NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.

Slides:



Advertisements
Similar presentations
1 Preparing Windows 2000 installation (Week 3, Wednesday 2/25/2006) © Abdou Illia, Spring 2006.
Advertisements

Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Active Directory: Final Solution to Enterprise System Integration
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Chapter 8 Chapter 8: Managing the Server Through Accounts and Groups.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Starting Windows NT An overview and introduction Instructor: Professor: Dr. Anvari Students: Li-Yen Chen & Chunwa (Joanna) Chan Southeastern University.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
11 CERTIFICATE SERVICES AND SECURE AUTHENTICATION Chapter 10.
Windows Security Mechanisms Al Bento - University of Baltimore.
Lesson 17. Domains and Active Directory. Objectives At the end of this Presentation, you will be able to:
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Working with Workgroups and Domains
1 Chapter Overview Network Operating Systems Network Clients Directory Services.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Chapter 1 Chapter 1: Networking with Microsoft Windows 2000 Server.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Module 7: Fundamentals of Administering Windows Server 2008.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
Module 7 Active Directory and Account Management.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Windows NT Operating System. Windows NT Models Layered Model Client/Server Model Object Model Symmetric Multiprocessing.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control.
COSC573 Instructor: Professor Anvari Student:Shen Zhong ID#: Summer semester,1999 Washington.D.C.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
Privilege Management Chapter 22.
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
1 Introduction to Active Directory Directory Services Uniquely identify users and resources on a network Provide a single point of network management.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Module 1: Introduction to Windows 2000 and Networking.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Basharat Institute of Higher Education
Introduction to Operating Systems
Network Operating Systems Examples
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Course Name : Network Operating System Course Code: CNET 332 These slides are only meant for course delivery. For all your Exams refer to your text book.
Course Name : Network Operating System Course Code: CNET 332
Introduction to Active Directory Directory Services
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For a system to be “Confidential,” it must provide features which control data access to those persons who require it for the business process or function. The information must be available to users this is the key concept surrounding “Availability.” The “Integrity” of the data involves the requirement that the data is in the form that is needed for the business process. The designers of NT 4.0 made a conscious effort to realize these features in this network operating system.

Introduction Microsoft Windows NT 4.0 features a fully pre-emptive 32-bit multitasking operating system that is scalable across enterprise level networks with diverse clients. It supports Novell, DOS, Windows 95, Unix and Apple Workstation. This system allows for the granular control of resources, as well as strong authentication and encryption. It has many security features that make it a more stable platform than its predecessors, and yet retains the familiar Windows 95/98 interface. Many networking features have been build into both the server and workstation version of this product, but NT server has many more features than the workstation variant.

NT System Identification The NT token for users is known as the System Identification or SID. It is based on a combination of the user identification, account domain, process up time, password, time, and a unique hashing function that is specific to NT. This method guarantees that a user with a given name, and a given password will be almost certain to be uniquely identified by the system. The SID is the real basis for access and permission in NT. SIDs are not re-used with identical accounts in this operating system.

NT IDENTIFICATION AND AUTHENTICATION The User in the NT environment is identified by some arrangement of characters. The authentication mechanism for each identified user is a configurable password. Specific constraints may be applied to individual user identification including; length of passwords, times of access, duration of password authenticity, rotation, and even the composition of the password. The individual user and password identification is used by the NT operating system to generate a unique token that is referenced for each process initiated by the user.

Reproduced from

NT ACCOUNT CONTROLS User accounts that are part of the default installation of NT server include, Administrators, Users, Guests, Backup Operators, Replicators, Print Operators, Account Operators, and Server Operators. Each type of user is limited in the privileges that may be exercised on the system. Users may be either global accounts (able to access the server remotely), or local accounts. Accounts may be customized to a large degree beyond these default accounts.

Reproduced from

NT SECURITY OBJECTS Security for NT is included in many fundamental aspects of the operating system. These aspects are represented as objects and the security subsystem maintains the permissions related to the objects contained in the system. Account rights may be as specific as an individual user account, or may be applied to a group of users who have been granted identical privileges.

NT SECURITY COMPONENTS NT features a security subsystem that contains many separate components to enhance the security of the product. These features include; Local Security Authority (LSA), the Security Reference Monitory, (SRM), and the Security Account Manager (SAM). Each component of the security subsystem has a role in maintaining the confidentiality, integrity and availability of the operating system. The rights or ability of a user to gain access to a file, application, or system resource, is dependent on the rights granted to the individual accounts by the system administrator. NT is able to control user access to file and directories, operating system processes and programs, as well as the systems of NT itself.

ACE/ACL/LSA CONTROLS The object in the NT environment is closely related to the Access Control Entry. This is an individual list of permissions and attributes that are featured by a specific object. The combination of all system ACE permissions and attributes is known as the system Access Control List (ACL). Each system maintains a database of account permissions that is referenced upon system access (log-in). This database is the Security Account Manager, and it retains information such as passwords and account information. The Local Security Authority (LSA) to validate the request of individual users based on the ACL.

SRM The functional portion of the SAM and LSA is the Security Reference Monitor, which is based, in the very core of the operating system or the kernel. All instantiations of processes, and access are actually verified by the SRM. The SRM is used for system calls, as well as user access requests. This allows individual services of the operating system to verify access requests through the SRM.

Reproduced from

WORKGROUP MODELS In a workstation model, NT workstation is used as the authenticating authority for the resources on the host computer. If there are 10 computers sharing resources then each computer must be authenticated individually for each resource to be shared. This would mean that there would be a potential of 90 different passwords in all (10 * 9) for every combination of sharing. NT server offers centralization of these services, and is capable of managing accounts within or across Domains. The workgroup model becomes very difficult to manage after the addition of only a few computers.

DOMAIN MODELS NT server is capable of the authentication of users across a single Domain. The Primary Domain Controller is able to authenticate individual users, as well as replicate SAM accounts to secondary controllers known as Backup Domain Controllers. This central management of users is a key feature of NT, and may be extended across domains by the use of trust relationships. The server in NT is generally given one of three roles, the Primary Domain Controller, the Backup Domain Controller, and the Stand-alone server. PDC and BDC servers may exchange roles due to a hardware failure, and continue the authentication of users with little or no problem

Reproduced from

FILE SYSTEM/ACCESS CONTROL NT is capable of very fine access control of users. Individual files can be controlled through the use of the NT file system (NTFS). This allows for the control of access to files and programs, as well the extension of permissions by persons with access. This means that the system administrator may control files copied from one directory to another. User rights are generally kept to those absolutely required by the system. This allows for a clear separation of power within the system and the enforcement of minimal privileges. These are key components that serve as the foundation of good security practices.

Reproduced from

NT ENCRYPTION AND AUDITING NT confidentiality is supported by a number of encryption features that are a part of the operating system. Domestic versions of NT support up to 128-bit encryption in addition to encrypted authentication of remote access services. Export versions of NT support less robust encryption features. In addition to the encryption and fault-tolerance features of the operating features, system auditing is supported for security, applications, and system events. This is a method of recording system failures, access attempts, and changes in the configuration of files. The audit features allow for very close monitoring of the allocation and alteration of resources

Reproduced from

NT FAULT TOLERANCE NT offers several features that contribute to the integrity of the system. Raid configurations that are based on software solutions, tape back-up based on software, and multiple processors. Raid types supported by NT software include disk duplexing and disk striping. The use of redundant disks contributes to the availability of the system and the integrity of the data being processed

Sources Windows NT 4.0 Server Security Guide (Prentice Hall Series on Microsoft Technologies, Gonsalves, Marcus Windows NT Server Networking Guide, Microsoft Press1996