Protecting Application or System Software For Class
Protecting Application or System Software For Class
Application or
System Software
TTLM Code: ICT ITS1
Key Words:-
Protect
Software
Application
Software
System Software
5 minutes
Discussions
What to be Protected ?
Application Software
System Software
From What/Whom to be Protected ?
1. Un authorized person
2. Distractive Software
How?
The following three
subsequent learning outcomes
will provide you a clear picture
on How to
LO1: Ensure User Accounts are
Controlled
This learning guide is developed to provide you
the necessary information regarding the
following content coverage and topics –
User Account Control
User Account Configuration
Notifications Displayed at Logon
Utilities Used to Check Strength of Passwords
Accessing Information Services
User account type/privileges
Managing user accounts
Modifying default security policy
displaying appropriate logon legal
notices
Monitoring emails
Accessing information service
Identifying security gaps
Taking appropriate actions
Information Sheet - 1 User Account
Control
1.1. User Access
The control of user access can take many forms
and apply at several levels. Once a computer is
physically accessed, the user usually logs on to
gain access to applications.
These applications will access data in files and
folders.
We can simplify the User Access process down
to 3 things.
Physical access
Authentication
1.1.1. Physical Access (right to use)
The first layer of management and security is the
physical access to the computer.
To prevent unauthorized access, a company may
make use of:
locks on the front doors
locks on each floor
locks on offices, etc
security guards
cameras
keys on computer systems.
Only those who have permission and keys will be
able to access a computer in the company’s
premises.
The Internet, however, presents issues concerning
access to corporate information or systems
because physical restrictions cannot be imposed.
1.1.2. Authentication
Authentication is the process of verifying the identity
of people who are attempting to access the network
or system.
Typically, a user identifies himself to the system,
then is required to provide a second piece of
information to prove their identity.
This information is only known by the user or can
only be produced by the user.
The most common method used to authenticate
users is the Username and Password method.
Using this method a user identifies itself with a
username.
They are then prompted for a password.
The combination of name and password are then
compared by the system to its data on configured
users and if the combination matches the system’s
data the user is granted access.
1.1.3. Authorizations
Once a user has been authenticated (that is their
identity validated) they are granted access to the
network or system. For the user to then access
data or an application or execute some task or
command they need be authorised to do so.
The authorisation process determines what the
user can do on the network.
In other words it enforces the organisation policy
as applicable to the user.
The Network and System administrators are
responsible for the technical configuration of
network operating systems, directory services
and applications.
Part of the configuration includes security settings
that authorise user access.
The administrators use an organisational policy to
determine these settings.
What is user Account
A user account allows you to sign
in to your computer. By default,
your computer already has one
user account, which you were
required to create when you set
up your computer.
If you plan to share your
computer with others, you can
create a separate user account
for each person.
Following are different Types of user accounts with their privileges
Administrator, Standard, and Guest
Administrator:
Administrator accounts are special
accounts that are used for making
changes to system settings or
managing other people's
accounts.
They have full Control and access
to every setting on the computer.
Standard:
Ithave limited or restricted access
privilege
Standard accounts are the basic accounts
you use for normal everyday tasks. As a
Standard user, you can do just about
anything you would need to do, such as
running software or personalizing your
desktop.
Guest Account:
Windows' guest account lets other people
use your computer without being able to
change PC settings, install apps or access
your private files.
1.2. User accounts
Management
An administrator can give other
people access to the computer in one
of three ways:
Create a user account that is linked
to an existing Microsoft account.
Create a user account that is linked
to an email address, and register
that account as a Microsoft account.
Create a local account that isn’t
linked to a Microsoft account.
Con’t
After to get permission from admin Any
user can change the following details
for his or her account:
Account name You can change the
display name that appears on the
Welcome screen and Start menu.
Account picture You can change the
picture that identifies you on the
Welcome screen and Start menu.
Password You can create or change the
password.
Con’t
Security settings can control:
User authentication to a network or
device.
The resources that users are
permitted to access.
Whether to record a user's or
group's actions in the event log.
Membership in a group.
Con’t
To manage security configurations for
multiple devices, you can use one of the
following options:
1)Edit specific security settings in a
GPO(Group police object).
2)Use the Security Templates snap-in to
create a security template that contains the
security policies you want to apply, and
then import the security template into a
Group Policy Object. A security template is a
file that represents a security configuration,
and it can be imported to a GPO, applied to
a local device, or used to analyze security.
The Security Settings extension of the Local
Group Policy Editor includes the following types
of security policies:
Account Policies. These
policies are defined on devices;
they affect how user accounts
can interact with the computer or
domain.
Password Policy.
Account Lockout Policy.
Software Restriction Policies.
Application Control Policies.
Manage email and account
settings on Windows 10
E- Mail
E- Mail (electronic mail) is the exchange
of computer-stored messages by tele
communication.
