Win Vista operating system security can analyze _windowsxp

Source: Internet
Author: User
Tags configuration settings
Security is the foundation of Windows Vista architecture. With Windows Vista, you'll be able to connect to any user you want to connect to, and do whatever you want, and believe that Windows Vista guarantees your information and your computer's security.

The security features of Windows Vista prevent newly generated threats, such as worms, viruses, and malware. In the unlikely event of a successful intrusion, Windows Vista ensures that the degree of damage is minimized.

   User Account Protection

  
Windows Vista User Account Protection is a bridge between user and administrative privileges by running an application with a restricted license. When you need to perform administrative tasks such as installing software or drivers, Windows Vista prompts you to determine your intentions, or prompts you to provide credentials.

For example, if you are traveling and downloading a game that is actually a Trojan horse, Windows Vista can prevent this game from performing malicious tasks because the user lacks sufficient permissions to install. When you need to install a printer driver for a hotel printer, Windows Vista prompts you to verify that you are sure you want to install the printer.

This protection is combined with the new protected mode features in Internet Explorer, reducing the impact of viruses, spyware, and other types of malware (collectively, "malware").

   prevent the impact of malware

  
IT departments and individual users spend a lot of time and resources addressing problems caused by malware and attempting to detect and prevent problems before they occur. Windows Vista contains powerful features to prevent, detect, and delete malware before malware causes problems. Results: Improved computer performance, fewer support calls, and improved security.

   protection of lost, stolen or diverted computers

  
Advanced data protection technologies in Windows Vista reduce the risk of data being viewed by unauthorized users on laptops or other computers, even if laptops are lost or stolen.

Windows Vista supports full volume encryption to prevent other operating systems from accessing files from disk. It also stores the key in a trusted platform model (TPM) v1.2 chip. The entire system partition is encrypted, whether it is a dormant file or user data.
Custom validation mechanisms

For many organizations, using user names and passwords to authenticate users is not enough to guarantee the required level of security. Windows Vista has improved Smart card support, which makes it easier for developers to implement custom authentication mechanisms, such as biometric identification and tokens.
 
   Network Access Protection

  
Viruses and worms can attack protected internal networks by mobile computers that have not yet downloaded the latest upgrades, security configuration settings, or virus signatures. Mobile users may be connected to an unprotected network of hotels, airfields or coffee shops where their computers may be infected with malware or viruses. Windows Vista has network access Protection to prevent a compromised computer from connecting to your internal network until it meets your security standards.

   Firewalls

Windows Vista provides outgoing and incoming filtering, which can be centrally managed through Group Policy. This allows administrators to control which applications are allowed to communicate on the network or are prevented from communicating on the network. Controlling network access is one of the most important ways to mitigate security risks.

   Windows Service Enhancements

In the unlikely event that an intruder identifies and exploits a vulnerable service, Windows service enhancements will limit the extent of the damage. It does this by preventing damaged services from changing important configuration settings in the file system or registry or by preventing them from infecting other computers on the network. For example, you can prevent the remote program call (RPC) service from replacing system files or modifying the registry.

   Internet Explorer 7 Enhancements

  
Internet Explorer 7 contains a number of features that can block malicious Web sites and malware. The new protected mode provides the Internet Explorer 7 in Windows Vista with sufficient permissions to browse the Web, but does not have the right to modify user settings or data without user consent.

To prevent phishing (phishing) and spoofing attacks, Internet Explorer 7 performs the following tasks:

• Highlight the Address bar when users access Secure Sockets Layer protected sites and allow them to easily check the legality of site security certificates

• Contains a phishing (phishing) filter that warns users if they are accessing a site that is known to be unsafe

• Allows users to clear all cached data by clicking

With Internet Explorer, users can be more secure and more comfortable browsing

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.