5

Created by

Neal S. Alberson Jr

TOPIC: Microsoft Windows Security

GRADE LEVELS:  9-10 Grade

LESSON DURATION:  2 or 3 85 minute classes (includes wrap-up discussion and summative assessment review.

SOFT SKILLS: Critical Thinking, Collaboration, Communications

Learning Outcome: Students will know with high certainty how to evaluate and secure a local computer running Microsoft Windows as its operating system.

Standards of Learning:

  • Verso 6302-77 Discuss how data can be compromised, corrupted, or lost.
  • Verso 6302-82 – Evaluate the potential vulnerabilities, threats, and common exploits to an operating system.
  • Verso 6302-84 – Describe the concept of malware & techniques to guard against it.
  • Verso 6302-85 – Evaluate critical operating system security parameters

Materials: Windows 7 or 10 computer, note taking system, visual content organizer of student’s choice

Activities:  Students will complete the following:

  1. Class will review as a group the manners in which computers and the information on them can be compromised and by whom.
  2. Class discussion on how a single Windows computer can have layered protection.  How does layering protect against malware, viruses, data loss or corruption, etc.
  3. Class will review the various techniques used to hack into stand-alone computers.
  4. Class thoughts on the security issues in using thumb drives, CD/DVD disks, public chat rooms, WiFi packet substitutions, etc. in intrusions, data theft, virus/worm attacks, system denial, etc.
  5. Individual students will access the computer’s Control Panel, observe the User Account list for appropriate rights, determine the highest level of rights possible/practical for each user group.  When should a user account be eliminated?
  6. In small groups, students will examine password parameters. For the following:
    1. How complex should a password be?
    2. How long should a password exist before it must be changed?
    3. Is there a minimum time between password changed?
    4. Is there a minimum length of a password?
    5. Is there a minimum complexity (caps, lowercase, numbers, special characters, etc.) for a password?
    6. What parameters of the computer determine the above?
  7. Students will got to “How Strong is My Password?” to examine the strength of their passwords.
  8. Select two of the programs on the computer normally used by students.  Examine the properties for those programs and decide whether they are appropriate for students.  These will be defended in class.
  9. Consider the AIC triangle (availability, integrity, confidentiality).  How do the student evaluations support or deny the triangle?
  10. How often should virus detection be updated?
  11. Looking at the computer’s control panel > security; should the computer’s firewall operate on a Whitelist or Blacklist for allowed sites?  What other parameters should the firewall have and why?
  12. How should updates for Microsoft Windows and other programs be looked for and handled?
  13. Students will give oral reports using worksheets displayed on classroom screen(s).

Enrichment/Follow-up:  Students will transition to examining security from a network standpoint.  Those wishing to do so can also examine the security provided for Apple Macs, Linux, RISC O.S., etc.

Assignment Rubric:

  1. (5 – 100% completed form, 4-95%, 3-90%, 2-85%, 1-80%, 0-less than 80% complete) Students will complete a minimum of the 80% of the assigned worksheet (see below) within the assigned duration.  Each student shall complete their own worksheet.
  2. (5 – no misspellings, very readable, 4- readable with less than four misspellings, 3 readable with few problems and fewer than six misspellings, 2 – readable with comprehension difficulties and fewer than eight misspellings, 1 – barely readable or ten or less misspellings, 0 – difficult to comprehend and many misspelled words.)  Students will have checked for spelling and grammar mistakes. No more than five mistakes.
  3. (5 -ready on time, 4 – ready during same class period called for, 3 – ready next class, 2 – ready after two class periods, 0 – not turned in as required). Students will complete the data sheet (see below) detailing their findings while investigating the local Windows environment (this will be a part of their summative assessment).
  4. (5 – extremely understandable and complete, 4- very understandable, 3 – understandable, 2 – understandable with few questions, 1- understandable with few incorrect answers, 0 – not understandable, incomplete, incorrect answers) Individual students will be asked to display their datasheet to the class using Interclass system for discussion purposes.

 

Sample of Completed Assignment (indicating mastery)

  1.  List at least five ways computers and their data can be compromised or made unusable.

Possible responses:

  1. Data removed from machine,
  2. Access to computer denied,
  3. access to data denied (scrambled – ransomware),
  4. access to the computer denied (locked room, etc.),
  5. remove electrical power,
  6. file encrypted legitimately,
  7. data moved to another location,
  8. loss of computer credentials, etc.

