Network Security
Need for security Connecting to the Internet is quickly becoming a necessity for companies/ individuals Understand the security threats that may exist and how to best control and react to them 100% secure is not possible
Security Model A security model is a generic term that describes methodologies used to secure a system –User-Level –Share-Level
Windows Security Subsystem Windows Security Subsystem There are four parts to the security subsystem in Windows NT.
Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Logon Processes User interface provided for interactive logon. Also provides interface for administrative tools.
Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Security Accounts Manager (SAM) Handles authentication services for LSA. Database of user, group, and machine accounts.
Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Local Security Authority (LSA) Handles local security policies and user authentication and generates audit log messages.
Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Security Reference Monitor Verifies that a user has the appropriate permissions to access an object.
Access Tokens When the Security Accounts Manager validates a user, an access token is created. The token is used until the user logs out and then it is permanently destroyed. The token maintains all of the information required for resource validation
Access Tokens The access token includes the following information: –User Security Identifier (SID) –Group Security Identifier –Access Permissions