StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Microsoft Windows 7 Security Best Practices and Vulnerabilities - Research Paper Example

Cite this document
Summary
This paper presents an analysis of Microsoft Windows 7 operating system in the context of its security support. The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Microsoft Windows 7 Security Best Practices and Vulnerabilities
Read Text Preview

Extract of sample "Microsoft Windows 7 Security Best Practices and Vulnerabilities"

MICROSOFT WINDOWS 7 SECURITY BEST PRACTICES AND VULNERABILITIES Microsoft Windows 7 Security Best Practices and Vulnerabilities Affiliation Date Table of Contents Table of Contents 2 Introduction 4 Windows 7 Security Best Practices 4 Windows 7 Application locker 4 Data Execution Prevention 5 Bitlocker 6 Internet Explorer 8 6 Windows 7 Direct Access 8 Microsoft Virtual hard disk (VHD) 8 Microsoft windows 7 vulnerabilities 9 References 13 Abstract The Windows 7 operating system has some updated features of security, which are more efficient options available than in windows XP. Along with the efficiency of these features, there exist some vulnerabilities as well, where the remote attackers can easily attack, and local users can achieve privileges using crafted applications. This paper has discussed the best practices of the Windows 7 Operating System and also some vulnerabilities of this system. It has two sections: the first section has elaborated a number of the best features in Windows 7 OS. There are several features of windows 7 security, which provide the users a freedom to go anywhere on the network quite securely such as Windows 7 Application locker, Data Execution and Prevention, Bitlocker, Internet Explorer 8, Window 7 Direct Access, and Microsoft Virtual hard disk (VHD). While in the second section some of the vulnerabilities of Windows 7 OS are highlighted, where a number of holes existing in the Windows 7 OS are discussed from. As a result, the attackers can enter and cause harm to the system of the user or users in a network. Introduction The Windows 7 operating system has some updated features of security, which are more efficient options available than in windows XP, for instance the updated kernel patch protection, service hardening, data execution prevention, address space layout randomization, and mandatory integrity levels (Shimonski, 2010). Windows 7 has an excellent capability to deal with the viruses, spyware and other malware. Windows 7 uses a wide variety of tools to deal with these unpredictable security threats such as windows application locker and Bit locker Encryption. Along with the efficiency of these features, there exist some vulnerabilities as well, like remote attackers can easily attack, and local users can achieve privileges using crafted applications (CVeDetails, 2014). This paper presents an analysis of Microsoft Windows 7 operating system in the context of its security support. The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system. Windows 7 Security Best Practices There are several features of windows 7 security, which provide the users a freedom to go anywhere on the network quite securely. Some of the best practices are given below: Windows 7 Application locker Windows 7 has a wonderful tool, known as App locker that is used to secure executable files. Windows 7 application locker allows the administrator to create custom rules for the execution of executable files. In these rules, one can define: an application that will run, the requirement of rebooting for application, the type of application from specific vendors that can be executed without any restriction, and the specification of vendors that have rigid restrictions on the operating system. Additionally, administrators can redefine the rules developed for the different types of executable files. For gaining the best out of the application locker program features, its functionality should be tested on a system having the operating system of windows 7. As a result, it would allow the user to generate the rules easily and handle the application locker for different applications. In addition, this application locker will be more helpful for the companies within the range of small to medium sized companies (Phifer, How to Automate And Apply Microsoft Windows 7 AppLocker rules, 2009). Data Execution Prevention Data execution prevention (DEP) is the security feature that prevents the computers from the losses incurred by viruses such as Trojan horses and other types of malware. This feature in windows 7 helps to improve the security wall, where no one can access to system files without any prevention. When the user installs or opens any execution file on the computer, the DEP feature reviews the file, where if this file does not have any type of viruses or such features, only then it allows the user to open the file. But in another case, if the file is considered to be dangerous for the system, then DEP will close the file and send a notification to the user about this file harmful for the computer or system or network. DEP is enabled for all the softwares, while for some softwares, it has to be enabled by the user or in another case it is auto-enabled. In addition, it provides an excellent support for both the hardware and software. It has a default security configuration that the user can customize according to the requirements (Dysert, 2013). Bitlocker In daily life, many people use USB (Universal Serial