 

  1.  List at least five layers of protection a stand-alone (not attached to a LAN) computer can benefit from, including physical, electrical, and software layers.

Possible responses:

  1. Computer protected in a locked room,
  2. Electrical power switch locked (key required),
  3. Log-in credentials,
  4. Have data on an external drive that has controlled access,
  5. Password required to decrypt data,
  6. Limit rights to individual files/folders,
  1.  List several ways a computer can have its data unethically made unavailable to the intended users.

Possible responses:

  1. Remove data from computer,
  2. deny access,
  3. encrypt data, scramble File Allocation Table (FAT),
  4. Limit rights to file.
  1. How could devices such as thumb drives, homemade CD/DVD disks, public hotspots, etc. be used to deny a user access to a local computer?

Possible response: Such devices could possess viruses/worms, malware to format drives, erase or manipulate specific folders, create a ransomware timebomb, disable a specific port, etc.

Access the computers Control Panel (Windows-Key + I) > Accounts and examine the rights different users have.  Complete the following chart by placing an “X” in the boxes that indicate appropriate rights for the users listed.  Briefly describe anything you find that you may disagree with.

Rights –>

Potential Users

Complete Control

Change Global Settings

Install Programs

Control User Account Control

Run Progs.

Change own account

Other?

Administrator X X X X X X
Intelligent User X X X
Young Child X
  1.  Consider the fact that you are in charge of ensuring the security of the computer.  You must allow multiple users to have access to the data they have stored on it. Answer the following questions the way you would require them.  Do NOT look at any site for recommendations until you have given your own answers.

Parameter

Your Answer

Recommendations

1 How complex should a password be? Depends on the security level required. See below
2 How often should you change passwords? 4-12 changes per year
3 What is the minimum time required between password changes? 2 days minimum
4 How many characters should a password have (at a minimum, at a maximum) 8 to 24 characters
5 What character groups should be included in a password? Upper. Lower, numbers, symbols
6 What elements help determine how complex a password needs to be (answer below)?

The more critical the working environment, the more complex the password should be.  Two-factor authentication including possible biometrics or RSA token for highly classified environments.  A three year old need far less security than a nuclear physicist.

 

  1.  Go to the following website, http://password-checker.online-domain-tools.com/, or https://random-ize.com/how-long-to-hack-pass/  and test one or more of your passwords.  How long will it take to discover your password?  What changes do you need to make to your passwords to make them more resistant to a brute-force or dictionary attack?   (Open discussion question with a wide range of answers)
  2.  Research the password parameter recommendations for either NIST or Microsoft.  List them in the space provided below.

NIST indicates a password should be complex but easy to remember.  They now recommend using the first letters of a familiar phrase or song line, etc. as the password. Furthermore, they recommend:

 

  • Remove periodic password change requirements

 

  • Drop the algorithmic complexity song and dance

 

  • Require screening of new passwords against lists of commonly used or compromised passwords

 

 

 

Microsoft holds to the recommendations listed in number 5 above.

  1. Choose an icon on the Windows desktop.  Right click on the icon, click on “Properties” and “General” tab then the “Security” tab.  What do the following terms found there mean?
  1. Read Only – User can read and use but not save data or use Save-As
  2. Hidden – User cannot see file and will not know it exists.
  3. Full Control – User can use, modify, use Save-as, and delete file
  4. Modify – User can read, change file and use “Save-as” but not delete.
  5. Read and execute – User can use and execute any macro’s in file
  6. Read – Can read file, not use executable macro’s, can use “Save-as”.
  7. Write – Can generate new files, modify existing files, use “Save-as”, but not delete an existing file.

 

  1.  Consider the “Availability – Integrity – Confidentiality” security triangle.  Describe how the above seven questions help reinforce the triangle. (Open discussion question with a wide range of answers)
  2.  How often should virus detection software be updated?  How can you tell when your system dictionary was last updated?  Virus definitions updated as soon as a new dictionary becomes available (automatic updates).  Look at the virus detector’s properties to see the last dictionary update date and time
  1.  Examine the inbound and outbound rules for the computer’s firewall.  Examine the Protocol and Port parameters on the “Inbound” and “Outbound” rules.  Do you see any correlations? What are the advantages of a firewall working from a “Blacklist” of sites, versus a “Whitelist” of sites?

