StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Microsoft Windows 7 Security Best Practices and Vulnerabilities - Research Paper Example

Comments (0) Cite this document
Summary
This paper presents an analysis of Microsoft Windows 7 operating system in the context of its security support. The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Microsoft Windows 7 Security Best Practices and Vulnerabilities
Read Text Preview

Extract of sample "Microsoft Windows 7 Security Best Practices and Vulnerabilities"

Download file to see previous pages There are several features of windows 7 security, which provide the users a freedom to go anywhere on the network quite securely such as Windows 7 Application locker, Data Execution and Prevention, Bitlocker, Internet Explorer 8, Window 7 Direct Access, and Microsoft Virtual hard disk (VHD). While in the second section some of the vulnerabilities of Windows 7 OS are highlighted, where a number of holes existing in the Windows 7 OS are discussed from. As a result, the attackers can enter and cause harm to the system of the user or users in a network.
The Windows 7 operating system has some updated features of security, which are more efficient options available than in windows XP, for instance the updated kernel patch protection, service hardening, data execution prevention, address space layout randomization, and mandatory integrity levels (Shimonski, 2010). Windows 7 has an excellent capability to deal with the viruses, spyware and other malware. Windows 7 uses a wide variety of tools to deal with these unpredictable security threats such as windows application locker and Bit locker Encryption. Along with the efficiency of these features, there exist some vulnerabilities as well, like remote attackers can easily attack, and local users can achieve privileges using crafted applications (CVeDetails, 2014). This paper presents an analysis of Microsoft Windows 7 operating system in the context of its security support. The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system.
Windows 7 has a wonderful tool, known as App locker that is used to secure executable files. Windows 7 application locker allows the administrator to create custom rules for the execution of executable files. In these rules, one can define: an application that will run, the requirement of rebooting for application, the type of application from specific vendors that can be executed without any restriction, and the specification of vendors that have rigid restrictions on the operating system. Additionally, administrators can redefine the rules developed for the different types of executable files. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 words, n.d.)
Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 words. https://studentshare.org/information-technology/1850682-microsoft-windows-7-security-best-practices-and-vunlerabilites
(Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 Words)
Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/information-technology/1850682-microsoft-windows-7-security-best-practices-and-vunlerabilites.
“Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 Words”. https://studentshare.org/information-technology/1850682-microsoft-windows-7-security-best-practices-and-vunlerabilites.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Microsoft Windows 7 Security Best Practices and Vulnerabilities

Microsoft Windows 7

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... (Add (Add Information) (Add MS Windows 7 Introduction 200 Windows 7 is the most recent operating system developed and released by Microsoft for the purpose of using on personal computers including desktops, netbooks, laptops, tablets, and media centre PCs. Unlike the previous Windows Vista, which introduced a range of innovative features, Windows 7 was developed to meet more customized needs and to make an incremental upgradation to the Windows platform. The development of this new Windows operating system assisted Microsoft to gain competitive advantages over its competitors. Data indicate that Windows 7 helped...
16 Pages (4000 words) Literature review

Best Practices for Network Security

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... Best Practices for Network Security. Best Practices for Network Security With a lack of security policy and the ability of the system can be affected. The procedure initiates with evaluating the peril to the system and constructing a squad to respond. Continuance of the strategy entails executing a safety modification administration exercise and checking the system for safety breaches. The appraisal procedure adjusts the current policy and acclimatizes to lessons learned. We have all been there- the everyday bombardment of junk mail, now pest-ridden with zero-day malware assaults, let’s not forget the dangers of...
5 Pages (1250 words) Research Paper

Windows 7 Ultimate Deployment

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... Networking consultancy for Mr Green Your school Table of contents 3 List and explanation for current concerns for windows 7 ultimate for Mr Green 4 List and explanation for future concerns for using windows 7 ultimate 5 Most efficient method of installing Windows 7 Ultimate 6 Concerns for helping Mr Green with Windows 7 ultimate 6 List and description of Windows 7 features for the networking concerns 7 Three migration strategies for Windows 7 ultimate 7 Steps for providing two operating systems on a computer 8 Reason for choosing hard disk partition style, disk type and file system 8 Summary 9 References 10...
7 Pages (1750 words) Assignment

