1. Trang chủ
  2. » Luận Văn - Báo Cáo

In The Following, I Will Discuss The Tools Of The Windows Operating System.pdf

20 0 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Tools Of The Windows Operating System
Tác giả Dang Minh Thinh
Người hướng dẫn Nguyen Quang Anh, Lecturer
Trường học HCM University Of Technology
Chuyên ngành Operating Systems
Thể loại Assignment
Năm xuất bản 2022
Thành phố HCM City
Định dạng
Số trang 20
Dung lượng 3,49 MB

Nội dung

My mission was to learn more about the latest Windows operating system tools using the web: firewalls, automatic updates, and scanning for viruses, spyware, and other malware.. Antivirus

Trang 1

Cy HUTECH & OPENUN

University of Technology

ALAYSI

HCM UNVERSITY OF TECHNOLOGY HUTECH INSTITUTE OF INTERNATIONAL EDUCATION

OPERATING SYSTEMS Assignment(OUM) — June Semester 2022

HCM City, June 2022

Trang 2

Contents

HTH“~A.AdldẢẢẲẢỶỒỔỒÃỶIIĨŨŨIÃŨ 4 II) ii 4

“` ¬ 9

G Others 12

l2 ` 64 ã:-ÔÔÔÔÔ 16

THE 90) 000 303D 19 JS)1U)19;-3y:]0 đHưfDŨẢẢẢ 20

Trang 3

L INTRODUCTION

Hello everyone, my name is Thinh and today as an IT manager in the company I was asked by the executive to explore the various tools included with the operating system and assess any additional needs My mission was to learn more about the latest Windows operating system tools using the web: firewalls, automatic updates, and scanning for viruses, spyware, and other malware Find the advantages and disadvantages of using the built-in operating system tools Are there any built-in OS tools that raise security concerns? Explore alternatives for each tool and determine if you should disable Windows tools if there are any risks And first, I will talk about what operating system is?

An operating system (OS) is a collection of programs that act as an interface between a computer user and the computer's hardware The purpose of an operating system is to provide an environment in which users can execute programs Operating systems are seen

as resource managers Primary resources are computer hardware in the form of microprocessors, storage, input/output devices, communication and data devices Some

of the operating system functions:

¢ Implementation of the user interface;

e Sharing hardware among users;

e Allows users to share data between themselves;

® Prevent users from interfering with one another;

¢ Schedule resources among users;

Trang 4

IL BODY

In the following, I will discuss the tools of the windows operating system:

1 Firewall:

Figure 1: Proxy firewall security [ CITATION ADMIS8 \I 1033 ]

A firewall can be a network security device that monitors incoming and outgoing network traffic and decides to allow or block specific traffic that supports a set of outlined security rules

Firewalls have been the main line of defense in network security for 25 years They create a barrier between a secure and controlled internal network and a trusted and untrusted external network such as the Internet Firewalls consist of hardware, software,

or both

Firewalls are a necessary part of any security architecture, and take the guesswork out of server-level protection and hand them off to your network security appliance Firewalls, and im particular Next-Generation Firewalls, focus on preventing malware and

Trang 5

application-layer attacks, along with built-in intrusion prevention (IPS), Firewalls This next generation can respond quickly and seamlessly to detect and react to external attacks across the entire network They can establish policies to better protect your network, and perform quick assessments to detect intrusive or suspicious activity, like malware, and shut it down

Firewalls, especially Next Generation Firewalls, focus on preventing malware and application layer attacks Together with built-in intrusion prevention (IPS), these Next Generation Firewalls can react quickly and continuously to detect and fight attacks across the entire network Firewalls can work based on pre-set policies to better protect your network and can perform quick assessments to detect invasive or suspicious activity, such

as malware and turn it off By leveraging firewalls for your security infrastructure, you are setting up your network with specific policies to allow or block incoming and outgoing traffic

2 Antivirus

Trang 6

Figure 2: computer protection software[ CITATION Eri22 \l 1033 ]

Antivirus is an English compound word for Anti and Virus Anti-means prevention, Viruses (computer viruses) are strains of malicious software created by hackers and taken advantage of to attack the computers of many victims to bring benefits to hackers such as stealing information, breaking computer systems destruction, fraud to appropriate money, blackmailing victims

Antivirus - also known as anti-virus software is a form of software that can protect, detect, warn and remove computer viruses that are invading and attacking users’ computers, thereby fixing a problem partial or complete consequences of computer viruses In addition, today's antivirus software also can upgrade over the internet to identify and prevent malware, viruses, Trojans, spyware, and ransomware that are increasingly sophisticated and dangerous

© How Antivirus Software Works

- System Scan

Anti-virus software will scan all files on the system for threats, usually, when you install antivirus software for the first time it will ask if you want to scan the entire system or not

- Limit the spread of data duplication

When you perform a copy such as from USB to computer or any copying operation, in that data may contain viruses without your knowledge, anti-virus software will check each file before performing the replication, thereby minimizing the spread

Some viruses also can self-replicate or copy themselves to the remaining drives, antivirus software will also detect and disable them

Trang 7

- Real-time protection

This is an extremely important feature that most anti-virus software has, instead of scanning the entire system, every time you manipulate specific data such as downloading

a file from the internet, or mstalling a new program, it will perform a check of that file to see if it is safe, if it detects malware it will block it and warn you about that threat

e Benefits of using anti-virus software

+ Protect your computer from virus attacks

Anti-virus software will search for and remove viruses that are lurking on your computer Once you have installed an antivirus program for your computer, there is no need to worry because it will protect you from any viruses that are trying to get into the system

In most cases, antivirus software will actively remove the virus from the system to prevent it from spreading

+ Limit spreading and copying

The virus can replicate itself even if you have deleted it while the operating system is running Therefore, anti-virus programs with built-in scanning at startup will work Simply because a virus will not be able to replicate itself while the operating system is being disabled during the removal process

Trang 8

3 Spyware

Spyware could be a form of malicious software - or malicious software - that's installed

on a computer device without the tip user's knowledge It infiltrates devices, steals sensitive information and internet usage data, and passes it on to advertisers, data companies, or outside users

Any piece of software will be classified as spyware if it's downloaded without the user's permission Spyware is controversial because even when it's installed for relatively harmless reasons, it can violate end-user privacy and potentially be abused

e How does Spyware work?

