CSC 386 – Computer Security Scott Heggen. Agenda A last look at OS Security Comparing Windows to Linux.

Slides:



Advertisements
Similar presentations
Understand Database Security Concepts
Advertisements

What to expect.  Linux  Windows Server (2008 or 2012)
Chapter One The Essence of UNIX.
11 CONFIGURING AND MANAGING SHARED FOLDER SECURITY Chapter 8.
 Overview User Accounts Groups User Rights Permissions.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 6: Configure and Troubleshoot Local User and Group Accounts.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
Chapter 08 How to Insert, Update, and Delete Data MIT 22033, Database Management Systems By. S. Sabraz Nawaz.
Chapter 10 Overview  Implement Microsoft Windows Authentication Mode and Mixed Mode  Assign login accounts to database user accounts and roles  Assign.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Sql Server Advanced Features MIS 424 Professor Sandvig.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
V Avon High School Tech Crew Agenda Old Business –Delete Files New Business –Week 10 Topics: Coming up: –Yearbook Picture: Feb 7 12:20PM.
V Avon High School Tech Crew Agenda Old Business –Delete Files New Business –Week 9 Topics: Coming up: –Yearbook Picture: Feb 7 12:20PM.
CSC 386 – Computer Security Scott Heggen. Database Security How can we minimize the probability of success by attacks like the one shown in the comic?
True or False? Programming languages can be used to update databases and communicate with other systems. True.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Today’s Objectives Chapters 10 and 11 Security in SQL Server –Manage server logins and database users. –Manage server-level, database-level, and application.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Web Server Administration Chapter 7 Installing and Testing a Programming Environment.
Samba Advanced System Administration Course James Lwali University computing Centre Ltd, University of Dar es salaam,
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
CSC 386 – Computer Security Scott Heggen. Agenda Do not wait for me; begin working right away Complete the following tasks in your code: Implement the.
CSE 3330 Database Concepts Stored Procedures. How to create a user CREATE USER.. GRANT PRIVILEGE.
SQL Server Security By Mattias Lind For PASS Security VC.
October 1-2 Ølensvåg. AppFrame SQL – Security Session Code: SQL-201-Security Speaker(s): Jekaterina Golouchova.
DCL/1 Data Control Language Objectives –To learn about the security mechanisms implemented in an RDBMS and how to use them Contents –Identifying Users.
Inventory Management System for Department of Computer Science Group Number
CSc-340 3b1 Intermediate SQL Chapter 4 [2 of 2] Phase 1 of Student Projects SQL Data Types & Schemas Authorization.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Chapter Two Clients and Servers: Who’s the Boss?.
Ozan Şahin Ömer Üçler.  Purpose of Project  Used Technologies  Database Design  Problems&Solutions  Use Case’s  Demo.
Chapter 10: Rights, User, and Group Administration.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Module 11 Authorizing Users to Access Resources. Module Overview Authorizing User Access to Objects Authorizing Users to Execute Code Configuring Permissions.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
1 Announcements Reading for next week: Chapter 4 Your first homework will be assigned as soon as your database accounts have been set up.  Expect an .
CSCI 530 Lab Authorization. Review Authentication: proving the identity of someone Passwords Smart Cards DNA, fingerprint, retina, etc. Authorization:
Privilege Management Chapter 22.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
CSC 386 – Computer Security Scott Heggen. Agenda The Foundations of Computer Security.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
CRC Dinamap Senior Design Project John Dlugokecki Steven Searcy Robbie Rutherford Arif Mohd Zahari February 12, 2009.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
1 Copyright © 2009, Oracle. All rights reserved. Controlling User Access.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Introduction to MySQL  Working with MySQL and MySQL Workbench.
Windows Vista Configuration MCTS : User Account Security.
Securely Managing VMS from a Windows Environment 1.
Guide to Operating Systems, 5th Edition
Roles in the Database Environment
Chapter 6 – Users, Groups, and Permissions
Unit 2, Lesson 5 Windows User Accounts
Database Mysql Hayk Avdalyan.
ACTIVE DIRECTORY ADMINISTRATION
Chapter 4 – Introduction to Operating System Concepts
Chapter 8 Advanced SQL Pearson Education © 2014.
Chapter 8 Data Base Security
Figure 6-9: Managing Users and Groups
Operating System Hardening
Presentation transcript:

CSC 386 – Computer Security Scott Heggen

Agenda A last look at OS Security Comparing Windows to Linux

Comparing Users Windows Administrator User Guest Linux Superuser (Root) User Services users (www-data, mysql) Other

Comparing Groups Windows Domains Administrators Power Users Users Guests Linux Groups Root Sudo Users

Users vs. Groups Why do we need both users and groups? Authentication vs. Authorization

Comparing Permissions Windows Default Permissions Linux Default Permissions

Comparing Complexity Windows Linux

Next Week Database Security Read up on Chapter 9 Another quiz on: Define relational database Understand what a SELECT statement does Understand what an UPDATE statement does Understand what a DELETE statement does Understand what an INSERT statement does