Enhancing the Security of a Device
Security services are an essential part of a modern operating system (OS). Communication services, user applications, file systems and data store, and Internet services all require protection for sensitive information.
In this Section
- Create a Trusted Environment
Explains how to designate a module as trusted or untrusted when certifying applications. The kernel uses this information to prevent unauthorized applications from loading or to limit access to the system. - Secure Your Communications Network
Provides an overview of mitigation techniques for securing network communications. - Secure Your Wireless Network
Provides an overview of mitigation techniques for securing a wireless network. - Use Authentication
Provides a list of best practices for using authentication. This topic also provides an overview of the Security Support Provides Interface (SSPI) and the security providers that are included in Platform Builder. - Use Credential Manager
Describes the functionality of Credential Manager. - Use SSL to Enhance Security of Network Communication
Provides a brief overview of the Secure Sockets Layer (SSL) protocols that are supported. - Encrypt Data Using CryptoAPI
Describes the cryptography interface that Platform Builder provides. This topic provides lists of some best practices for using cryptography. - Use the Protected Store API
Describes the CryptProtectData and CryptUnprotect data functions. - Generate Random Data Securely
Describes the CryptGenRandom function. - Isolate Sensitive Data in a Smart Card
Provides an overview of the smart card support. - Practice Secure Coding Techniques
Provides a brief description the buffer overrun issues. This topic also describes the book, Writing Secure Code, by Michael Howard and David LeBlanc.
Last updated on Wednesday, April 13, 2005
© 2005 Microsoft Corporation. All rights reserved.