Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

PACE-IT: Securing the Workstation

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 12 Anzeige

PACE-IT: Securing the Workstation

Herunterladen, um offline zu lesen

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)

"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)

"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it

Anzeige
Anzeige

Weitere Verwandte Inhalte

Diashows für Sie (20)

Anzeige

Ähnlich wie PACE-IT: Securing the Workstation (20)

Weitere von Pace IT at Edmonds Community College (18)

Anzeige

Aktuellste (20)

PACE-IT: Securing the Workstation

  1. 1. Securing the workstation.
  2. 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  3. 3. Page 3 PACE-IT. – Password policies. – User account management. – Other workstation security measures.
  4. 4. Page 4 Securing the workstation.
  5. 5. Page 5 Securing the workstation. – Require passwords. » All workstations should be set to require passwords to access the operating system. » Authenticates the user and creates accountability. » Helps to prevent unauthorized access. – Setting strong passwords. » Minimum character length is X26. » Mix of characters (letters, numbers, and symbols can create up to X84). » Restrict the use of names and other easily guessed passwords. – Other policies that should be considered. » Aging of passwords: passwords that don’t expire become ineffective. » Repeating of passwords: if passwords can be repeated too often, they become ineffective.
  6. 6. Page 6 Securing the workstation.
  7. 7. Page 7 Securing the workstation. – Restrict user account permissions. » Use the principle of least privilege. » Even administrators should be restricted to only their necessary level. » Administrators should have a separate account for normal workstation activity. – Don’t manage users—manage groups. » Users should be created and then placed into groups. » Groups are easier to manage than individual users. » Administrator groups, power user groups, standard user groups, and guest user groups are all groups that should be created. – Guest accounts. » These should only be activated on a temporary basis. » The default should be to not have a guest account on a workstation.
  8. 8. Page 8 Securing the workstation.
  9. 9. Page 9 Securing the workstation. Change default usernames. The defaults are easy to exploit. If it comes with a default username and password, then it is easy to exploit and gain access. Screensaver passwords. Make it more difficult for the opponent. Unattended workstations without the screensaver lock are easy targets. Disable autorun. Help to avoid the easy spread of malware. Require end user interaction in order to install anything and everything.
  10. 10. Page 10 Securing the workstation. Require passwords with a minimum length and character set to authenticate the user. Put in place a password aging policy in conjunction with a password repeat policy. Prevent users from using passwords that are easy to guess. Topic Password policies. Summary The principle of least privilege should be in place. Don’t make exceptions. Don’t manage at the individual user level, but at the group level instead. Guest accounts should only be activated as necessary and then disabled. User account management. All defaults should be changed; don’t make it easy for exploitation. Screensaver locks should be required on all workstations. Require user interaction for all installations by disabling autorun. Other workstation security measures.
  11. 11. Page 11 THANK YOU!
  12. 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.

×