Beruflich Dokumente
Kultur Dokumente
Buffer overflows
Service exploits
Default protocols
Known accounts and passwords
Built-in applications
Physical access
Remote administration
File access methods
A hardened OS:
Have been configured to protect against software & hardware
attack by Security policy
Sample OS Security Policy
The Latest Patches
Strong password
The Latest Application Patch
Anti Virus Software
Disable or delete unnecessary accounts (guest,)
Restricted access permission to resources
Control user interaction with the system
Warning messages & banner
Audit policy to track access to resources
Locked room to physically to secure servers & other devices
Backup Strategies
Patches
Supplemental code
Hotfixes
Patches to address specific flaws
Rollups
Cumulative group of patches & hotfixes
Service Packs
Comprehensive updates with new features
Configuration
settings
NLM Daemon
Apply template
to a system
Predefined
settings
Templates
based on role
Authentication
Centralized
administration
Domain controller
Active Directory
Domain member
LDAP client
Directory query
Stores directory
Directory query
data
192.168.100.151 192.168.100.150
192.168.100.152
Spoofing
Buffer overflows
Scope modification
Rogue servers
Remote clients
Administrative shares
Insecure file systems
Lack of redundancy
Man-in-the-middle
Default file security
Physical disk security
Physical printer security
1
SMB
Connection request
2
SMB
Data request
or print commands
3
SMB
Data
Print results
Session fails
if signing not supported
1. Does your organization stay current with all the latest operating
system patches? Why or why not?
2. Which operating system do you think is most secure: Windows
Server 2003, NetWare, or Sun Solaris? Why?