9781435483712_PPT_ch04 - Cyber Safety Chapter 4:...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Cyber Safety Chapter 4: Administering Windows Securely Copyright © by EC-Council All Objectives  Use the Event Viewer  Read logs on your system  Enable auditing in Windows  Locate and use the Windows registry Copyright © by EC-Council All Objectives (cont’d.)  Restore the registry  Close ports  Find services and ports they listen on  Use common internal commands Copyright © by EC-Council All Case Example  Mary Jane works as a resource developer on the human resources team  Her home computer runs on Windows XP, and she uses Office XP to record her activities  One evening she noticed a change in the system’s behavior  She scanned her system with an antivirus program, which found some rogue files with .exe extensions  Mary Jane was surprised, because she had scanned her computer earlier in the evening and that scan hadn't found any problems, and she hadn’t been surfing the Web Copyright © by EC-Council All Introduction  This chapter:  Introduces some of the built-in features of Windows that can help you work more securely  Concludes with a list of some basic internal commands that can be used for troubleshooting Copyright © by EC-Council All Overview of Event Viewer ...
View Full Document

This note was uploaded on 06/08/2011 for the course COMPUTER CGS2100 taught by Professor Sanders during the Spring '09 term at Florida State College.

Page1 / 23

9781435483712_PPT_ch04 - Cyber Safety Chapter 4:...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online