Chapter 4 Sharing Files. FIGURE 4.0.F01: Sharing files for reading on Microsoft Windows 8.1. Used with permission from Microsoft.

Slides:



Advertisements
Similar presentations
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Advertisements

1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
7.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Sharing Files Richard Newman based on Smith “Elementary Information Security”
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW  Describe the process of adding a computer to.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW Describe the process of adding a computer to.
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Chapter 7 WORKING WITH GROUPS.
Access Control Lists and NTFS Permissions INFO333 – Lecture Mariusz Nowostawski Noria Foukia.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 6: Windows File and Print Services.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
The Basics  Operating systems (OS) can help computer users do many things, like managing and manipulating files and folders.  Operating systems also.
Chapter 4 Sharing Files. Chapter 4 Overview Tailored File Sharing User Groups File Permission Flags Access Control Lists Apple OS X Access Control Lists.
8.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 8: Introducing Computer Accounts.
6.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 6: Administering User Accounts.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Windows NT 4.0 Demo. Windows NT: Brief overview Operating system for pentium and alpha based machines Multi tasking operating system Multi-account operating.
Module 4 Managing Access to Resources in Active Directory ® Domain Services.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
EHR Deployment Network Share Setup Updater Service Deployment
Chapter 10: Rights, User, and Group Administration.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Company Confidential 1 A Course on Planning A Group Policy Management And Implementation Strategy Prepared for: *Stars* New Horizons Certified Professional.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
11 PLANNING A GROUP POLICY MANAGEMENT AND IMPLEMENTATION STRATEGY Chapter 10.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Privilege Management Chapter 22.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 7 Under the Windows Desktop McGraw-Hill.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
NT File Systems by Eunice Swinson Southeastern University Professor: Mort Anvari June 3, 2000.
1 Introduction to Unix. 2 What is UNIX?  UNIX is an Operating System (OS).  An operating system is a control program that helps the user communicate.
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Configuring and Managing Resource Access Lecture 5.
10.1 © 2004 Pearson Education, Inc. Lesson 10: Specifying Group Policy Settings Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
Chapter 9 Lecture 4. NetWare Novell’s network operating system Biggest competitor – Microsoft Windows.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
Assignment # 8.
Figure 6-9: Managing Users and Groups
Security and File Permission
Managing Data by Using NTFS
Chapter 9: Managing Groups, Folders, Files, and Object Security
Setting up home folders and roaming profiles
Figure 6-13: Managing Permissions
Windows Vista Inside Out
Presentation transcript:

Chapter 4 Sharing Files

FIGURE 4.0.F01: Sharing files for reading on Microsoft Windows 8.1. Used with permission from Microsoft.

FIGURE 4.0.F02: Microsoft’s basic file-sharing window. Used with permission from Microsoft.

FIGURE 4.0.F03: Editing the “survey” user group on Windows. Used with permission from Microsoft.

FIGURE 4.0.F04: The Task Manager’s process display on Microsoft Windows. Used with permission from Microsoft.

FIGURE 4.0.F05: OS X padlock unlocks with an administrator’s password. Screen shot reprinted with permission from Apple Inc.

FIGURE 4.0.F06: User account control pop-up window. Used with permission from Microsoft.

FIGURE 4.0.F07: Unix file permissions for a typical file.

FIGURE 4.0.F08: Unix directory listing command “ls.”

TABLE 4.0.T01: Ambiguous access rules

TABLE 4.0.T02: Policy additions for tailored sharing of the survey files

TABLE 4.0.T03: Security controls for Tina and the shared project files

TABLE 4.0.T04: Security controls for the file-sharing policy in Table 3.5

FIGURE 4.0.F09: Macintosh ACL for Bob and Tina’s shared file. Screen shot reprinted with permission from Apple Inc.

FIGURE 4.0.F10: Modifying the rights on a Macintosh ACL entry. Screen shot reprinted with permission from Apple Inc.

FIGURE 4.0.F11: Choosing users for a group in Apple’s OS X. Screen shot reprinted with permission from Apple Inc.

FIGURE 4.0.F12: Access control list from Microsoft Windows. Used with permission from Microsoft.

FIGURE 4.0.F13: Denying access in a Windows ACL. Used with permission from Microsoft.

FIGURE 4.0.F14: Advanced security settings for Windows ACLs. Used with permission from Microsoft.

FIGURE 4.0.F15: Revised ACL for the survey folder. Used with permission from Microsoft.

FIGURE 4.0.F16: Adding to inherited rights in a Windows ACL. Used with permission from Microsoft.

FIGURE 4.0.T05: Access rights applied to the stolen files

TABLE 4.0.F17: Trojan game copies one of the survey files.

FIGURE 4.0.F18: Windows security event log. Used with permission from Microsoft.

FIGURE 4.0.F19: Event logging in the operating system.