Email messages are usually encoded in
American Standard Code for Information
Interchange (ASCII) text.
However, you can also send non text
files, such as graphic images and sound
files as attachments sent in binary
streams.
How we can create e-mail?
Detect and remove destructive
software. under this we will see!
common types of destructive software
virus protection
Selecting anti-virus software
Installing and updating anti-virus
software
Describing advance system protection
Configuring software security setting
Scheduling anti-virus software
Reporting and removing detected
destructive software
Common types of destructive
software
What is a destructive software program?
Destructive malware is malicious software with
the capability to render affected systems
inoperable and challenge reconstitution.
Common types of destructive software
File viruses.- Hide/empty
Worms.-Is a type of virus that can be Replicate
it self and spread from one device to another
Trojans' horses-malicious code than control
the system and damage data
Spyware. –types of virus which gather
information about personal/organization data
then send fake link to related your data
Virus protection
Virus protection software is
designed to prevent viruses,
worms and Trojan horses from
getting onto a computer as well
as remove any malicious software
code that has already infected a
computer.
The 6 Best Antivirus Software of 2022
Avast AVG
Avira Bitdefender
BullGuard Emsisoft
ESET NOD32 Fortinet
F-Secure GData
Kaspersky Kingsoft
McAfee Microsoft Security
Essentials
Panda Cloud Qihoo 360
Sophos ThreatTrack Vipre
Trend Micro Titanium
Specialised software for removal such as Spybot Search &
Destroy, Malwarebytes anti-malware and WinZip Malware
Protector.
Other specialised programs that can block certain known IP
addresses of hackers, unwanted advertising companies.
One program that does this is PeerBlock. PeerBlock blocks
"known bad" computers from accessing yours, and vice
versa. Depending on the lists you have it set up to use, you
can block governments, corporations, machines flagged for
anti-peer-to-peer activities, even entire countries. The down
side of this is that you will have to keep an eye on the
program as it can block legitimate sites just because they
have possibly been used for hacking attempts.
Figure 3-1: PeerBlock – What happens when blocking
TAFE website
With Peerblock you can edit your lists and add or remove
addresses from the lists so that you can still control which
2.1.2. Multi User/Enterprise
Even though small business antivirus software is usually priced on
a per-user basis with a cost that is on par with individual-user
products, it often gives business owners important additional
features such as the ability to install and manage all installations
from a central location. Some of the available products are:
Bitdefender Small Business Pack
Kaspersky Endpoint Security for Business
F-Secure Small Business Suite
Symantec Endpoint Protection
G Data AntiVirus Business
Webroot Secure Anywhere Business
Vipre Business Premium
avast! Endpoint Protection Suite
Panda Security for Business
Total Defense Threat Manage
2.2. Anti-Virus Software
Antivirus or anti-virus software is used to prevent,
detect, and remove malware, including but not
limited to computer viruses, computer worm, trojan
horses, spyware and adware. This page talks about
the software used for the prevention and removal of
such threats, rather than computer security
implemented by software methods.
No matter how useful antivirus software can be, it can
sometimes have drawbacks. Antivirus software can impair
a computer's performance. Inexperienced users may
also have trouble understanding the prompts and
decisions that antivirus software presents them
with.
An incorrect decision may lead to a security breach.
If the antivirus software employs heuristic detection,
success depends on achieving the right balance
between false positives and false negatives. False
positives can be as destructive as false negatives.
False positives are wrong detection by an anti-virus
where legitimate files were mistakenly identified as
viruses while False negatives are wrong detection by
an anti-virus where legitimate viruses were not
detected as viruses.
Finally, antivirus software generally runs at the highly
trusted kernel level of the operating system, creating a
potential avenue of attack.
Over the years it has become necessary for
antivirus software to check an increasing
variety of files, rather than just
executables, for several reasons:
Powerful macros used in word processor
applications, such as Microsoft Word, presented
a risk. Virus writers could use the macros to
write viruses embedded within documents.
This meant that computers could now also
be at risk from infection by opening
documents with hidden attached macros.
Later email programs, in particular
Microsoft Outlook Express and Outlook,
were vulnerable to viruses embedded in
the email body itself. A user's computer
could be infected by just opening or
previewing a message.
As always-on broadband connections became
the norm, and more and more viruses were
released, it became essential to update virus
checkers more and more frequently. Even then,
a new zero-day virus could become widespread
2.3. Types of Protection Software
https://www.sitepoint.com/5-steps-to-uncovering-your-
it-security-gaps/
https://en.wikibooks.org/wiki/
Fundamentals_of_Information_Systems_Security/
Access_Control_Systems#Access_Control_Assurance
https://en.wikipedia.org/wiki/Computer_access_control
https://en.wikibooks.org/wiki/
Category:Book:Fundamentals_of_Information_Systems_Se
curity
https://www.computerweekly.com/opinion/Identify-
security-gaps