Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security.

Slides:



Advertisements
Similar presentations
Managing User, Computer and Group Accounts
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Module 1 The Windows NT 4.0 Environment. 2  Overview The Microsoft Operating System Family Windows NT Architecture Overview Workgroups and Domains.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Information Security in Real Business Asian Connection and Craig.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Introduction To Windows NT ® Server And Internet Information Server.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Understanding Active Directory
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Monitoring and Troubleshooting Chapter 17. Review What role is required to share folders on Windows Server 2008 R2? What is the default permission listed.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
User Manager for Domains.  Manages the user accounts in a domain  It is located in the PDC  While User Manager exists in each NT machine, but it is.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Chapter 13 – Network Security
SOS EGEE ‘06 GGF Security Auditing Service: Draft Architecture Brian Tierney Dan Gunter Lawrence Berkeley National Laboratory Marty Humphrey University.
Designing Group Security Designing security groups Designing user rights.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Module 11: Remote Access Fundamentals
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Security Windows 2000 Richard Goldman © December 4, 2001.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
Using Event Viewer Event Levels Creating Custom Views Windows Logs Monitoring Performance.
GUDURU PRAVEEN REDDY.NET IMPERSONATION. Contents Introduction Impersonation Enabled Impersonation Disabled Impersonation Class Libraries Impersonation.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Review on Active Directory. Aim Enable users to find network resources easily Central and easy administration of users and resources in a domain Improve.
L Identify the “out-of-the-box” audit settings l Identify recommended minimum audit settings l Configure security event log settings to meet recommendations.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Chapter 7 Server Management Policies –User accounts –Groups Rights and permissions Examples.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
Securely Managing VMS from a Windows Environment 1.
Security Architecture of Windows
Nassau Community College
Module Overview Installing and Configuring a Network Policy Server
Module 10: Managing and Monitoring Network Access
Introduction to Operating Systems
Unit OS7: Security 7.4. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze.
Florida State University
Operating System Security
Greta Mameniskyte IV course 3rd group
(Authentication / Authorization)
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Presentation transcript:

Network Security

Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security threats that may exist and how to best control and react to them  100% secure is not possible

Security Model  A security model is a generic term that describes methodologies used to secure a system –User-Level –Share-Level

Windows Security Subsystem Windows Security Subsystem  There are four parts to the security subsystem in Windows NT.

Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Logon Processes User interface provided for interactive logon. Also provides interface for administrative tools.

Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Security Accounts Manager (SAM) Handles authentication services for LSA. Database of user, group, and machine accounts.

Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Local Security Authority (LSA) Handles local security policies and user authentication and generates audit log messages.

Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Security Reference Monitor Verifies that a user has the appropriate permissions to access an object.

Access Tokens  When the Security Accounts Manager validates a user, an access token is created.  The token is used until the user logs out and then it is permanently destroyed.  The token maintains all of the information required for resource validation

Access Tokens  The access token includes the following information: –User Security Identifier (SID) –Group Security Identifier –Access Permissions