Recommend 5 steps or measures an organization could take to mitigate unauthorized access to an organizational network infrastructure. Please, write not More than two pages.Note: All papers must adhere to APA 6th edition format. Please, don’t forget to create in-text citations before referencing any article. You may review the sample an APA in the content area to learn about the APA format.Security Strategies in Windows
Platforms and Applications
Lesson 9
Microsoft Windows Network Security
© 2021 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Cover image © Sharpshot/Dreamstime.com
Learning Objective(s)
▪ Implement security controls to protect
Microsoft Windows systems and networks.
Security Strategies in Windows Platforms and Applications
© 2021 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 2
Key Concepts
▪ Network security in a Microsoft Windows
environment
▪ Windows security protocols
▪ Securing wireless networks
Security Strategies in Windows Platforms and Applications
© 2021 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 3
Purpose of Network Security
Acts as a layer
of defense
Helps keep
attackers out
Limits exposure
of protected
resources
Security Strategies in Windows Platforms and Applications
Reduces risk of
compromised
computers
Supports
availability,
integrity, and
confidentiality
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 4
Seven Domains of a Typical IT
Infrastructure
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 5
Network Types
Local area
network (LAN)
Metropolitan
area network
(MAN)
Wide area
network
(WAN)
Personal area
network (PAN)
Campus area
network (CAN)
Global area
network (GAN)
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 6
Network Security Controls
▪ Access controls
▪ Communication controls
▪ Anti-malware software
▪ Recovery plans, including backups
▪ Procedures to control network device
configuration changes
▪ Monitoring tools and other detective controls
▪ Software patch management
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 7
Principles of Microsoft Windows
Network Security
Physical and logical access
Traffic flow
Computer and device security
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 8
Common Components Found in
Networks
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 9
Connection Media
▪ Wireless network connections
▪ Wired connections
• Unshielded twisted pair (UTP)
• Shielded twisted pair (STP)
• Coaxial cable
• Fiber optic cable
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 10
802.11 Wireless Standards
Protocol
Max.
Transmission
Speed
Range (ft.)
Indoor/Outdoor
Frequency
802.11a
54 Mbps
115 / 390
5 GHz
802.11b
11 Mbps
125 / 460
2.4 GHz
802.11g
54 Mbps
125 / 460
2.4 GHz
802.11n
600 Mbps
230 / 820
2.4 GHz / 5 GHz
802.11ac
1.3 Gbps
115
5 GHz
802.11ad (WiGiG)
6.7 Gbps
11
2.4 / 5 / 60 GHz
802.11ah (HaLow) 347 Mbps
3200 (proposed)
900 MHz
802.11ax (HEW)
(Not determined)
2.4 GHz / 5 GHz
4 Gbps
(proposed)
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 11
Networking Devices
▪ Simplest networks with few devices have every
component connected
• More than just a few devices in this arrangement
is difficult to manage
▪ Today’s network environments use several types
of devices to keep connections manageable
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 12
Hub
▪ A box with several connectors, or ports, that
allows multiple network cables to attach to it
• Common hubs have 4, 8, 16, or 32 ports
▪ Acts as hardware repeater
• Takes input from any port and repeats the
transmission, sending it as output on every port,
including the original input port
▪ As networks have become faster and more
complex, hub use has all but disappeared.
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 13
Switch
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 14
Router
▪ Connects two or more separate networks
▪ Can connect any types of networks as long as
they use the same protocols
▪ Is more intelligent than a switch
• Inspects address portion of packets
• Examines destination address and forwards
packet to correct outbound port
▪ Can be stand-alone hardware devices or
computers with multiple network interfaces
running routing software
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 15
Gateway
▪ A network device that connects two or more
separate networks using different protocols
• Wired LANs, wireless LANs, and WANs
▪ Can perform many of the tasks a router performs
▪ Has ability to translate network packets from one
protocol to another
▪ Is much more complex than a router or a switch
▪ One of the most common types is Internet
gateway; connects a LAN to the Internet
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 16
Server Computers and Services
Devices
▪ Centralized services for multiple users to share
information and physical resources
▪ Examples of shared resources include:
• File storage
• Printer and print services
• Central database and document management
systems
• Central authentication services
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 17
Server Computers and Services
Devices
▪ Network file server
▪ Network print server
▪ Data storage
▪ Application server
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 18
Server Computers and Services
Devices
Network file server
Network print server
Data storage
Application server
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 19
Firewall
▪ Filters network traffic to block suspicious packets
or messages
▪ Examines all network traffic and compares it with
predefined rules
• Rules tell the firewall whether to forward or deny
traffic
▪ After matching traffic to its rules, firewall should
drop or reject network messages that are
unauthorized or suspicious
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 20
DMZ with Two Firewalls
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 21
Microsoft Windows Security
Protocols and Services
▪ Node
• Computer or device connected to a network
• Node communicate via rules called protocols
▪ OSI Reference Model
• A generic description for how computers use multiple
layers of protocol rules to communicate across a
network
▪ Transmission Control Protocol/Internet Protocol
(TCP/IP) Reference Model
• Defines four different layers of communication rules
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 22
TCP/IP and OSI Reference
Models
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 23
Common Network
Communication Protocols
Telnet
Secure Shell
(SSH)
HTTP/
HTTPS
TLS/SSL
TCP/IP
UDP
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 24
Common Network
Communication Protocols (Cont.)
IPSec &
IKEv2
PPTP
L2TP
SSTP
WEP/WPA
Kerberos
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 25
Message Flow in the U.N.
Example
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 26
Securing Microsoft Windows
Environment Network Services
Necessary
services
Service
updates
Service
accounts
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 27
Windows Services Startup
Options
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 28
Wireless Network Security
Guidelines
Use WPA, WPA2, or WPA3 encryption
Use Media Access Control (MAC) address filtering
Disable Service Set Identifier (SSID) broadcast
Limit outside eavesdropping
Physically separate wireless networks by purpose
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 29
Desktop and Server Security
Desktop
Security
User authorization and authentication
Malicious software protection
Outbound software filtering
Server
Security
Authentication and authorization
Malicious software protection
Network traffic filtering
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 30
Internal Network and Cloud Security
▪ IPv4 versus IPv6
• IPv6 features can be used in IPv4 now, such as
end-to-end encryption using IPSec
– Features are retrofitted into IPv4
• Dual-stack IP networking support both IPv4 and
IPv6 concurrently
▪ Cloud computing
• Service level agreement (SLA)
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 31
Best Practices for Microsoft Windows
Network Security





