My mission was to learn more about the latest Windows operating system tools using the web: firewalls, automatic updates, and scanning for viruses, spyware, and other malware.. Antivirus
Trang 1Cy HUTECH & OPENUN
University of Technology
ALAYSI
HCM UNVERSITY OF TECHNOLOGY HUTECH INSTITUTE OF INTERNATIONAL EDUCATION
OPERATING SYSTEMS Assignment(OUM) — June Semester 2022
HCM City, June 2022
Trang 2
Contents
HTH“~A.AdldẢẢẲẢỶỒỔỒÃỶIIĨŨŨIÃŨ 4 II) ii 4
“` ¬ 9
G Others 12
l2 ` 64 ã:-ÔÔÔÔÔ 16
THE 90) 000 303D 19 JS)1U)19;-3y:]0 đHưfDŨẢẢẢ 20
Trang 3L INTRODUCTION
Hello everyone, my name is Thinh and today as an IT manager in the company I was asked by the executive to explore the various tools included with the operating system and assess any additional needs My mission was to learn more about the latest Windows operating system tools using the web: firewalls, automatic updates, and scanning for viruses, spyware, and other malware Find the advantages and disadvantages of using the built-in operating system tools Are there any built-in OS tools that raise security concerns? Explore alternatives for each tool and determine if you should disable Windows tools if there are any risks And first, I will talk about what operating system is?
An operating system (OS) is a collection of programs that act as an interface between a computer user and the computer's hardware The purpose of an operating system is to provide an environment in which users can execute programs Operating systems are seen
as resource managers Primary resources are computer hardware in the form of microprocessors, storage, input/output devices, communication and data devices Some
of the operating system functions:
¢ Implementation of the user interface;
e Sharing hardware among users;
e Allows users to share data between themselves;
® Prevent users from interfering with one another;
¢ Schedule resources among users;
Trang 4IL BODY
In the following, I will discuss the tools of the windows operating system:
1 Firewall:
Figure 1: Proxy firewall security [ CITATION ADMIS8 \I 1033 ]
A firewall can be a network security device that monitors incoming and outgoing network traffic and decides to allow or block specific traffic that supports a set of outlined security rules
Firewalls have been the main line of defense in network security for 25 years They create a barrier between a secure and controlled internal network and a trusted and untrusted external network such as the Internet Firewalls consist of hardware, software,
or both
Firewalls are a necessary part of any security architecture, and take the guesswork out of server-level protection and hand them off to your network security appliance Firewalls, and im particular Next-Generation Firewalls, focus on preventing malware and
Trang 5application-layer attacks, along with built-in intrusion prevention (IPS), Firewalls This next generation can respond quickly and seamlessly to detect and react to external attacks across the entire network They can establish policies to better protect your network, and perform quick assessments to detect intrusive or suspicious activity, like malware, and shut it down
Firewalls, especially Next Generation Firewalls, focus on preventing malware and application layer attacks Together with built-in intrusion prevention (IPS), these Next Generation Firewalls can react quickly and continuously to detect and fight attacks across the entire network Firewalls can work based on pre-set policies to better protect your network and can perform quick assessments to detect invasive or suspicious activity, such
as malware and turn it off By leveraging firewalls for your security infrastructure, you are setting up your network with specific policies to allow or block incoming and outgoing traffic
2 Antivirus
Trang 6Figure 2: computer protection software[ CITATION Eri22 \l 1033 ]
Antivirus is an English compound word for Anti and Virus Anti-means prevention, Viruses (computer viruses) are strains of malicious software created by hackers and taken advantage of to attack the computers of many victims to bring benefits to hackers such as stealing information, breaking computer systems destruction, fraud to appropriate money, blackmailing victims
Antivirus - also known as anti-virus software is a form of software that can protect, detect, warn and remove computer viruses that are invading and attacking users’ computers, thereby fixing a problem partial or complete consequences of computer viruses In addition, today's antivirus software also can upgrade over the internet to identify and prevent malware, viruses, Trojans, spyware, and ransomware that are increasingly sophisticated and dangerous
© How Antivirus Software Works
- System Scan
Anti-virus software will scan all files on the system for threats, usually, when you install antivirus software for the first time it will ask if you want to scan the entire system or not
- Limit the spread of data duplication
When you perform a copy such as from USB to computer or any copying operation, in that data may contain viruses without your knowledge, anti-virus software will check each file before performing the replication, thereby minimizing the spread
Some viruses also can self-replicate or copy themselves to the remaining drives, antivirus software will also detect and disable them
Trang 7- Real-time protection
This is an extremely important feature that most anti-virus software has, instead of scanning the entire system, every time you manipulate specific data such as downloading
a file from the internet, or mstalling a new program, it will perform a check of that file to see if it is safe, if it detects malware it will block it and warn you about that threat
e Benefits of using anti-virus software
+ Protect your computer from virus attacks
Anti-virus software will search for and remove viruses that are lurking on your computer Once you have installed an antivirus program for your computer, there is no need to worry because it will protect you from any viruses that are trying to get into the system
In most cases, antivirus software will actively remove the virus from the system to prevent it from spreading
+ Limit spreading and copying
The virus can replicate itself even if you have deleted it while the operating system is running Therefore, anti-virus programs with built-in scanning at startup will work Simply because a virus will not be able to replicate itself while the operating system is being disabled during the removal process
Trang 83 Spyware
Spyware could be a form of malicious software - or malicious software - that's installed
on a computer device without the tip user's knowledge It infiltrates devices, steals sensitive information and internet usage data, and passes it on to advertisers, data companies, or outside users
Any piece of software will be classified as spyware if it's downloaded without the user's permission Spyware is controversial because even when it's installed for relatively harmless reasons, it can violate end-user privacy and potentially be abused
e How does Spyware work?
