2. OS - Client security 클라이언트 보안

1. Windows Security

(1) Install & Management

   ① Considerations for Installing Windows

   ② Windows License Mode - Per Server(S1:C*), Per Seat(C)

(2) Management of shared data

   ① File and Folder Permission - NTFS file system, (FAT16, FAT32 - no function)

   ② NTFS permission management for Folder(R, W, R&X, 수정(W, R&X), all permi)

   ③ NTFS permission management for File(R, W, R&X, 수정(W, R&X), all permi)

   ④ Permission of shared folder

      ⓐ Management of shared folder(share the folder as "administrative purposes")
         - C$, D$, E$, etc : shared in the form of a hard disk partitioning.
         - Admin$ : say a folder that is managed by "%SYSTEMROOT%" of the system.
         - IPC$ : username, passwd -> input null -> can connect

(3) Viruses and vaccines

   ① Types of malicious programs - Virus, Worm, Trojan Horse, Spyware, Adware, Malicious code

   ② Boot vir, File vir, Macro vir

   ③ Anti - virus       

(4) Use of registry

   ① input "regedit"

   ② Registry Editor

      ⓐ HKEY_CLASSES_ROOT
      ⓑ HKEY_CURRENT_USER
      ⓓ HKEY_LOCAL_MACHINE
      ⓓ HKEY_USERS
      ⓔ HKEY_CURRENT_CONFIG

   ③ Backup and recovery

   ④ Difference of Regedit32 and Regedit

2. The use of the Internet security

(1) Security of Web Browser

   ① Web Browser - HTTP(Hyper-Text Transfer Protocol)

   ② Functions of Web Browser

      ⓐ HTTP, HTTPS
      ⓑ HTML, XML, XHTML
      ⓒ GIF, PNG, JPEG
      ⓓ CSS, Cookie, Javascript(DHTML), Digital certificate, Plug-in

   ③ Technology to collect personal information of web browser

      ⓐ Cookie & Super Cookie
      ⓑ Beacon
      ⓒ History Stealing
      ⓓ Fingerprint
      ⓔ Contents Redirection

   ④ HTTP Protocol

      ⓐ HTTP protocol connection mechanism
      ⓑ HTTP 1.0 protocol connection mechanism(text - reconnect - image)
      ⓒ HTTP 1.1 protocol connection mechanism(text, image)

   ⑤ HTTP request method

      GET, POST
      ⓐ HTTP/1.0 request method
         GET, HEAD, POST
      ⓑ HTTP/1.1 request method
         CONNECT, DELETE, GET, HEAD, OPTION, POST, PUT, TRACE

   ⑥ HTTP protocol status code

      100, 101, 200 ~ 206, 300 ~ 305, 307, 400 ~ 417, 500 ~ 505
      2xx : Success
         200 : Transmission success without error
         201 : Made ​​a document on the server
      3xx : Retransmission
         301 : 
         302 : 
      4xx : Client-error
         400 : Grammatical errors -> Request fails
         403 : File name incorrect
         404 : File Not Found
      5xx : Server-error
         500 : Internal server error

(2) Mail Client Security

   PGP(Pretty Good Privacy)

(3) Corresponds and Understanding for The public hacking tools

   ① Trojan horse

   ② Cracking tools

      ⓐ Rootkit(WIN - user mode, kernel mode, lrk5)
      ⓑ Anti-Rootkit

      ⓒ Password Crack
       
         techniques
         - Brute Force Attack
         - Dictionary Attack
         - Password Guessing
         - SAM(Security Account Manager)
       
         Kind
         ⓐ John the Ripper
         ⓑ pwdump
         ⓒ L0phtCrack
         ⓓ ipccrack
         ⓔ chntpw
         ⓕ ERD Commander

       ⓓ Port Scanning(UDP, TCP)

         Kind
         ⓐ 다중 취약점 스캔 : SAINT, sscan2k, vetescan, mscan 등
         ⓑ 특정 취약점 스캔 : cgiscan, winscan, rpcscan
         ⓒ 은닉스캔 : Nmap, stealthscan
         ⓓ 네트워크 구조 스캔 : firewalk, Nmap

         Scanning techniques
            - openning scanning : TCP connect scanning
            - Half-open scanning : SYN scanning
            - Stealth Scanning : FIN scanning, X-MAS scanning, NULL scanning
            - More Adcanced Scanning : Spoofed scanning
         Nmap
            scan type : -sT, -sS, (-sF, -sX, -sN), -sP, -sU, -sA, -sW, -sR, -b
            scan option : -P0, -PT, -PS, -PB, -O, -v, -p<port number>, -F, -S<IP>,
                              -e<interface>, -g<port number>, -oN<log name>, -oM<log name>
   ③ Key Log

(4) Security management tool utilization

   ① SPPF/W(SoFTPerfect Personal Firewall), Zone Alarm

댓글