Bus) and different storage devices for storing their data. In fact, the majority of users buy some expensive data encrypted software applications to secure the data. For resolving such security issues, Microsoft introduces the new built in security feature in windows 7, which is called “bitlocker”. Basically, “Bitlocker is a built-in tool in windows 7 operating system, which can encrypt the whole hard drive, and in addition to this encryption, it further improves security by ensuring that no unauthorized user can modify data without the permission of the administrator or authorized user” (Paul, 2014; MSFTTS2, 2010). Mostly enterprise customers use windows 7 to get the benefits of its enhanced security feature, for instance, bitlocker for protecting the enterprise data. Bitlocker saves its encryption key in removable media storage, like USB or flash (Paul, 2014; MSFTTS2, 2010). Internet Explorer 8 Windows 7 operating system introduces new version of Internet Explorer 8 with more power and new features that are not available in older browsers or IE7. Microsoft also argues for the new version that even Microsoft could not find any flaw in windows 7 Internet explorer 8th version (Grimes, 2010). IE8 is safer, easier and more compatible with internet standards than IE7. In IE8, the tabbed browsing features enhance the data protection. When the user closes the browser by mistake, then by reopening the browser, IE8 provides the restore option for restoring the old tabs without any loss. With IE7, there was an issue that if some pages are creating problems then the whole program is crashed and is to be closed. While in internet explorer 8th version, the users have the advantage of closing only those tabs which are creating problems. Due to these effects and new features, the users can carry on browsing without any interruption (Grimes, 2010; Mediati, 2009). There are a number of other security features added in the Internet explorer version 8 that the user can detect phishing, prevent click jacking, which are emerging data theft threats. In-private browsing and In-private filtering features are also added in the windows security features. Another advantage of the IE8 in windows 7 is that the internet explorer does not save any type of login information, like username, email, passwords, browsing history, and any other action performed by the users in the private browsing. While in In-private filtering, there is an advanced option in IE8 of windows 7 that is called as “windows In-private blocking”. During browsing on the internet, there are some websites which collect the users’ information regarding his browsing after the user’s visit to that website. In IE8, the In-private blocking features provide improved security, as with this feature neither websites can collect information about the user’s browsing (Mediati, 2009). In addition, the users of IE8 in windows 7 can only take advantage from the In-private blocking features, when they are performing In-private browsing. There is also another feature, which is included in IE8 of windows 7, known as phishing filter. This feature is very impressive and helpful for the users, who are involved in buying or selling online by using their credit card. There are few websites which are not original websites, in reality, but their address, their interface resembles with original websites that the users can be deceived. Such websites are created by hackers for the phishing attack. So, for reducing these phishing attacks, Microsoft introduced in windows 7 of IE8 phishing filter feature (Mediati, 2009). Windows 7 Direct Access In Microsoft Windows 7, there is another option for improving security that is known as windows 7 direct access. Direct access has the same role as the role of virtual private network (VPN). Basically, a virtual private network allows the users to connect to the internet through a network in a secure fashion. Virtual private network has been helping the customers for many years to access the network through remote technology. After the introduction of windows 7 direct access, the customers are not required to contact any special vendor or no requirement of complex configuration that is hard to understand. Additionally, users have many advantages of windows 7 direct access, among these the most important is that they do not need to create a connection again, if they are disconnected accidently from the internet. Another added benefit is that all the communications performed by the user are encrypted with IPsec. Direct access uses some IPsec tunnels for implementing it, where these tunnels are machine certificates for authenticating, and it requires the user’s credentials for the implantation of Microsoft direct access (Phifer, Understand the pros and cons of Microsoft Windows 7 DirectAccess, 2009). Microsoft Virtual hard disk (VHD) Virtual hard disk is another feature included in the Microsoft windows 7, which allows the multiple operating systems to reside on a single machine. VHD has several advantages, such as the easier resource allocation and utilization where it describes about what and how much resources should be used for which process, and also the speed of Deployment is increased with a decrease in the cost of operation. It also provides the easy upgrades and migrations from one operating system to another operating system. The users can perform their work in the standard format (Marshall, 2009). Microsoft windows 7 vulnerabilities There is no doubt that Microsoft windows 7 has a lot of good quality security features, such as bitlocker, applocker, data execution prevention, Microsoft virtual hard disk, and so on. But there are also some flaws or vulnerabilities in it, which can cause harm to its users. Hence, it is important for the users to know about such vulnerabilities in Microsoft windows 7. Some of the vulnerabilities are given in below: All the users of windows 7 should know that their operating system has built-in features of bitlocker, so before working on it, the users have to know if the operating system is other than windows 7 ultimate or enterprise edition. And if so, then they have to buy some 3rd party encryption software. If user using Microsoft direct access, then the user must have to restrict all its users, as if anyone got access to any user’s system, then he can perform any type of action granted to the user (Beaver, 2010). Microsoft windows 7 can be exploited with the Metasploit, and Metasploit takes advantage of the windows 7 from the Microsoft office 2010 or 2007 and with the internet explorer 9. The hackers can enter into the Microsoft windows 7 through IE or Microsoft office, then the hacker can perform any type of action granted to the user of the system. And if the hacker enters into the administrator operating system, then it is the end for the administrator system and other system which are working under the administrator, as in this way, the hacker can perform all the actions, which administrator can performs. There is another vulnerability that arises if the hacker knows that in which manner internet explorer handle the objects in the memory. Due to this vulnerability, the hackers can bypass the data execution prevention (DEP) and address space layout randomization (ASLR) through Microsoft office help data service module, as it enables the hackers to install their own code for remote execution (Occupytheweb, 2013). In Microsoft windows 7 vulnerabilities, there is another hole from where hacker can enter into the system and performs any type of action harmful to the users, just like a vulnerability hole exists in the windows explorer. Windows explorer keeps all the files of the operating system. The manipulation here is that the windows 7 operating system hides the file extensions, and when it says that by opening this file your system can be in danger, then in reality, it is a malware that has the ability to destroy all the data from the hard drive. If there is file in windows 7 operating system like “avast.exe file”, then the user cannot see the “exe”, because windows 7 operating system hides the file extension. And if any malware enters in the system from any source, then it causes harm to the system, as it shows itself like this “danger_viruse.txt.exe” file. So, the windows 7 operating system hides the file extension and the user opens the file as a text, where the malware is activated just by opening the file and performs the action for which it is created (Spam Laws, 2014; Sharma, Kumar, & Sharma, 2011). There is another vulnerability hole existed in the local security authority system, which can cause an attack, and this attack is, most of the times, a denial of service attack. In denial of service attack, the hacker represents himself as authorized user and the other person on the network understands that the communication is being held between the authorized users, but in reality, this communication is not between authorized users. So, if during the communication, the hacker sends a harmful file, then it causes harm to the receiver system also or may be much more harmful, as it has the ability to destroy all the system working on the network. Microsoft windows 7 operating system have a nice functionality by reducing the interaction of the user. Though, reducing the user interaction is a good thing, but if any virus like the Trojan horses or any other type of malware enters from any source, then there is no option for the user interaction, and in this, the vulnerability hole can be a vulnerability well (Spam Laws, 2014). Moreover, people are using Microsoft windows 7 operating system as a best security featured operating system, but there are some other holes in windows 7 operating system harmful for its users, for instance, there is a loop attack, which can destroy the remote kernel. In windows 7 operating system, the users can see this vulnerability hole with Metasploit framework. It is a framework that is used for exploiting the vulnerabilities in the operating system or used to find the vulnerabilities in any other type of application. But if the user uses this framework, then it can allow any unauthorized user, or illegal user, or the user with no privileges of performing the actions, can access the IP of the system on which this module is installed (Sharma, Kumar, & Sharma, 2011). Without a doubt, with high features of security, sometimes a single security hole can crash the whole system, so there is a need to learn about these vulnerabilities in windows 7 operating system, where proper hurdles can be placed in way of hackers. Canonical display driver (CDD) is used for displaying something on the system through a graphical device interface (GDI). “The CDD is used is desktop composition to blend the Windows graphics device interface and DirectX drawing” (Prince, 2010). Researchers show that there is also a vulnerability in canonical display driers. The security holes that are present in the canonical display driver can also affect the windows server 2008. The vulnerability existing in the canonical display driver is not delivering the copied information to the kernel mode from the user mode. And the attacker can attack, but there is a reaction to this attack, which is like ‘the system is not responding” or “the system is going to restart automatically”. With this vulnerability, the attacker have another advantage that he can insert his own modified code in the windows 7 operating system section at vulnerability hole. Though, this insertion of code can be difficult through memory randomization, but there is still a chance available to the hacker that he can insert code in the memory in specific sections of the kernel. For this insertion of code, the attacker must have to write the executable code (Sharma, Kumar, & Sharma, 2011). Microsoft windows 7 allows the local user to attain the privileges through a crafted application, which is also another hole and it can be dangerous for the whole system or even for the whole network. In internet explorer 8 on Microsoft windows 7, another vulnerability exists that allows the remote attacker to cause the denial of service attack through specific DIV element in conjunction with script element, which is an empty content and have no reference to valid external script location (Sharma, Kumar, & Sharma, 2011). References Beaver, K. (2010, June). Six Windows 7 security vulnerabilities you dont know about. Retrieved from Search Enterprise Desktop: http://searchenterprisedesktop.techtarget.com/tip/Six-Windows-7-security-vulnerabilities-you-dont-know-about Cvedetails. (2014). Security Vulnerabilities. Retrieved from Cvedetails: http://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-17153/hasexp-1/Microsoft-Windows-7.html CVeDetails. (2014). Security Vulnerabilities. Retrieved from Cvedetails: http://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-17153/hasexp-1/Microsoft-Windows-7.html Dysert, B. (2013, February 18). Understanding Data Execution Prevention. Retrieved from Windows Tips: http://windows.tips.net/T012480_Understanding_Data_Execution_Prevention.html Grimes, R. A. (2010, April 21). The ultimate guide to Windows 7 security. Retrieved from Infoworld: http://www.infoworld.com/article/2626907/endpoint-protection/the-ultimate-guide-to-windows-7-security.html?page=4 Marshall, D. (2009, October 15). Microsoft Windows 7 90-Day Evaluation Virtual Hard Disk (VHD). Retrieved from Vmblog: http://vmblog.com/archive/2009/10/15/microsoft-windows-7-90-day-evaluation-virtual-hard-disk-vhd.aspx#.VHwRX9KUfUw Mediati, N. (2009, January 26). Internet Explorer 8 Focuses on Improved Security and Privacy. Retrieved from PC World: http://www.pcworld.com/article/158366/explorer_8.html MSFTTS2. (2010, March 17). What is BitLocker? What does it do? What does it not do? Retrieved from TechNet.com: http://blogs.technet.com/b/uspartner_ts2team/archive/2010/03/17/what-is-bitlocker-what-does-it-do-what-does-it-not-do.aspx Occupytheweb. (2013). New Vulnerability & Exploit Unveiled for Windows 7 & Windows 8. Retrieved from Wonderhowto: http://null-byte.wonderhowto.com/forum/new-vulnerability-exploit-unveiled-for-windows-7-windows-8-0149026/ Paul, I. (2014, May 30). A Beginners Guide To BitLocker, Windows Built-in Encryption Tool. Retrieved from Pcworld: http://www.pcworld.com/article/2308725/a-beginners-guide-to-bitlocker-windows-built-in-encryption-tool.html Phifer, L. (2009, October). How to Automate And Apply Microsoft Windows 7 AppLocker rules. Retrieved from TechTarget.com: http://searchmidmarketsecurity.techtarget.com/tip/How-to-automate-and-apply-Microsoft-Windows-7-AppLocker-rules Phifer, L. (2009, September). Understand the pros and cons of Microsoft Windows 7 DirectAccess. Retrieved from Search Mid Market Security: http://searchmidmarketsecurity.techtarget.com/tip/Understand-the-pros-and-cons-of-Microsoft-Windows-7-DirectAccess Prince, B. (2010, May 18). Microsoft Warns of Windows 7 Security Vulnerability. Retrieved from Eweek: http://www.eweek.com/c/a/Security/Microsoft-Warns-of-Windows-7-Security-Vulnerability-733804/ Sharma, G., Kumar, A., & Sharma, V. (2011). Windows Operating System Vulnerabilities. International Journal of Computing and Corporate Research, Volume 1 Issue 3. Shaw, R. (2013, November 22). Windows 7 Exploitation. Retrieved from Infosecinstitute: http://resources.infosecinstitute.com/windows-7-exploitation/ Shimonski, R. J. (2010, March 31). Windows 7 Security Primer (Part 1). Retrieved from Windows Security: http://www.windowsecurity.com/articles-tutorials/misc_network_security/Windows-7-Security-Primer-Part1.html Spam Laws. (2014). Windows 7 Vulnerabilities. Retrieved from Spam Laws: http://www.spamlaws.com/windows7-vulnerabilities.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 words, n.d.)
Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 words. https://studentshare.org/information-technology/1850682-microsoft-windows-7-security-best-practices-and-vunlerabilites
(Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 Words)
Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/information-technology/1850682-microsoft-windows-7-security-best-practices-and-vunlerabilites.
“Microsoft Windows 7 Security Best Practices and Vulnerabilities Research Paper Example | Topics and Well Written Essays - 2750 Words”. https://studentshare.org/information-technology/1850682-microsoft-windows-7-security-best-practices-and-vunlerabilites.
  • Cited: 0 times

