Namespaces cs3353. Namespace Domain A computer system namespace domain is created and maintained to: –standardize the policy for names –prevent name collisions.

Slides:



Advertisements
Similar presentations
1 Preparing Windows 2000 installation (Week 3, Wednesday 2/25/2006) © Abdou Illia, Spring 2006.
Advertisements

CSCI 150 Database Applications Chapter 1 – Getting Started.
Getting Started (Excerpts) Chapter One DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
Technological Sustainability.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
 What are some of the important benefits that Mountain View Community Hospital should seek in using databases? As much as possible, relate your response.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Distributed Computing COEN 317 DC2: Naming, part 1.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Computer communication
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Client-Server & Peer-to-Peer Networks
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
Module 7: Fundamentals of Administering Windows Server 2008.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 UNDERSTANDING USER ACCOUNTS  Local user accounts  stored in the Security.
Distributed Computing COEN 317 DC2: Naming, part 1.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Royal Latin School. Describe, using diagrams or otherwise, the ring, bus and star network topologies Once you have decided to network a number of computers.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Chapter 8 Configuring and Managing Shared Folder Security.
Chapter 2 Securing Network Server and User Workstations.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Information architecture (basics for app building)
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
1 California State University, Fullerton Chapter 3 Information System Fundamentals.
Communications & Networks National 4 & 5 Computing Science.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Describe the potential of IT to improve internal and external communications By Jim Green.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Mr C Johnston ICT Teacher G055 - Lecture 01 Introduction and Benefits of Computer Networks.
Activity 1 5 minutes to discuss and feedback on the following:
Server to Server Group Requirements Simplifying key management between multiple vendor implementations.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
CSCI-235 Micro-Computers in Science Databases. Database Concepts Data is any unorganized text, graphics, sounds, or videos A database is a collection.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Information Technology
Client-Server & Peer-to-Peer Networks
(ITI310) SESSIONS 6-7-8: Active Directory.
Section 15.1 Section 15.2 Identify Webmastering tasks
Introduction to Computers
Networking and Security
Communications & Computer Networks Resource Notes - Introduction
Operating Systems Tasks 17/02/2019.
Active Directory Overview
Peer-to-Peer Client-server.
SDLC Phases Systems Design.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Namespaces cs3353

Namespace Domain A computer system namespace domain is created and maintained to: –standardize the policy for names –prevent name collisions (same names with different meanings)

Namespace The namespace is used to create names for –User IDs –Individual computer systems –Other hardware –Other categories? Passwords

Namespace Policy Formula Theme –All names fit a theme like planet names, cartoon characters, star trek characters, etc. Function –The name describes the function: disk_server, main_printer, etc.

Namespace Policy Theme names for hardware are ok when there are only a few systems: –Server = hal9000 –Clients = uhura, checkov, sulu, spock, etc Managing a large number of systems this way is not advised.

Namespace Policy Function names: disk_server01, disk_server02, etc. Function names have their own maintenance problems: consider what happens when the disk_server is reassigned its role in the computing system to handle e- mail.

Namespace Policy: Formula Formula names are not interesting or personal, but are practical for large namespaces. Divide the name into fields. Fixed length fields make the names easier to learn. Keep the name to a reasonable length.

Namespace Policy: Formula Formula names can be used to obscure the function of named entities in the domain. Keep the names to a reasonable length unless long names serve a specific purpose. –Longer names tend to be used less frequently

Formula Policy User IDs, Passwords Machine names: clients & servers Miscellaneous hardware: –Printers, Fax-machine, etc Other?

Namespace Formula Policy Use any combination of: –Prefix: –Infix: –Postfix To construct a namespace.

Example: User ID Formula (Prefix) Prefix (one letter field) –Regular employee (e) –Consultant/Contractor (c) –Temp (t) –Vendor/Supplier (s | v) –Visitor/Guest (g) –Helpful for identification and access control

Example: User ID Formula (Infix,Postfix) Infix (three character field) –Three letters using name initials Postfix (two character field) –00 through 99 if two entities have the same first four characters.

Example: Namespace Policy (Hardware) Computer systems (6 to 8 characters) –Postfix –Infix –Prefix

Example: Namespace Policy (Hardware) Postfix –Server (s) –Client (c) –Experimental (e) –Printer (p) –Backup device (b) –Etc.

Example: Formula Namespace (Hardware) Infix – 3 character base-36 number: 000-zzz Postfix – 2 digits Year of purchase (09). Most hardware is retired within 10 years.

User ID name space Possible choices –Full name –Initials and digits –Anonymity of user IDs may be required. –Limit to 8 characters if possible.

User ID name space A centralized data base for User ID names is needed. A single authentication data base can be used to keep track of User ID name space.

Other Namespace Considerations Scope – what is the scope for your namespace. –What is the impact of growth or a merger? Security – do the names need to be obscure? Reuse – When is it appropriate to re-use a name, if ever?

Changes in the Namespace A name change policy is needed. A central database with a record of all names in the namespace is required for managing the namespace.

Class Exercise Create a formula policy for: –Hardware –User IDs –The formula method can be applied to passwords