Spyware can infiltrate devices without the end user's knowledge through an app installation package, attachment, or malicious website In its least harmful form, spyware exists as an app that starts up as soon as the device is turned on and continues to run in the background Its presence steals random access memory and processor power and can generate infinite pop-ups, effectively slowing down web browsing until it's unusable

¢ How does spyware infect?

Fosfeed Intervention spyware affects any individual computer, Mac, iOS, or Android device Certain common ways to infect a computer with viruses include:

- rights coverage of media such as games, videos, and music by downloading and distributing digital content with rights without permission;

- Download the root source of the document;

- accept ads triggering up; and

- Open email attachments sent from unknown people

Trang 9

¢ How Do You Stop Spyware?

Maintaining rigorous cybersecurity practices is the best way to prevent spyware Some best practices include:

- only download software from reliable sources;

- read all disclosures upon software installation;

- avoid interacting with pop-ups;

- updating and patching bugs for browsers, operating systems (OS) and application software;

- don't open email attachments or click links from unknown senders;

- use only trustworthy antivirus software and reputable spyware tools; and

- tum on two-factor authentication (2FA) whenever possible

4 Malware

Malware (short for “malicious software”) could be a file or code, typically distributed over a network, that infects, discovers, steals, or does virtually any behavior that an attacker couldn't wish to and since malware has such a lot of variants, there are many methods to infect computer systems Despite its style of types and capabilities, malware typically has one in all the subsequent goals:

- Provide remote for the attacker to use the infected machine

- Send spam from the infected machine to unsuspecting targets

- Investigate the local network of the infected user

- Theft of sensitive data

Trang 10

10

e Types of malware attacks

Malware also uses various methods to spread itself to computer systems other than the original attack vector Definitions of malware attacks may include:

- Email attachments containing malicious code can be opened and thus executed by unsuspecting users If those emails are forwarded, the malware can even spread deeper into the organization, causing deeper effects on the network

- File servers, such as those based on the Common Internet File System (SMB/CIFS) and the Network File System (NFS), can allow malware to spread rapidly when accessed and downloaded by users infected file

- File sharing software can allow malware to replicate itself onto removable media and then onto computer systems and networks

- Peer-to-peer (P2P) file-sharing can create malware by sharing seemingly innocuous files like music or pictures

- Remotely exploitable vulnerabilities could allow hackers to access systems regardless of geographic location without or without the need for computer users

to participate

e How to prevent malware:

A variety of security solutions are used to detect and prevent malware These include firewalls, next-generation firewalls, network intrusion prevention systems (IPS), deep packet inspection (DPI) capabilities, unified threat management systems, anti-virus gateways and anti-spam, virtual private network, and content filtering systems and data leak prevention To prevent malware, all security solutions should be tested using a series

of malware-based attacks to ensure they work properly Must use a robust, up-to-date malware signature library to ensure complete testing against the latest attacks

10

Trang 11

11

5 Automatic updates

Windows Update is a Microsoft update for the Windows operating system that makes your computer, laptop run smoother and more features

As you update, you'll receive the latest security enhancements and fixes so your device is always protected In addition, the increased performance helps your computer operate more efficiently after you update

For example, the Microsoft Windows operating system has automatic updates to keep Windows up to date with the latest bug fixes, feature updates, and other revisions Automatic updates help keep software better protected against viruses and attack

attempts

Other software programs allow the user to enable automatic updates, if not enabled by default upon installation Internet browsers that feature automatic updates, including Google Chrome and Microsoft Edge Anti-virus programs also feature automatic updates,

to keep your computer protected

¢ What are the advantages of Automatic Updates?

The main advantage of enabling your automatic updates functions is that any newly discovered performance or security issues are automatically updated

You need not take any action; Once a software developer makes a change, you can take advantage of it immediately

IT solutions vary by industry, but no matter what your area of business, security threats can be devastating

With automatic updates, once the developer addresses the vulnerability, the problem is fixed and you can go on with your day

11

Trang 12

12

e Are there any downsides to automatic software updates?

- Software is not always compatible with automation

Many proprietary and/or custom installations need to be fully tested in a secure environment before being installed on every device in the organization's network And what many people don't realize is that automatic updates may not be compatible with all software, and they often can't update firmware or unique file types

- Itcreates a false sense of security

The biggest downside of automatic updates is that it tends to create a false sense of security, which isn't ideal in a world where cybersecurity threats against small businesses are common Even the most up-to-date system is not immune to breaches, so don't assume your system is just because you have automatic updates turned on

- It can hinder productivity

Finally, updates take time to download and install, and this can cause disruptions in the normal workflow You can't always choose the exact time of day or night that you want the update to happen, so even if it's during prime business hours, you'll have to be patient

6 Others

As I mentioned above the windows tools And here I will list some tools that we forget every day when using computers and what are its uses

12

Ngày đăng: 24/10/2024, 17:15

w