Security Strategies in Windows Platforms and Applications Fourth Edition Shimonski
Visit to download the full and correct content document: https://textbookfull.com/product/security-strategies-in-windows-platforms-and-applicati ons-fourth-edition-shimonski/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Security Strategies In Linux Platforms And Applications
Michael Jang
https://textbookfull.com/product/security-strategies-in-linuxplatforms-and-applications-michael-jang/

From Security to Community Detection in Social Networking Platforms Panagiotis Karampelas
https://textbookfull.com/product/from-security-to-communitydetection-in-social-networking-platforms-panagiotis-karampelas/

Windows Security Internals 1 / converted Edition James Forshaw
https://textbookfull.com/product/windows-securityinternals-1-converted-edition-james-forshaw/

Windows Security Monitoring Scenarios and Patterns 1st Edition Andrei Miroshnikov
https://textbookfull.com/product/windows-security-monitoringscenarios-and-patterns-1st-edition-andrei-miroshnikov/

Clinical research in communication disorders principles and strategies Fourth Edition. Edition Anthony P. Salvatore
https://textbookfull.com/product/clinical-research-incommunication-disorders-principles-and-strategies-fourth-editionedition-anthony-p-salvatore/

Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing 1 / converted Edition James Forshaw
https://textbookfull.com/product/windows-security-internals-adeep-dive-into-windows-authentication-authorization-andauditing-1-converted-edition-james-forshaw/

Management across cultures challenges strategies and skills Fourth Edition Joyce Osland
https://textbookfull.com/product/management-across-cultureschallenges-strategies-and-skills-fourth-edition-joyce-osland/

Contemporary Security Management Fourth Edition David Patterson
https://textbookfull.com/product/contemporary-securitymanagement-fourth-edition-david-patterson/

Windows Security Internals - A Deep Dive into Windows Authentication, Authorization, and Auditing (for True Epub) 1st Edition James Forshaw
https://textbookfull.com/product/windows-security-internals-adeep-dive-into-windows-authentication-authorization-and-auditingfor-true-epub-1st-edition-james-forshaw/



World Headquarters
Jones & Bartlett Learning 25 Mall Road Burlington, MA 01803
978-443-5000
info@jblearning com www jblearning com
Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com.
Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com.
Copyright © 2025 by Jones & Bartlett Learning, LLC, an Ascend Learning Company
All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner.
The content, statements, views, and opinions herein are the sole expression of the respective authors and not that of Jones & Bartlett Learning, LLC. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not constitute or imply its endorsement or recommendation by Jones & Bartlett Learning, LLC and such reference shall not be used for advertising or product endorsement purposes. All trademarks displayed are the trademarks of the parties noted herein. Security Strategies in Windows Platforms and Applications, Fourth Edition is an independent publication and has not been authorized, sponsored, or otherwise approved by the owners of the trademarks or service marks referenced in this product.
There may be images in this book that feature models; these models do not necessarily endorse, represent, or participate in the activities represented in the images Any screenshots in this product are for educational and instructive purposes only. Any individuals and scenarios featured in the case studies throughout this product may be real or fictitious but are used for instructional purposes only.
28201-6
Production Credits
Vice President, Product Management: Marisa R. Urbano
Vice President, Content Strategy and Implementation: Christine Emerton
Sr. Product Manager, Cybersecurity: Ray Chew
Director, Content Management: Donna Gridley
Manager, Content Strategy: Orsolya Gall
Content Strategist: Sara Holloway
Content Coordinator: Samantha Gillespie
Technical Editor: John Shovic
Director, Project Management and Content Services: Karen Scott
Manager, Program Management: Kristen Rogers
Project Manager: Belinda Thresher
Senior Digital Project Specialist: Angela Dooley
Marketing Manager: Mark Adamiak
Content Services Manager: Colleen Lamy
Manufacturing Buyer: Bob Valentine
Composition: Straive
Project Management: Straive
Cover Design: Briana Yates
Text Design: Briana Yates
Media Development Editor: Faith Brosnan
Rights & Permissions Manager: John Rusk
Rights Specialist: Liz Kincaid
Cover Image (Title Page, Part Opener, Chapter Opener): © Ruslan Gi
Printing and Binding: Sheridan–Michigan
Library of Congress Cataloging-in-Publication Data
Names: Shimonski, Robert, author | Solomon, Michael (Michael G ), 1963- author
Title: Security strategies in windows platforms and applications / Rob Shimonski, MS, Capella University, Michael G Solomon, Emory University
Identifiers: LCCN 2023035247 | ISBN 9781284281958 (paperback)
Subjects: LCSH: Microsoft Windows (Computer file) | Computer security.
Classification: LCC QA76.9.A25 S658 2025 | DDC 005.8–dc23/eng/20230823
LC record available at https://lccn.loc.gov/2023035247
6048
Printed in the United States of America
27 26 25 24 23 10 9 8 7 6 5 4 3 2 1

