Unit OS7: Security 7.4. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze.

Slides:



Advertisements
Similar presentations
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS1: Overview of Operating Systems 1.1. Windows.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
© Neeraj Suri EU-NSF ICT March 2006 Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Zoltán Micskei
© Neeraj Suri EU-NSF ICT March 2006 Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Zoltán Micskei
计算机系 信息处理实验室 Lecture 11 Security
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
A Comparison of the Security of Windows NT and UNIX Hans Hedbom, Stefan Lindskog, Stefan Axelsson and Erland Jonsson Originally presented at the Third.
Understanding Active Directory
Chapter 7 Managing OUs and Active Directory Accounts
Windows Security Mechanisms Al Bento - University of Baltimore.
Access Control Lists and NTFS Permissions INFO333 – Lecture Mariusz Nowostawski Noria Foukia.
 Name: Hatem elbuhaisi  Name no:  University of Palestine  Miss : yasmen elboboo  Chairing Information Technology Hands-On Microsoft Windows.
Security features of Windows What is computer security ? Computer security refers to the protection of all components—hardware, software, and stored.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.2. Windows Security Components.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
7.3. Windows Security Descriptors
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS3: Concurrency 3.5. Lab Slides & Lab Manual.
Designing Group Security Designing security groups Designing user rights.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS8: File System 8.3. Encrypting File System Security.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS5: Memory Management 5.5. Lab Manual.
Active Directory Travis Favors Ryan Manuel Robert Rayer.
Unit OS8: File System 8.6. Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows Operating.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Unit OS11: Performance Evaluation Lab Manual.
Unit OS A: Windows Networking A.4. Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows.
Unit OS6: Device Management 6.4. Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows.
Unit OS12: Scripting Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows Operating.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.1. The Security Problem.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.4. Lab Manual.
Understand Audit Policies LESSON Security Fundamentals.
Privilege Management Chapter 22.
Review on Active Directory. Aim Enable users to find network resources easily Central and easy administration of users and resources in a domain Improve.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS1: Overview of Operating Systems 1.1. Windows.
Windows Security -- Archana Galipalli. Agenda  Windows Security  Windows Security and CLR  Implementing Windows Security for IIS  Configuring Security.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Operating System Security
Radius, LDAP, Radius used in Authenticating Users
Unit OSC: Interoperability
Unit OS9: Real-Time and Embedded Systems
Unit OS4: Scheduling and Dispatch
Unit OS11: Performance Evaluation
Unit OS A: Windows Networking
Unit OS8: File System 8.6. Quiz
Unit OS2: Operating System Principles
Unit OS10: Fault Tolerance
Unit OSB: Comparing the Linux and Windows Kernels
Common Security Mistakes
Windows Internals Brown-Bag Seminar Chapter 1 – Concepts and Tools
KERBEROS.
(Authentication / Authorization)
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Unit OS7: Security 7.4. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze

Copyright Notice © 2000-2005 David A. Solomon and Mark Russinovich These materials are part of the Windows Operating System Internals Curriculum Development Kit, developed by David A. Solomon and Mark E. Russinovich with Andreas Polze Microsoft has licensed these materials from David Solomon Expert Seminars, Inc. for distribution to academic organizations solely for use in academic environments (and not for commercial use)

Security Ratings Which of the following is not required for a C2 rating? Encrypted passwords Object reuse protection Secure logon Auditing a) Encrypted passwords

C2 Security C2 trusted path is provided by: Secure logon Directory-level discretionary access control Secure attention sequence Administrator protection of audit logs c) Secure attention sequence

Security System Components What is the heart of the object access protection in Windows? Local Security Authority Security Reference Monitor Active Directory Security Accounts Database b) Security Reference Monitor

Security System Components The Windows security system consists of a number of kernel- and user-mode components. Which one is not among them? Transactional Object Monitor (TOM) Security Accounts Manager (SAM) Graphical Identification and Authentification (GINA) a) Transactional Object Monitor (TOM)

Security Settings Changing the security settings for a file in Windows affects: The next open-operation on the file (CreateFile) The next write-operation on the file (WriteFile) The next read-operation on the file (ReadFile) a) The next open-operation on the file (CreateFile)

Active Directory The distributed authentication and authorization mechanism in Windows active directory relies on the following security protocol: Odin Zeus Kerberos c) Kerberos

Kerberos Kerberos relies on: Symmetric encryption Asymmetric (public/private key) encryption Secret one way functions a) Symmetric encryption

Access Check Which of the following are not referred to for a security access check? Token Discretionary Access Control List (DACL) System Access Control List (SACL) Desired Access c) System Access Control List (SACL)

Security Token Which of the following is not part of the Windows Security Token? Account SID Assigned Privileges Handle to Security Reference Monitor List of groups a user belongs to c) Handle to Security Reference Monitor

Access Control Entries Which of the following is a valid access control entry (ACE) type? Allow and Deny Deny all Deny DACL c) Deny

Auditing Auditing ACE’s are stored in an object’s: SACL DACL Token SID a) SACL

Impersonation In client/server applications, impersonation is used to let a: Client take on a security identity of a server Client access same objects as the server Server take on a security identity of a client Server access objects on the client system c) Server take on a security identity of a client

Privileges When a privilege is needed, the Security Reference Monitor checks this by: Querying the Local Security Authority process Checking privilege in the access token Checking privilege DACL for user access Writing auditing event to the Security event log b) Checking privileges in the access token

Acess Control Lists If Alice is a member of the Manager's group and a file she wants to access has a DACL with three ACEs composed as follows, will Alice be able to read from the file? 1st ACE: Bob can't read from the file 2nd ACE: Manager's can't write the file 3rd ACE: Alice can write and delete the file yes no b) no