Windows technical hardening against the most prevalent threats

Tutkielmassa selvitettiin tärkeimpiä Windowsin suojausmenetelmiä kaikkein yleisimpiä kyberuhkia vastaan. Tavoitteena oli tunnistaa tämän hetken tärkeimmät ja yleisimmät kyberuhat ja löytää sopivat Windowsin tietoturvakontrollit vastaamaan näihin uhkiin. Tutkimuskysymyksiksi asetettiin ”Mitä ovat täm...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Numminen, Aleksanteri
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Pro gradu
Kieli:eng
Julkaistu: 2023
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/87270
_version_ 1826225752681480192
author Numminen, Aleksanteri
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Numminen, Aleksanteri Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Numminen, Aleksanteri Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Numminen, Aleksanteri
datasource_str_mv jyx
description Tutkielmassa selvitettiin tärkeimpiä Windowsin suojausmenetelmiä kaikkein yleisimpiä kyberuhkia vastaan. Tavoitteena oli tunnistaa tämän hetken tärkeimmät ja yleisimmät kyberuhat ja löytää sopivat Windowsin tietoturvakontrollit vastaamaan näihin uhkiin. Tutkimuskysymyksiksi asetettiin ”Mitä ovat tämän hetken yleisimmät kyberuhkien käyttämät taktiikat?” ja ”Mitä ovat tärkeimmät tietoturvakontrollit Windowsissa yleisimpiä uhkia vastaan suojautuessa?”. Tutkimus toteutettiin konstruktiivisena tutkimuksena. Tutkimuksen ongelma on se, että organisaatiot eivät tiedä, mihin Windowsin suojausmekanismeihin tulisi keskittää resurssit. Lopputuloksena konstruktiivisella tutkimuksella on kehittää lista suojausmekanismeista, joihin resurssit tulisi keskittää suojautuakseen yleisimmiltä kyberuhilta. Viitekehyksenä tutkielmassa käytettiin laajalti käytettyä ja tunnettua MITRE ATT&CK Enterprise matriisia, joka sisältää kattavan listan kyberuhkatoimijoiden käyttämistä tekniikoista ja tekniikoiden yläkategorioista eli taktiikoista. MITRE ATT&CK viitekehys käytiin läpi syvällisemmin omassa teorialuvussaan. Tämän hetken yleisempien uhkien analyysissä valittiin kolme tunnettua viime aikoina laadittua raporttia tämän hetken kyberuhkakuvista. Raporteista pystyttiin tunnistamaan yleisimmin käytetyt MITRE ATT&CK taktiikat, joista yhteensä kuuteen kaikki raportit viittasivat: Initial Access, Execution, Credential Access, Lateral Movement, Command and Control ja Impact. Nämä kuusi valittiin jatkoanalyysiin. Myös Windowsin tekninen tietoturva käytiin läpi omana lukunaan, jonka perusteella pystyttiin valita sopivia tietoturvakontrolleja. Kuutta yleisimmin käytettyä taktiikkaa käytiin läpi tekniikoidensa puolesta sisältöluvussa. Jokaiselle tekniikalle pyrittiin löytämään sopiva tietoturvakontrolli Windowsissa. Tutkimuksen lopputuloksena tärkeimmät tietoturvaominaisuudet, jotka kattavat mahdollisimman monta tekniikkaa valituista taktiikoista, ovat Windowsin palomuuri, Windows Defender virustorjunta, sovellusten suorituksen rajoittaminen AppLocker tai Windows Defender Application Control -ominaisuuksilla, käyttöoikeuksien rajaaminen ja Attack Surface Reduction -säännöstö. This thesis identified the most essential hardening measures in Windows to combat the current most prevalent threats. The goal was set to identify the tactics used by the current most prevalent threats and to identify the suitable security controls in Windows to answer these threats. The research questions were set to “What are the tactics used by the current most prevalent threats?” and “What are the most important security controls that should be hardened in Windows to be protected against the most prevalent threats?” The research method in this thesis is constructive, where the identified problem is that organizations do not know on which Windows security features to focus their resources. The outcome of the research is to figure out a list of the most important security mechanisms in Windows that an organization should focus on to be protected against the most prevalent threats. A widely known and used framework MITRE ATT&CK Enterprise matrix was used for the research. The framework contains the techniques used by known threat actors and tactics, which are the categories for the techniques. MITRE ATT&CK was examined closer in its own chapter. Three current threat landscape reports were chosen for the analysis of tactics used by the current most prevalent threats. The MITRE ATT&CK tactics were identified from those reports. Six of the tactics, Initial Access, Execution, Credential Access, Lateral Movement, Command and Control, and Impact, were selected for further analysis as they were referenced by all the reports. Windows technical hardening was also examined in its own chapter to form an understanding of the available Windows security features. The six most used tactics most used by threat actors were examined closer in the actual content chapter, where each technique within those tactics were examined. The attempt was to find suitable security features in Windows to mitigate each of the techniques. As an outcome, five security features were identified that covered the largest number of MITRE ATT&CK techniques. They were Windows Firewall, Windows Defender antivirus, application allowlisting using AppLocker or Windows Defender Application Control, access control and user rights, and Attack Surface Reduction rules.