© Ruslan Gi/Shutterstock
Preface
Acknowledgments About the Author
PART I The Microsoft Windows Security Situation
CHAPTER 1 Microsoft Windows and the Threat Landscape
Information Systems Security
Tenets of Information Security: The C-I-A Triad
Confidentiality
Integrity
Availability
Mapping Microsoft Windows and Applications into a Typical IT Infrastructure
Windows Clients
Windows Servers
Microsoft’s End-User License Agreement
Windows Threats and Vulnerabilities
Anatomy of Microsoft Windows Vulnerabilities
CryptoLocker
Locky
WannaCry
PrintNightmare
The Microsoft Response Center
Discovery-Analysis-Remediation Cycle
Discovery
Analysis
Remediation
Common Forms of Attack
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 1 ASSESSMENT
CHAPTER 2 Security in the Microsoft Windows Operating System
Operating System Components and Architecture
The Kernel
Operating System Components
Basic Windows Operating System Architecture
Windows Run Modes
Kernel Mode
User Mode
Access Controls and Authentication
Authentication Methods
Access Control Methods
Security Access Tokens, Rights, and Permissions
Security Identifier
Access Rules, Rights, and Permissions
Users, Groups, and Active Directory
Workgroups
Active Directory
Windows Attack Surfaces and Mitigation
Multilayered Defense
Mitigation
Fundamentals of Microsoft Windows Security Monitoring and Maintenance
Security Monitoring
Identify Vulnerabilities
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 2 ASSESSMENT
PART II Managing and Maintaining Microsoft Windows Security
CHAPTER 3 Access Controls in Microsoft Windows
The Principle of Least Privilege
The Orange Book
Least Privilege and Least Privilege User Accounts
Rights and Permissions
Access Models: Identification, Authentication, Authorization, ACLs, and More
Windows Server 2016, Windows Server 2019, and Windows Server 2022 Dynamic Access Control
User Account Control
Sharing SIDs and SATs
Managed Service Accounts
Kerberos
Windows Objects and Access Controls
Windows DACLs
DACL Advanced Permissions
SIDs, GUIDs, and CLSIDs
Calculating Microsoft Windows Access Permissions
Auditing and Tracking Windows Access
Expression-Based Security Audit Policy (Windows Server 2012 and Newer)
Microsoft Windows Access Management Tools
Cacls exe
Icacls exe
Best Practices for Microsoft Windows Access Control
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 3 ASSESSMENT
CHAPTER 4 Microsoft Windows Encryption Tools and Technologies
Encryption Methods Microsoft Windows Supports
Encrypting File System, BitLocker, and BitLocker To Go
Encrypting File System
BitLocker
BitLocker To Go
Enabling File-, Folder-, and Volume-Level Encryption
Enabling EFS
Enabling BitLocker
Enabling BitLocker To Go
Encryption in Communications
Encryption Protocols in Microsoft Windows
Transport Layer Security
Internet Protocol Security
Virtual Private Network
Wireless Security
Microsoft Windows and Security Certificates
Public Key Infrastructure
Best Practices for Windows Encryption Techniques
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 4 ASSESSMENT
CHAPTER 5 Protecting Microsoft Windows against Malware
The Purpose of Malware
Types of Malware
Virus
Worm
Trojan Horse
Rootkit
Spyware
Adware
Keylogger
Ransomware
Malware Type Summary
Anti-Malware Software
Antivirus Software
Anti-Spyware Software
Malware Mitigation Techniques
Importance of Updating Your Software
Maintaining a Malware-Free Environment
Scanning and Auditing Malware
Tools and Techniques for Removing Malware
Malware Prevention Best Practices
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 5 ASSESSMENT
CHAPTER 6 Group Policy Control in Microsoft Windows
Group Policy and GPOs
Group Policy Settings
GPO Linking
Making Group Policy Conform to Security Policy
Security Responsibility
Security Policy and Group Policy
Group Policy Targets
Types of GPOs in the Registry
Local Group Policy Editor
GPOs in the Registry Editor
Types of GPOs in Active Directory
Group Policy Management Console
GPOs on the Domain Controller
Designing, Deploying, and Tracking Group Policy Controls
GPO Application Order
Security Filters
GPO Windows Management Instrumentation Filters
Deploying Group Policy
Auditing and Managing Group Policy
Group Policy Inventory
Analyzing the Effect of GPOs
Best Practices for Microsoft Windows Group Policy and Processes
Group Policy Design Guidelines
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 6 ASSESSMENT
CHAPTER 7 Microsoft Windows Security Profile and Audit Tools
Profiling Microsoft Windows Security
Profiling
Profiling Windows Computers
Microsoft Baseline Security Analyzer
MBSA Graphical User Interface
MBSA Command-Line Interface
OpenVAS
Nessus Essentials
Burp Suite Web Vulnerability Scanner
Microsoft Windows Security Audit
Microsoft Windows Security Audit Tools
Best Practices for Microsoft Windows Security Audits
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 7 ASSESSMENT
CHAPTER 8 Microsoft Windows Backup and Recovery Tools
Microsoft Windows OS and Application Backup and Recovery
The Need for Backups
The Backup Process
The Restore Process
Workstation, Server, Network, and Cloud Backup Techniques
Workstation Backups
Server Backups
Network Backups
Cloud Backups
Microsoft Windows and Application Backup and Recovery in a Business Continuity Setting
Disaster Recovery Plan
Business Continuity Plan
Where a Restore Fits In
Microsoft Windows Backup and Restore Utility
Restoring with the Windows Backup and Restore Utility
Restoring with the Windows Server Recovery Utility
Rebuilding Systems from Bare Metal
Managing Backups with Virtual Machines
Best Practices for Microsoft Windows Backup and Recovery
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 8 ASSESSMENT
CHAPTER 9 Microsoft Windows Network Security
Network Security