The System Administrators of MegaCorp: Security Goals

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... Enhancing Security in System Administration Introduction Operating systems are often regarded as software that provides greater access towards various hardware resources like computer system. The various sorts of operating systems generally tend to offer superior access to diverse disk devices on which different programs are collectively stored. It is worth mentioning that operating systems run various programs in dissimilar processes. One of the challenges related with the developer of operating systems is to adopt and execute various applications concurrently. This signifies that operating systems which would be...
12 Pages (3000 words) Assignment

Assessment of Technology centric Strategies for information security in an organization

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... the past two decades, the information systems model has changed from a centralised one with limited access to a model that is distributed in terms of how information is collected, shared and made available. This change, together with improvements in computing infrastructure, has exposed new vulnerabilities that simply were not considered before. Information Assurance is the confidence that information systems will protect the information they handle and will function as they need to, when they need to, under the control of legitimate users. "Defense in Depth is a practical strategy for achieving Information Assur...
3 Pages (750 words) Essay

Microsoft Windows operating system

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... Windows Operating System Microsoft Windows is a family of operating systems by Microsoft for use basically on personal computers, but it has been successfully proved since the first version of Windows that they can run on several types of platforms such as servers and embedded devices. First introduced in November 1985 as an add-on to MS-DOS, this operating system has grown from strength to strength having different variants till Windows XP and XP-Pro. Now the world is waiting for Windows Vista which is to be launched by January, 2007. Business economics tell us that a perfectly competitive market has the following ...
2 Pages (500 words) Essay

Practical Windows Security - The Identification of Vulnerabilities

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... Windows Security against CVE-2003-0352/MS03-026 Table of Contents Introduction Common Vulnerabilities and Exposures or simplyCVE is a record of information security vulnerabilities and experiences that intend to offer frequent names for publicly recognized problems. The objective of Common Vulnerabilities and Exposures is to make it rather easier to share data all through the alienated vulnerability potentials (repositories, expert tools as well as services) by means of this "common enumeration. Additionally, through a widespread identifier it becomes easy to dispense data all through separate services, since many...
11 Pages (2750 words) Case Study

Windows Server 2008 and Windows 7

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... Server 2008 and Windows 7 Windows 7 This is one of the greatest desktop operating systems and it is not a Server operating system. Windows 7 has improved performance whereby the application launch times and system boot time has prominently decreased. It has new optimization tools that assist in decreasing battery usage, enabling individuals using portable computers more cord free time. On the other hand, windows 7 has new options that enable an individual to look for keywords in storage devices attached, documents and emails (Krebs, 2009). In addition, this operating system can be virtualized and allows several ope...
1 Pages (250 words) Essay

Vulnerabilities in Microsoft Windows Server, IAAS

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... Vulnerabilities in Microsoft Windows Server, IAAS This study reflects upon various aspects of cloud computing and certain vulnerabilities faced by its applications or technologies. Cloud computing has enhanced the rate of connectivity but even triggered many challenges for system administrators. IAAS is a basic cloud computing platform which has witnessed such vulnerabilities over the years. The study discusses these issues in relation to Windows Server, an integral component of IAAS framework. Data security is an important issue observed in Windows Server, which can be managed through designing firewalls,...
10 Pages (2500 words) Essay

Best Practices for Network Security

...Microsoft Windows 7 Security Best Practices and Vulnerabilities... Microsoft Windows 7 Security Best Practices and Vulnerabilities... Practices for Network Security Grade April 14, Best Practices for Network Security Best practices for network security are the actions, plans and steps taken to ensure that the network is always safe and secured. It is something that is so compromising for a network without a security policy. The responsibility of protecting the computer files and all information (e.g., employer’s information) in the network depend on the practices that are applied for the security. There are those procedures that are followed to see that the network is fully secured to prevent it from attacks and threats. It is good to...
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Microsoft Windows 7 Security Best Practices and Vulnerabilities for FREE!

Contact Us