0% found this document useful (0 votes)
6 views3 pages

System and Network Security Explained

The document outlines key topics in system and network security, including the Windows Registry, settings and configurations, authentication services, cryptography, LDAP, remote access servers, media player control security, API security, and challenges faced by mobile devices. Each section details the purpose, structure, security concerns, and best practices associated with these topics. The emphasis is on understanding vulnerabilities and implementing security measures to protect systems and data.

Uploaded by

avanisapariya1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views3 pages

System and Network Security Explained

The document outlines key topics in system and network security, including the Windows Registry, settings and configurations, authentication services, cryptography, LDAP, remote access servers, media player control security, API security, and challenges faced by mobile devices. Each section details the purpose, structure, security concerns, and best practices associated with these topics. The emphasis is on understanding vulnerabilities and implementing security measures to protect systems and data.

Uploaded by

avanisapariya1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

System and Network Security Topics

Explained
1. Registry
The Registry is a hierarchical database in Microsoft Windows that stores configuration
settings and options for the operating system and installed applications.

- Purpose: Stores user preferences, OS settings, driver info, software configurations.

- Structure: Contains keys and values organized in a tree-like structure (e.g.,


HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER).

- Security Concerns: Improper registry configurations can cause vulnerabilities; malware


may modify registry values for persistence.

2. Settings and Configurations


Settings refer to how software or systems behave, based on user preferences or admin-
defined rules. Configuration is the process of setting up software/system parameters.

- Examples: Turning on a firewall, setting login timeout, encryption options.

- Security Tip: Default settings are often insecure. Always review and adjust configurations
properly.

3. Authentication Service and Security


Authentication verifies the identity of users or systems before granting access.

- Services: Active Directory, LDAP, RADIUS manage and verify identities.

- Methods: Passwords, biometrics, two-factor authentication (2FA/MFA).

- Security Goal: Prevent unauthorized access to systems or data.

- Protocols: Kerberos, OAuth, JWT.

- Risks: Brute-force attacks, credential theft, weak passwords.

4. Cryptography Security
Cryptography secures data through encoding to ensure confidentiality, integrity, and
authentication.
- Types:

* Symmetric (AES): Same key for encryption/decryption.

* Asymmetric (RSA, ECC): Public/private keys.

* Hashing (SHA-256): One-way transformation.

- Uses: Secure web browsing (HTTPS), file encryption, secure messaging.

- Threats: Weak keys, outdated algorithms, improper implementation.

5. Lightweight Directory Access Protocol (LDAP)


LDAP is a protocol used to access and manage distributed directory information such as
user accounts, groups, and resources.

- Uses: Centralized authentication, managing users/devices/services.

- Security: Use LDAP over SSL (LDAPS), restrict anonymous queries, enforce access controls.

6. Remote Access Server (RAS)


A Remote Access Server allows users to connect to a network from remote locations.

- Technologies: VPNs (PPTP, L2TP, SSL-VPN), Remote Desktop, SSH.

- Benefits: Enables remote work or administration.

- Security: Use encryption, enforce strong authentication, monitor connections.

7. Media Player Control Security


Involves securing media applications from vulnerabilities and unauthorized access.

- Threats: Malicious media files, auto-play exploits.

- Best Practices: Disable autoplay, keep media players updated, run in sandbox
environments.

8. Network Application Program Interface (API) Security


Securing APIs that allow software components to communicate over a network.

- Risks: Injection attacks, broken authentication, data leakage.

- Solutions: Use tokens (OAuth, JWT), input validation, access control, API gateways, and
encryption.
9. Challenges Faced by Mobile Devices
Mobile devices face security risks due to portability, always-on connectivity, and app-based
environments.

- Challenges: Device theft, unsecured Wi-Fi, malware, delayed updates, over-permissive


apps.

- Mitigation: Use screen locks, encryption, MDM tools, trusted app sources, and regular
updates.

You might also like