🛡️

Secure Your System in 45 Minutes

Learn the 5 essential security techniques I used to place 3rd in the New Jersey CyberPatriot competition. Step-by-step guides for encryption, audit logs, password policies, and more.

Beginner-Friendly
Competition-Tested
Windows & Linux
Troubleshooting Included
01
Beginner

BitLocker Encryption

Protect your data from physical theft with full disk encryption. BitLocker encrypts your entire drive, making it impossible to access your data without the proper credentials.

How to Enable:

  • Open Control Panel → System and Security → BitLocker Drive Encryption
  • Click "Turn on BitLocker" for your system drive (usually C:)
  • Choose how to unlock your drive at startup (password or USB key)
  • Save or print your recovery key (IMPORTANT - store safely!)
  • Choose encryption mode (New encryption for new disks, Full for existing)
  • Click "Start encrypting" and wait for completion
# Check BitLocker status (PowerShell)
manage-bde -status

# Enable BitLocker via command line
manage-bde -on C: -RecoveryPassword
⚠️
Important: Always save your recovery key in a safe place! Without it, you cannot access your data if you forget your password.
02
Intermediate

Audit Logs & Monitoring

Monitor system security events to detect unauthorized access, failed login attempts, and suspicious activity. Audit logs are essential for identifying security breaches.

Windows Event Viewer:

  • Press Win + X and select "Event Viewer"
  • Navigate to Windows Logs → Security
  • Look for Event IDs: 4625 (failed login), 4648 (explicit credentials), 4720 (user created)
  • Filter logs by date and event type for easier analysis
  • Export important logs for documentation

Linux Audit:

# View authentication logs
sudo tail -f /var/log/auth.log

# Check failed login attempts
sudo grep "Failed password" /var/log/auth.log

# Monitor real-time logs
sudo journalctl -f
💡
Pro Tip: Set up email alerts for critical security events using Task Scheduler (Windows) or cron jobs (Linux).
03
Beginner

Strong Password Policies

Enforce strong password requirements to prevent brute force attacks and unauthorized access. Weak passwords are the #1 security vulnerability in most systems.

Best Practices:

  • Minimum 12 characters (14+ recommended)
  • Mix of uppercase, lowercase, numbers, and symbols
  • No dictionary words or personal information
  • Unique password for each account
  • Enable password expiration (60-90 days)
  • Use a password manager (Bitwarden, 1Password, KeePass)

Windows Group Policy:

# Open Local Security Policy
secpol.msc

# Navigate to:
Account Policies → Password Policy

# Set:
- Minimum password length: 12
- Password must meet complexity: Enabled
- Maximum password age: 90 days
- Enforce password history: 24 passwords
04
Intermediate

Firewall Configuration

Configure your firewall to block unauthorized network connections and allow only necessary traffic. A properly configured firewall is your first line of defense against network attacks.

Windows Firewall:

  • Open Windows Defender Firewall → Advanced Settings
  • Enable firewall for Domain, Private, and Public profiles
  • Block all inbound connections by default
  • Create rules for specific applications only
  • Disable unnecessary Windows services
  • Review and remove unused rules regularly

Linux UFW (Ubuntu):

# Enable firewall
sudo ufw enable

# Set default policies
sudo ufw default deny incoming
sudo ufw default allow outgoing

# Allow specific services
sudo ufw allow ssh
sudo ufw allow 80/tcp # HTTP
sudo ufw allow 443/tcp # HTTPS

# Check status
sudo ufw status verbose
⚠️
Warning: Be careful not to lock yourself out! Always keep SSH or remote desktop access rules active if managing remotely.
05
Intermediate

Remove Unauthorized Users & Software

Regularly audit user accounts and installed software to remove unauthorized or unnecessary items. This reduces your attack surface and prevents privilege escalation.

User Account Audit:

  • Review all user accounts in Computer Management → Local Users and Groups
  • Remove guest accounts and temporary users
  • Disable default Administrator account (create new admin instead)
  • Verify users belong to appropriate groups (avoid giving everyone admin)
  • Check for accounts with passwords that never expire

Software Audit:

  • Open Control Panel → Programs and Features
  • Remove games, media players, and unnecessary software
  • Uninstall remote access tools (TeamViewer, VNC) unless needed
  • Remove old software versions (keep only latest)
  • Check startup programs (Task Manager → Startup)
# Windows: List all users
net user

# Remove a user
net user [username] /delete

# Linux: List all users
cat /etc/passwd

# Remove a user and their home directory
sudo userdel -r [username]

# List installed packages (Ubuntu)
dpkg --list
💡
Pro Tip: Document all changes you make! Keep a log of removed users and software for accountability and troubleshooting.

Need More Help?

Check out the troubleshooting guide for common issues or reach out if you have questions.