(looking for the students to notice that certain program types (HTTP, mail, use specific ports – refer to https://www.webopedia.com/quick_ref/portnumbers.asp for a list of comonly used ports.

“Blacklists” are sites that are stopped by the firewall/virus software.  “Whitelists” are sites that will be allowed past the firewall/virus software.  Only those sites on the Whitelist will be allowed. Blacklists make not be complete at any one time allowing harmful URL material into a computer but are less frustrating to the user.  Whitelists are generally safer to use but may not have all the “nice” URLs a user may need to visit and thus are much more frustrating.

  1.  How often should you look for software updates?  Is it sufficient to allow ALL programs to tell you about updates?   Software – notify the user an update exists but let the user decide when/if to install it.  If possible, never be a “Beta” tester for an update and it is wise to look for user comments on major upgrades due to possible “Zero-Day” and incompatibilities with other software on the system.

Blank Form Follows:

  1.  List at least five ways computers and their data can be compromised or made unusable.

______________________________________________________________________________    ______________________________________________________________________________ ______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

  1.  List at least five layers of protection a stand-alone (not attached to a LAN) computer can benefit from, including physical, electrical, and software layers.

______________________________________________________________________________

______________________________________________________________________________     ______________________________________________________________________________

______________________________________________________________________________     ______________________________________________________________________________

  1.  List several ways a computer can have its data made unavailable to the intended users.

______________________________________________________________________________

______________________________________________________________________________     ______________________________________________________________________________ ______________________________________________________________________________     ______________________________________________________________________________

  1. How could devices such as thumb drives, homemade CD/DVD disks, public hotspots, etc. be used to deny a user access to a local computer?

 

  1.  Access the computers Control Panel (Windows-Key + I) > Accounts and examine the rights different users have.  Complete the following chart by placing an “X” in the boxes that indicate appropriate rights for the users listed.  Briefly describe anything you find that you may disagree with.

Rights –>

Potential Users

Complete Control

Change Global Settings

Install Programs

Control User Account Control

Run Progs.

Change own account

Other?

Administrator
Intelligent User
Young Child
  1.  Consider the fact that you are in charge of ensuring the security of the computer.  You must allow multiple users to have access to the data they have stored on it. Answer the following questions the way you would require them.  Do NOT look at any site for recommendation until you have given your own answers.

Parameter

Your Answer

Recommendations

1 How complex should a password be?
2 How often should you change passwords?
3 What is the minimum time required between password changes?
4 How many characters should a password have (at a minimum, at a maximum)
5 What character groups should be included in a password?
6 What elements help determine how complex a password needs to be (answer below)?

 

  1.  Go to the following website, http://password-checker.online-domain-tools.com/, or https://random-ize.com/how-long-to-hack-pass/  and test one or more of your passwords.  How long will it take to discover your password?  Do you need to make any password safer against a brute-force or dictionary attack?
  1.  Research the password parameter recommendations for either NIST or Microsoft.  List them in the space provided below.

 

  1. Choose an icon on the Windows desktop.  Right click on the icon, click on “Properties” and “General” tab then the “Security” tab.  What do the following terms found there mean?
  2.   Read Only
  3.   Hidden
  4.   Full Control
  5.   Modify
  6.   Read and execute
  7.   Read
  8.   Write

 

  1.  Consider the “Availability – Integrity – Confidentiality” security triangle.  Describe how theabove seven questions help reinforce the triangle.
  1.  How often should virus detection software be updated?  How can you tell when your system dictionary was last updated?
  1.  Examine the inbound and outbound rules for the computer’s firewall.  Examine the Protocol and Port parameters on the “Inbound” and “Outbound” rules.  Do you see any correlations? What are the advantages of a firewall working from a “Blacklist” of sites, versus a “Whitelist” of sites?
  1.  How often should you look for software updates?  Is it sufficient to allow ALL programs to tell you about updates?

 

© 2018 Teach Cyber

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

License

Icon for the Creative Commons Attribution 4.0 International License

GenCyber Lesson Plans Copyright © 2018 by Neal S. Alberson Jr is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book