Identify sensitive data.
Use encryption.
Establish unique domain user accounts.
Enforce strong passwords.
Create new user accounts with limited rights and
permission for services.
• Do not allow any services to run as a domain admin user.
▪ Use Kerberos for secure authentication.
▪ Install firewalls to create a DMZ.
▪ Use encrypted communications.
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 32
Best Practices for Microsoft Windows
Network Security (Cont.)
▪ Establish firewall rules.
• Deny all suspicious traffic.
• Allow only approved traffic for servers.
• Filter inbound and outbound traffic for malicious messages.
▪ Install anti-malware software.
• Perform quick scans daily.
• Perform complete scans weekly.
▪ Use WPA, WPA2, or WPA3.
▪ Disable SSID broadcast.
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 33
Best Practices for Microsoft Windows
Network Security (Cont.)
▪ Do not enable wireless or mobile broadband cards while
connected to your organization’s internal network.
▪ Do not allow visitors to roam around your facilities using
wireless LANs.
▪ Avoid connecting to public networks.
• Use a VPN.
▪ Install separate wireless access point for guests.
▪ Disable or uninstall services you don’t need.
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 34
Summary
▪ Network security in a Microsoft Windows
environment
▪ Windows security protocols
▪ Securing wireless networks
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 35

Purchase answer to see full
attachment




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.