITY"
Presented by Gaurav tiwari c.s.e. vi sem, b1 0905CS091043

4/20/12

INTRODUCTION
Windows Security is a

concept of protecting internal files , confidential data , programs and other important information stored in any OS Windows NT, XP, Vista etc. from malacious programmes and intruders
4/20/12

No user wishes to make

WINDOWS SECURITY

Click to edit Master subtitle style

The Windows Security Center consists of three major components: A control panel, a Windows Service, and, an application programming interface that is provided by Windows Management Instrumentation.
4/20/12

THREATS FOR WINDOWS


Virus, Worms, Trojans, Adwares Windows Registry and

Group Policy Command prompt and System Files Harmful softwares

4/20/12

Virus : A virus is basically an executable file/code that is designed such that it is able to infect documents, has the ability to survive by replicating itself and is also able to avoid detection.

Worms : Worms, unlike viruses dont need the host to attach

themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computers memory. Usually, they cause harm to the network by consuming bandwidth.

4/20/12

Trojans: In computers, a Trojan horse is a program in which

malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control remotely and do its chosen form of damage, such as ruining the file allocation table on your hard disk.

Adwares: Adware

or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.

4/20/12

Common Loopholes

Easy accessibility to Windows Registry and its

Editing. Easy accessibility to Host files and other system files. Easy accessibility to Group Policy.

4/20/12

Easy accessibility to Command prompt and Run menu. Easy to Crack Administrator and User password using Ophcrack Live CD . Presence of .exe files for installation of any programmes / softwares.

4/20/12

Windows Registry And Group Policy


The Windows Registry is a database that stores settings and options

for Microsoft Windows Operating Systems. It contains information and settings for hardware, operating system software and other useful details.

Group policy is like a database to define and control how programs,

network resources, and the operating system behave for users and computers in a Computer organization.

4/20/12

Security : Registry And Group Policy


Since Registry is the central database of Windows O.S. any kind of malicious setting can lead to a great trouble for the user. For e.g. Disabling right click on desktop.(Registry) Disabling Windows Menu Bar. (Registry) Adding alarming text to IEs title bar. (Registry) Disable Log off and Shutdown button from Start button (Group Policy) Disable Task Manager (Group Policy)

4/20/12

Command Prompt And System Files


cmd.exe or command prompt is the command-line

interpreter on OS/2, Windows CE and on Windows-NT based operating systems. These files store system settings and variables used by the DOS and Windows operating systems; also contains functions that are used to run the operating system; SYS files typically should not be edited.

4/20/12

Security: Cmd prompt and System Files


Several default commands of command prompt like, net user

if used improperly can be called as a security flaw. IP address, MAC address etc. can be changed through command prompt. If System file like host file is modified, several sites may be blocked. System may not respond if explorer.exe is modified. Services.msc is the shortcut through run for Services, little change to such services may be destructive.

4/20/12

Harmful Softwares
Ophcrack live CD: This tool lets us crack/bypass

Administrator password quite simply just using the CD. Password Recovery Softwares like, Advanced Zip Password Recovery Software. Exe binders like, webco VB scripts, .BAT files etc. Key loggers like Ardamax key logger.

4/20/12

Counter measures for securing windows


Always install good antivirus with proper update

patches. Delete harmful files such as winlogon.exe Lock vulnerable applications like, registry, gpedit etc. Always select strong and most uncommon password format consisting of symbols. Always scan the system to verify if any Trojan any malware is installed on any port. At last proper monitoring is essential.
4/20/12

Click to edit Master subtitle style

THANK YOU
4/20/12

You might also like