first_indexed 2023-05-29T20:20:30Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Numminen, Aleksanteri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-05-29T07:23:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-05-29T07:23:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/87270", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielmassa selvitettiin t\u00e4rkeimpi\u00e4 Windowsin suojausmenetelmi\u00e4 kaikkein yleisimpi\u00e4 kyberuhkia vastaan. Tavoitteena oli tunnistaa t\u00e4m\u00e4n hetken t\u00e4rkeimm\u00e4t ja yleisimm\u00e4t kyberuhat ja l\u00f6yt\u00e4\u00e4 sopivat Windowsin tietoturvakontrollit vastaamaan n\u00e4ihin uhkiin. Tutkimuskysymyksiksi asetettiin \u201dMit\u00e4 ovat t\u00e4m\u00e4n hetken yleisimm\u00e4t kyberuhkien k\u00e4ytt\u00e4m\u00e4t taktiikat?\u201d ja \u201dMit\u00e4 ovat t\u00e4rkeimm\u00e4t tietoturvakontrollit Windowsissa yleisimpi\u00e4 uhkia vastaan suojautuessa?\u201d.\nTutkimus toteutettiin konstruktiivisena tutkimuksena. Tutkimuksen ongelma on se, ett\u00e4 organisaatiot eiv\u00e4t tied\u00e4, mihin Windowsin suojausmekanismeihin tulisi keskitt\u00e4\u00e4 resurssit. Lopputuloksena konstruktiivisella tutkimuksella on kehitt\u00e4\u00e4 lista suojausmekanismeista, joihin resurssit tulisi keskitt\u00e4\u00e4 suojautuakseen yleisimmilt\u00e4 kyberuhilta. Viitekehyksen\u00e4 tutkielmassa k\u00e4ytettiin laajalti k\u00e4ytetty\u00e4 ja tunnettua MITRE ATT&CK Enterprise matriisia, joka sis\u00e4lt\u00e4\u00e4 kattavan listan kyberuhkatoimijoiden k\u00e4ytt\u00e4mist\u00e4 tekniikoista ja tekniikoiden yl\u00e4kategorioista eli taktiikoista. MITRE ATT&CK viitekehys k\u00e4ytiin l\u00e4pi syv\u00e4llisemmin omassa teorialuvussaan.\nT\u00e4m\u00e4n hetken yleisempien uhkien analyysiss\u00e4 valittiin kolme tunnettua viime aikoina laadittua raporttia t\u00e4m\u00e4n hetken kyberuhkakuvista. Raporteista pystyttiin tunnistamaan yleisimmin k\u00e4ytetyt MITRE ATT&CK taktiikat, joista yhteens\u00e4 kuuteen kaikki raportit viittasivat: Initial Access, Execution, Credential Access, Lateral Movement, Command and Control ja Impact. N\u00e4m\u00e4 kuusi valittiin jatkoanalyysiin. My\u00f6s Windowsin tekninen tietoturva k\u00e4ytiin l\u00e4pi omana lukunaan, jonka perusteella pystyttiin valita sopivia tietoturvakontrolleja.\nKuutta yleisimmin k\u00e4ytetty\u00e4 taktiikkaa k\u00e4ytiin l\u00e4pi tekniikoidensa puolesta sis\u00e4lt\u00f6luvussa. Jokaiselle tekniikalle pyrittiin l\u00f6yt\u00e4m\u00e4\u00e4n sopiva tietoturvakontrolli Windowsissa. Tutkimuksen lopputuloksena t\u00e4rkeimm\u00e4t tietoturvaominaisuudet, jotka kattavat mahdollisimman monta tekniikkaa valituista taktiikoista, ovat Windowsin palomuuri, Windows Defender virustorjunta, sovellusten suorituksen rajoittaminen AppLocker tai Windows Defender Application Control -ominaisuuksilla, k\u00e4ytt\u00f6oikeuksien rajaaminen ja Attack Surface Reduction -s\u00e4\u00e4nn\u00f6st\u00f6.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis identified the most essential hardening measures in Windows to combat the current most prevalent threats. The goal was set to identify the tactics used by the current most prevalent threats and to identify the suitable security controls in Windows to answer these threats. The research questions were set to \u201cWhat are the tactics used by the current most prevalent threats?\u201d and \u201cWhat are the most important security controls that should be hardened in Windows to be protected against the most prevalent threats?\u201d\nThe research method in this thesis is constructive, where the identified problem is that organizations do not know on which Windows security features to focus their resources. The outcome of the research is to figure out a list of the most important security mechanisms in Windows that an organization should focus on to be protected against the most prevalent threats. A widely known and used framework MITRE ATT&CK Enterprise matrix was used for the research. The framework contains the techniques used by known threat actors and tactics, which are the categories for the techniques. MITRE ATT&CK was examined closer in its own chapter.