Preview

threats and vulnerabilities

Powerful Essays
Open Document
Open Document
2361 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
threats and vulnerabilities
Jeramie Feenstra
Richard De La Cruz

Window 7 vulnerabilities
Local Security Authority Subsystem Service
There is a recently discovered vulnerability in the Local Security Authority Subsystem Service which can cause a denial of service attack if a hacker sends a packet containing malicious files during NTLM authentication. NTLM protocol refers to the Windows NT LAN Manager which is used to authenticate logons to PCs that are connected to the network.
The security update provided by Microsoft includes updates for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and the new Windows 7 operating systems.
User Account Controls
Microsoft changed and upgraded the User Account Control settings for Windows 7 to make it more flexible for users. Some of the UAC applications are channeled through the User Account Controls to reduce user interaction. As a result, the vulnerability is apparent when the third party application calls on files by proxy through an existing Windows application which never uses the UAC prompt application.
1. File and share permissions that give up everything to everyone -- This is easily the biggest vulnerability I'm seeing with Windows systems regardless of the type of system or Windows version. Users who create shares to make their local files available across the network are typically the culprits. Sometimes it's careless admins; other times they're honest mistakes. Unfortunately, all too often the "Everyone group" is given full access to every file on the system. Then, all it takes is for an insider to search for sensitive keywords stored in .pdf, .xls, .doc and other file formats using a text search tool such as Effective File Search or FileLocator Pro. Odds are -- nearly 100% of the time -- the attacker will come across sensitive information (SSNs, credit card numbers, you name it) that they shouldn't have access to. Best case scenario, this is an identity theft in the making. Worst case, this becomes a serious breach that

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious Gadget and then trick a user into installing the malicious Gadget. Once installed, the malicious Gadget could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. In addition, Gadgets can access your computer's files, show you objectionable content, or change their behavior at any time. Gadgets could also potentially harm your computer.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    Solomon, M. G. (2014). Security Strategies in Windows Platforms and Applications. Burlington: Jones & Bartlett Learning.…

    • 338 Words
    • 1 Page
    Good Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Security – This new update will feature some security changes and will keep you safe from any viruses.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Which of the following command-line parameters will prevent a program executed using Runas.exe from the elevated user’s encrypted files?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    network sniffing capabilities, was installed that captured the keystrokes of the user, thus obtaining user…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    A second domain that is affected is the Workstation Domain. The Workstation Domain is where most users connect to the IT infrastructure. A workstation can be a desktop computer, laptop or any device that connects to the network. A role of the workstation domain is that the organization’s staff should have the access necessary to be productive. Some tasks included are configuring hardware, hardening systems, and verifying antivirus files. Threats that are included in the Workstation Domain include Unauthorized access to the workstation, Desktop/laptop computer operating system software vulnerabilities, viruses, and downloading content like photos/music via the Internet. To protect from unauthorized access, enable…

    • 578 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    As our society realize more and more on technology like computers and smart phones to conduct every day things such as banking, work, school, and staying connected with family and friends, our personal information has become more vulnerable to attack. Before computers, if someone wants to steal your personal information they would need to break in to your house, work and car to try and get your information. Now everything about us are stored right on our computers from banking information, to medical information. Some of the most common forms of attack on Microsoft system are Trojan horse, backdoor, denial of service, robot/intermediary process, unprotected…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mia Mccain Cook

    • 901 Words
    • 4 Pages

    MS Operating Systems (Windows XP, Vista, 7) MS Office and Network Systems Administration Information Systems and Network Security Structured Query Language (SQL Server) Hardware and Software Implementation Access Control (Public Key Infrastructure)…

    • 901 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays