Local security policy Is located In the control panel under Administrative Tools. Local Security policy contains several important utilities including but not limited to: Password policy Account lockout policy Audit polices Password Policy: There are six password policies Enforced password history: allows you to configure the password policy to prevent the user from reusing earlier passwords. Maximum password age: Sets the maximum length of time that a user may use the same password before being forced to change It. Minimum password age : sets the minimum length of time before the user Is lowed to change his password.
Minimum password link: the minimum number of characters required for a password. Password must meet complexity requirements: At least three of the four requirements must be met , upper case letters, lower case letters, numbers and or symbols. Store password using reversible encryption for all users: allows password to be stored in plain text. Account lockout policy: This policy describes how the system will react If someone who is unauthorized tries to access an account. Audit Policies have nine selections to choose from, these selections are designed to protect your computer from hackers, . 3 Encryption: a method of encoding sensitive data and keeping secure from unauthorized users.
Traditional encryption methods only contained a single key, while more modern methods contain a public and private key. Once the data has been encrypted only the key holder may gain access. One other Individual may gain access known as a recovery agent. Recovery agent: is a person who can use his key to access encrypted files only during emergencies Encryption requires a public key Decryption requires a private key Data may encrypted by accessing the properties of the file or folder to be protected. 04: File sharing and permissions: How to access: Go to the tools menu Open folder options Click view tabs Right click projects Go to sharing and security Choose share with all or none Close tab. Back to folder options and deselect use simple file sharing.
Once selected you will have more control over sharing . You can select the maximum and minimum number of selected connections. Permissions: There are two types of permissions to choose from. Share permissions 1 OFF permission.
If you click the security tab you can give specific users access to this folder.And at the bottom of the page you can control what kind of access the user will have. Deny - Inheritance If you deny a user permission it will override any other permission that the user might be given Inheritance means any permissions granted to the parent folder will be inherited by any child objects inside that folder. Computer management access: Right click Select manage Open up shared folders and look at shares Administrative shares may only visible by administrators Network Cable: A Shared folder viewed over the network instead of locally. 5. 06Wireless Security: Wireless access devices may communicate directly or through an access point.
When two wireless devices com directly with each other it is called ad hoc mode Most wireless com use a WAP Meaning wireless access point. It creates a hotshot to which anyone within range may use the AP unless the security features have been enabled. SAID-Service Set Identifier : its set to broadcast the presence to any Wap . Disabling this will hide your AP from unauthorized users.
You may also filter MAC addresses: Create a list of MAC addresses that are allowed to connect to your WAP. No two MAC addresses are the same.Enable MAC filtering you can create a list of computers that can connect while blocking out all others. You may also change your password or SAID DDCD addresses need to be disabled and then assign a Static IP to devices making it harder for hackers to access. Encryption: 3 types WEEP(wired equivalent privacy) WAP(WI Fl protected access) WPAD(Wi If protected access 2) WEEP: Uses either 64 or 128 bit encryption, The encryption key is static which may be easy for someone to hack. WAP: Requires surname and password and uses a yeoman encryption key that changes periodically making it way more secure.