\nThree current threat landscape reports were chosen for the analysis of tactics used by the current most prevalent threats. The MITRE ATT&CK tactics were identified from those reports. Six of the tactics, Initial Access, Execution, Credential Access, Lateral Movement, Command and Control, and Impact, were selected for further analysis as they were referenced by all the reports. Windows technical hardening was also examined in its own chapter to form an understanding of the available Windows security features.\nThe six most used tactics most used by threat actors were examined closer in the actual content chapter, where each technique within those tactics were examined. The attempt was to find suitable security features in Windows to mitigate each of the techniques. As an outcome, five security features were identified that covered the largest number of MITRE ATT&CK techniques. They were Windows Firewall, Windows Defender antivirus, application allowlisting using AppLocker or Windows Defender Application Control, access control and user rights, and Attack Surface Reduction rules.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-05-29T07:23:55Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-05-29T07:23:55Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "61", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "most prevalent cyber threats", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hardening", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "security features", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Windows technical hardening against the most prevalent threats", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202305293330", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Windows", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber attacks", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Windows", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_87270
language eng
last_indexed 2025-02-18T10:55:04Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/6b9d7add-46b9-46dc-a17e-02079b2c08e5\/download","text":"URN:NBN:fi:jyu-202305293330.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Numminen, Aleksanteri Windows technical hardening against the most prevalent threats most prevalent cyber threats hardening security features Kyberturvallisuus 601 verkkohyökkäykset Windows tietoturva kyberturvallisuus cyber attacks data security cyber security
title Windows technical hardening against the most prevalent threats
title_full Windows technical hardening against the most prevalent threats
title_fullStr Windows technical hardening against the most prevalent threats Windows technical hardening against the most prevalent threats
title_full_unstemmed Windows technical hardening against the most prevalent threats Windows technical hardening against the most prevalent threats
title_short Windows technical hardening against the most prevalent threats
title_sort windows technical hardening against the most prevalent threats
title_txtP Windows technical hardening against the most prevalent threats
topic most prevalent cyber threats hardening security features Kyberturvallisuus 601 verkkohyökkäykset Windows tietoturva kyberturvallisuus cyber attacks data security cyber security
topic_facet 601 Kyberturvallisuus Windows cyber attacks cyber security data security hardening kyberturvallisuus most prevalent cyber threats security features tietoturva verkkohyökkäykset
url https://jyx.jyu.fi/handle/123456789/87270 http://www.urn.fi/URN:NBN:fi:jyu-202305293330
work_keys_str_mv AT numminenaleksanteri windowstechnicalhardeningagainstthemostprevalentthreats