Windows Vista and Trust Worthy Computing

36
WINDOWS VISTA AND TRUSTWORTHY COMPUTING BY S.VIJAY SARADHI

description

 

Transcript of Windows Vista and Trust Worthy Computing

Page 1: Windows Vista and Trust Worthy Computing

WINDOWS VISTA AND TRUSTWORTHY COMPUTING

BYS.VIJAY SARADHI

Page 2: Windows Vista and Trust Worthy Computing

Importance of windows vista

• Started under the initiative called “trustworthy computing” in 2002 by bill gates

• Four major pillars of trusthworthy computing• Security• Privacy• Reliability• Business Integrity

Page 3: Windows Vista and Trust Worthy Computing

DEVELOPMENT OF VISTA

Page 4: Windows Vista and Trust Worthy Computing

SECURE DEVELOPMENT LIFE CYCLE• Security is a core requirement for software vendors, driven by market

forces, and the need to build and preserve widespread trust in computing

• Vista is the First OS from microsoft to completly go through the SDLC

• Principles of SDLC

• Secure by Design

• Secure by Default

• Secure in Deployment

Page 5: Windows Vista and Trust Worthy Computing

Threats and Vulnerabilities Mitigation • Features and technologies providing layered defenses against malicious software

threats and intrusions through a strategy of prevention and isolation

Page 6: Windows Vista and Trust Worthy Computing

Internet Explorer 7 Protected Mode

• Mandatory Integrity Control (MIC). A model in which data can be configured to prevent lower-integrity applications from accessing it.

• Processes are assigned an integrity level in their access token

• User Interface Privilege Isolation (UIPI). Blocks lower-integrity processes from accessing higher-integrity processes.

• Active X control installtions lead to an elevation prompt

Page 7: Windows Vista and Trust Worthy Computing

Working of protected mode

Page 8: Windows Vista and Trust Worthy Computing

USER ACCOUNT CONTROL

AIM OF UAC

Limiting application software to standard user privilage

Controlling the auto elevation of malicous process to higher intergrity level

Verifiying the Digital signatures associated with the software vendor

Page 9: Windows Vista and Trust Worthy Computing

User Account Control

Page 10: Windows Vista and Trust Worthy Computing

WORKING OF UAC

• During a login session token with basic privilage is provided

• Asks for credentials in a Secure Desktop mode

• This is to prevent spoofing of the UI or the mouse by the application requesting elevation.

• Provides defense against Shatter attacks and piggybacking of malware on critical services

Page 11: Windows Vista and Trust Worthy Computing

Secure Desktop Mode

Page 12: Windows Vista and Trust Worthy Computing

UAC PROMPT LEVELS

Page 13: Windows Vista and Trust Worthy Computing

Address space layout randomization

• Preventing an attacker from being able to easily predict target addresses

• Memory addresses are obscured from shell code injected into the system

• Entropy is increased by raising the amount of virtual memory space when the period the randomization occurs over

• Code areas such as library base and main executable need to be discovered exactly

Page 14: Windows Vista and Trust Worthy Computing

ASLR ENFORCEMENT

Page 15: Windows Vista and Trust Worthy Computing
Page 16: Windows Vista and Trust Worthy Computing

DATA EXECUTION PREVENTION

• Prevents an application or service from executing code from a non-executable memory region

• Helps prevent certain exploits that store code via a buffer overflow

• Hardware-enforced DEP enables the NX bit on compatible CPUs in 32-bit Windows and the native support on 64-bit kernels.

• Windows Vista DEP works by marking certain parts of memory as being intended to hold only data

Page 17: Windows Vista and Trust Worthy Computing

DEP ENFORCEMENT

Page 18: Windows Vista and Trust Worthy Computing

BIT LOCKER DRIVE ENCRYPTION

• Addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned personal computers

• Helps mitigate unauthorized data access by enhancing Windows Vista file and system protection

• The most secure implementation of BitLocker leverages the enhanced security capabilities of a Trusted Platform Module (TPM) version.

• TPM works with BitLocker to ensure that a computer running Windows Vista has not been tampered with while the system was offline.