Network Security Controls
Principles of Microsoft Windows Network Security
Common Network Components
Connection Media
Networking Devices
Server Computers and Services Devices
Microsoft Windows Security Protocols and Services
Layered Protocols in Real Life
Securing Microsoft Windows Environment Network Services
Service Updates
Service Accounts
Necessary Services
Securing Microsoft Windows Wireless Networking
Microsoft Windows Workstation Network Security
User Authorization and Authentication
Malicious Software Protection
Outbound Traffic Filtering
Microsoft Windows Server Network Security
Authentication and Authorization
Malicious Software Protection
Network Traffic Filtering
Internal Network and Cloud Security
IPv4 versus IPv6
Cloud Computing
Best Practices for Microsoft Windows Network Security
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 9 ASSESSMENT
CHAPTER 10 Microsoft Windows Security Administration
Security Administration Overview
The Security Administration Cycle
Security Administration Tasks
Maintaining the C-I-A Triad in the Microsoft Windows OS World
Maintaining Confidentiality
Maintaining Integrity
Maintaining Availability
Microsoft Windows OS Security Administration
Firewall Administration
Performance Monitor
Backup Administration
OS Service Pack Administration
Group Policy Administration
DACL Administration
Encryption Administration
Anti-Malware Software Administration
Ensuring Due Diligence and Regulatory Compliance
Due Diligence
Cloud-Based Compliance
The Need for Security Policies, Standards, Procedures, and Guidelines
Best Practices for Microsoft Windows OS Security Administration
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 10 ASSESSMENT
PART III Microsoft Windows Operating System and Application Security Trends and Directions
CHAPTER 11 Hardening the Microsoft Windows Operating System
Understanding the Hardening Process and Mind-set
Strategies to Secure Windows Computers
Install Only What You Need
Security Compliance Toolkit
Manually Disabling and Removing Programs and Services
Hardening Microsoft Windows Operating System Authentication
Hardening the Network Infrastructure
Securing Directory Information and Operations
Hardening Microsoft Windows OS Administration
Hardening Microsoft Servers and Client Computers
Hardening Server Computers
Hardening Workstation Computers
Hardening Data Access and Controls
Hardening Communications and Remote Access
Authentication Servers
VPNs and Encryption
Hardening PKI
Hardening the Microsoft Azure Cloud Platform
User Security Training and Awareness
Best Practices for Hardening Microsoft Windows OS and Applications
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 11 ASSESSMENT
CHAPTER 12 Microsoft Application Security
Principles of Microsoft Application Security
Common Application Software Attacks
Hardening Applications
Securing Key Microsoft Client Applications
Web Browser
Email Client
Productivity Software
File Transfer Software
AppLocker
Securing Key Microsoft Server Applications
Web Server
Email Server
Database Server
Let Microsoft Handle Your Database and Cloud Computing Needs
Enterprise Resource Planning Software
Line of Business Software
Cloud-Based Software
Case Studies in Microsoft Application Security
Best Practices for Securing Microsoft Windows Applications
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 12 ASSESSMENT
CHAPTER 13 Microsoft Windows Incident Handling and Management
Understanding and Handling Security Incidents Involving Microsoft Windows OS and Applications
Real-Life Incidents
Formulating an Incident Response Plan
Formulate Checklists
Plan for Anything That Could Cause Loss or Damage
Build the CSIRT
Plan for Communication
Plan Security
Revision Procedures
Plan Testing
Handling Incident Response
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
Advanced Incident Handling Techniques
Threat Hunting
Automated Incident Handling
Incident Handling and Management Tools for Microsoft Windows and Applications
Investigating Microsoft Windows and Applications Incidents
Acquiring and Managing Incident Evidence
Types of Evidence
Chain of Custody
Evidence Collection Rules
Best Practices for Handling Microsoft Windows OS and Applications Incidents and Investigations
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 13 ASSESSMENT
CHAPTER 14 Microsoft Windows and the Security Life Cycle
Understanding Traditional System Life Cycle Phases
Agile Software Development
DevOps
Managing Microsoft Windows OS and Application Software Security
Developing Secure Microsoft Windows OS and Application Software
Implementing, Evaluating, and Testing Microsoft Windows OS and Application Software
Security
Maintaining the Security of Microsoft Windows OS and Application Software
Microsoft Windows OS and Application Software Revision, Change Management, and Endof-Life Phaseout
Software Development Areas of Difficulty
Software Control
Software Configuration Management
Best Practices for Microsoft Windows and Application Software Development Security Investigations
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 14 ASSESSMENT
CHAPTER 15 Best Practices for Microsoft Windows and Application Security
Basic Rules of Microsoft Windows OS and Application Security
Administrative Best Practices
Technical Best Practices
Audit and Remediation Cycles
Security Policy Conformance Checks
Security Baseline Analysis
OS and Application Checks and Upkeep
Network Management Tools and Policies
Software Testing, Staging, and Deployment
Compliance/Currency Tests on Network Entry
Trends in Microsoft Windows OS and Application Security Management
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 15 ASSESSMENT
APPENDIX A Answer Key
APPENDIX B Standard Acronyms
Glossary of Key Terms
References
Index