Spyware can infiltrate devices without the end user's knowledge through an app installation package, attachment, or malicious website In its least harmful form, spyware exists as an app that starts up as soon as the device is turned on and continues to run in the background Its presence steals random access memory and processor power and can generate infinite pop-ups, effectively slowing down web browsing until it's unusable
¢ How does spyware infect?
Fosfeed Intervention spyware affects any individual computer, Mac, iOS, or Android device Certain common ways to infect a computer with viruses include:
- rights coverage of media such as games, videos, and music by downloading and distributing digital content with rights without permission;
- Download the root source of the document;
- accept ads triggering up; and
- Open email attachments sent from unknown people
Trang 9¢ How Do You Stop Spyware?
Maintaining rigorous cybersecurity practices is the best way to prevent spyware Some best practices include:
- only download software from reliable sources;
- read all disclosures upon software installation;
- avoid interacting with pop-ups;
- updating and patching bugs for browsers, operating systems (OS) and application software;
- don't open email attachments or click links from unknown senders;
- use only trustworthy antivirus software and reputable spyware tools; and
- tum on two-factor authentication (2FA) whenever possible
4 Malware
Malware (short for “malicious software”) could be a file or code, typically distributed over a network, that infects, discovers, steals, or does virtually any behavior that an attacker couldn't wish to and since malware has such a lot of variants, there are many methods to infect computer systems Despite its style of types and capabilities, malware typically has one in all the subsequent goals:
- Provide remote for the attacker to use the infected machine
- Send spam from the infected machine to unsuspecting targets
- Investigate the local network of the infected user
- Theft of sensitive data
Trang 1010
e Types of malware attacks
Malware also uses various methods to spread itself to computer systems other than the original attack vector Definitions of malware attacks may include:
- Email attachments containing malicious code can be opened and thus executed by unsuspecting users If those emails are forwarded, the malware can even spread deeper into the organization, causing deeper effects on the network
- File servers, such as those based on the Common Internet File System (SMB/CIFS) and the Network File System (NFS), can allow malware to spread rapidly when accessed and downloaded by users infected file
- File sharing software can allow malware to replicate itself onto removable media and then onto computer systems and networks
- Peer-to-peer (P2P) file-sharing can create malware by sharing seemingly innocuous files like music or pictures
- Remotely exploitable vulnerabilities could allow hackers to access systems regardless of geographic location without or without the need for computer users
to participate
e How to prevent malware:
A variety of security solutions are used to detect and prevent malware These include firewalls, next-generation firewalls, network intrusion prevention systems (IPS), deep packet inspection (DPI) capabilities, unified threat management systems, anti-virus gateways and anti-spam, virtual private network, and content filtering systems and data leak prevention To prevent malware, all security solutions should be tested using a series
of malware-based attacks to ensure they work properly Must use a robust, up-to-date malware signature library to ensure complete testing against the latest attacks
10
Trang 1111
5 Automatic updates
Windows Update is a Microsoft update for the Windows operating system that makes your computer, laptop run smoother and more features
As you update, you'll receive the latest security enhancements and fixes so your device is always protected In addition, the increased performance helps your computer operate more efficiently after you update
For example, the Microsoft Windows operating system has automatic updates to keep Windows up to date with the latest bug fixes, feature updates, and other revisions Automatic updates help keep software better protected against viruses and attack
attempts
Other software programs allow the user to enable automatic updates, if not enabled by default upon installation Internet browsers that feature automatic updates, including Google Chrome and Microsoft Edge Anti-virus programs also feature automatic updates,
to keep your computer protected
¢ What are the advantages of Automatic Updates?
The main advantage of enabling your automatic updates functions is that any newly discovered performance or security issues are automatically updated
You need not take any action; Once a software developer makes a change, you can take advantage of it immediately
IT solutions vary by industry, but no matter what your area of business, security threats can be devastating
With automatic updates, once the developer addresses the vulnerability, the problem is fixed and you can go on with your day
11
Trang 1212
e Are there any downsides to automatic software updates?
- Software is not always compatible with automation
Many proprietary and/or custom installations need to be fully tested in a secure environment before being installed on every device in the organization's network And what many people don't realize is that automatic updates may not be compatible with all software, and they often can't update firmware or unique file types
- Itcreates a false sense of security
The biggest downside of automatic updates is that it tends to create a false sense of security, which isn't ideal in a world where cybersecurity threats against small businesses are common Even the most up-to-date system is not immune to breaches, so don't assume your system is just because you have automatic updates turned on
- It can hinder productivity
Finally, updates take time to download and install, and this can cause disruptions in the normal workflow You can't always choose the exact time of day or night that you want the update to happen, so even if it's during prime business hours, you'll have to be patient
6 Others
As I mentioned above the windows tools And here I will list some tools that we forget every day when using computers and what are its uses
12