Page 19: Windows Vista and Trust Worthy Computing

WORKING OF BITLOCKER

Page 20: Windows Vista and Trust Worthy Computing

KERNEL PATCH PROTECTION

• Protects the intergrity of Windows Kernel

• Periodical checks ensure the integrity of protected system structures. If a modification is detected, a bug check is initiated and the system is shut down

• Mitigates erratic display of “bluescreen of death” due to buggy software issues

• Protection from rootkits which may embed themselves in the kernel

Page 21: Windows Vista and Trust Worthy Computing

SHELL AND UI ENHANCEMENTS

• WINDOWS AERO

• WINDOWS DRIVER DISPLAY MODEL

• WINDOWS INSTANT SEARCH

Page 22: Windows Vista and Trust Worthy Computing

WINDOWS AERO• Its name is a backronym for Authentic, Energetic, Reflective and Open

• Utilizes the GPU in the system for rendering

• Reliable and seamless display, with none of the weird tearing effects that can mar the other interfaces

• Provides a much more desirable look and feel for the system as a whole by providing Windows flip3D,Windows flip and live thumbnails

Page 23: Windows Vista and Trust Worthy Computing

START MENU USING AERO

Page 24: Windows Vista and Trust Worthy Computing

WINDOWS FLIP ANF FLIP 3D

• Windows Flip and Windows Flip 3D render live thumbnail images of the exact contents of your open windows

• Windows Flip 3D dynamically displays all open windows in a graceful three-dimensional view.

• Flip 3D uses the dimension of visual depth to give you a more comprehensive view of your open windows

• Live taskbar thumbnail images display the actual contents of both windows that are currently open and those that are minimized in the taskbar

Page 25: Windows Vista and Trust Worthy Computing

WINDOWS FLIP 3D

Page 26: Windows Vista and Trust Worthy Computing

WINDOWS FLIP

Page 27: Windows Vista and Trust Worthy Computing

LIVE THUMBNAILS

Page 28: Windows Vista and Trust Worthy Computing

WINDOWS DRIVER DISPLAY MODEL

• Is the graphic driver architecture for video card drivers running Microsoft Windows versions beginning with Windows Vista.

• provides the functionality required to render the desktop and applications using Desktop Window Manager

• Improves the overall reilabilty of desktop composition by off-loading the rendering of windows to the GPU

Page 29: Windows Vista and Trust Worthy Computing

RENDERING BY USING WDDM

Page 30: Windows Vista and Trust Worthy Computing

WINDOWS INSTANT SEARCH• Upon installation,builds an index of the files on a user's hard drive. Once

the indexing is complete, Windows Search is able to use this index to search results more rapidly

• Windows Search also features word-wheeled search (or search-as-you-type).

• It uses property handlers to handle metadata from file formats

Page 31: Windows Vista and Trust Worthy Computing

WINDOWS INSTANT SEARCH

Page 32: Windows Vista and Trust Worthy Computing

ARCHITECTURE OF SEARCH• Windows Search is implemented as a Windows Service which implements

the Windows Search runtime and APIs, as well as acting as host for the index stores and controlling the components.

• the Indexer, which crawls the file system periodically and creates and maintains the index of the data

• The Indexer consists of two components, the Gatherer and the Merger,[9] the Gatherer retrieves the list of URIs that need to be crawled

• the is the job of the Merger to periodically merge the indices

Page 33: Windows Vista and Trust Worthy Computing

ARCHITECTURE

Page 34: Windows Vista and Trust Worthy Computing

CONCLUSION

Windows Vista has become the Harbinger for other OS’es to follow it,by incorporating robust security mechanisms.

It has clearly lived up to its caption of providing ClarityConfidence and Connectivity to its users

Page 35: Windows Vista and Trust Worthy Computing

REFERNCES

• 1. www.msdn.com• 2. www.microsoft.com/technet• 3. www.winsupersite.com• 4. www.symantec.com/vista security• 5. Inside windows vista’s kernel by mark

russionvich• 6.Windows vista’s secrets by paul thurrott

Page 36: Windows Vista and Trust Worthy Computing

THANK YOU