CHECK THESE SAMPLES OF Microsoft Windows 7 Security Best Practices and Vulnerabilities

Practical UNIX Security

However, with its widespread adoption, threats and vulnerabilities are also rising.... As the threats and vulnerabilities are infinite, no one can memorize them to take a measured approach, the initial step is to identify the vulnerability type.... The primary objective of CVE is to provide a separate database accessible, to find out all the known threats and vulnerabilities currently, with the help of tools and services.... An organization named CVE (Common vulnerabilities and Exposure) provides a database to search for a particular public known vulnerability....
8 Pages (2000 words) Assignment

Windows 7 Workgroup Consultation for Sally Chu

This paper will serve to define the specifics relating to setting up local users on a windows 7 workgroup network, with a high level of security, as a part of a simulated network technology consultancy for a small business, owned by a Sally Chu.... … windows 7 Workgroup Consultation for Sally Chu.... This paper will serve to define the specifics relating to setting up local users on a windows 7 workgroup network, with a high level of security, as a part of a simulated network technology consultancy for a small business, owned by a Sally Chu....
4 Pages (1000 words) Assignment

The System Administrators of MegaCorp: Security Goals

With this concern, the primary purpose of this paper is to develop, document, and assess best practices for server deployment and administration that would eventually support and enhance the security of Megacorp towards upgrading its new operating system.... The paper "The System Administrators of MegaCorp: security Goals" focuses on the security of network infrastructure.... It is indispensable to conduct security tests before conducting infrastructure....
12 Pages (3000 words) Assignment

Assessment of Technology centric Strategies for information security in an organization

It is a "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today.... This change, together with improvements in computing infrastructure, has exposed new vulnerabilities that simply were not considered before.... [National security Agency] ... The SANS approach promulgates an efficient and cost effective methodology for improving security.... The organization for which he works already had a number of policies, each designed to address a multi-layered approach to IT security such as operations security, physical security and contingency and disaster recovery....
3 Pages (750 words) Essay

Microsoft Systems

Unprotected window share: Attacker uses such vulnerabilities to install tools and malicious software on the target computer.... they look innocent and attractive to make the… After its successful installation it can reach and contrive personal data, can download other malware or can give a hacker access to user's PC (Ghorbani, Lu, & Tavallaee, 2009). Denial of services: some malicious software blocks access Forms of Attack on Microsoft Forms of Attack on Microsoft There are many threats, which poses security danger for Microsoft....
1 Pages (250 words) Assignment

Ethical Hacking

Soup-Dragon to reduce the possibility of access to private data, cause of performance problems, security issues arising from the use of old computers and actions to combat these security issues.... This software is prone to security risks owing to the fact that support of this software ceased since April 8, 2014 (Stamper 2014, p.... Windows XP and Windows 8 have become soft targets because they do not enjoy security patches from Microsoft....
8 Pages (2000 words) Assignment

Design the Office for a Company

Lighting System Security lights are among the best and practical ways the prevention of crime within the office setting.... hellip; The security of a building during its design depends on the type and location of the building and also what needs to be secured in such buildings.... This security must or have to depend on the regulations and codes, their relationship with other building systems, the total cost (initial and maintenance), and its flexibility in the foreseeable needs....
7 Pages (1750 words) Case Study

Security Risks of Enumerating Active Directory

hellip; microsoft windows server active directory is a network directory service used in domain networks of windows and also included in the other popular windows server like windows, windows 2012 as a bunch of processes.... This term paper "security Risks of Enumerating Active Directory" discusses what tools are used for improving and destroying security.... It is used for security in domain networks, like when a user enters the system through username and password, then Active directory checks whether the user is authenticated or not....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us