© Ruslan Gi/Shutterstock
Preface
This book is part of the Information Systems Security & Assurance Series from Jones & Bartlett Learning (www.jblearning.com). Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.
Part I of this book focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows 11 on the desktop, and Windows Server 2012, 2016, 2019, and 2022 versions. More than 90% of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its wellpublicized vulnerabilities. Part II emphasizes how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. Part III provides a resource for readers and students desiring more information on Microsoft Windows OS hardening, application security, and incident management, among other issues.
Learning Features
The writing style of this book is practical and conversational. Step-by-step examples of information security concepts and procedures are presented throughout the text. Each chapter begins with a statement of learning objectives. Illustrations are used both to clarify the material and to vary the presentation. The text is sprinkled with Notes, Tips, FYIs, Warnings, and sidebars to alert the reader to additional and helpful information related to the
subject under discussion. Chapter Assessments appear at the end of each chapter, with solutions provided in the back of the book. Chapter Summaries are included in the text to provide a rapid review or preview of the material and to help students understand the relative importance of the concepts presented.
Audience
The material is suitable for undergraduate or graduate computer science majors or information science majors, students at a 2-year technical college or community college who have a basic technical background, or readers who have a basic understanding of IT security and want to expand their knowledge.
New to this Edition
This new edition covers the latest versions of the Microsoft Windows operating system, Windows 11, and Windows Server 2022. It also includes updated coverage of industry best practices and tools used to manage Microsoft Windows environments. The Fourth Edition further expands on previous discussions to include more coverage of cloud computing topics, IPv6, and the Internet of Things (IoT). Malware and encryption sections have been completely updated as well to include the latest threats, mitigation techniques, and tools available. In all, the Fourth Edition includes the latest information needed to implement and manage Windows platforms in today’s dynamic environments.
Cloud Labs
This text is accompanied by Cybersecurity Cloud Labs. These hands-on virtual labs provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills as an extension of the
lessons in this textbook. For more information or to purchase access to the labs, visit go.jblearning.com/solomon4e.

© Ruslan Gi/Shutterstock