Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security.

Similar presentations


Presentation on theme: "Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security."— Presentation transcript:

1 Network Security

2 Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security threats that may exist and how to best control and react to them  100% secure is not possible

3 Security Model  A security model is a generic term that describes methodologies used to secure a system –User-Level –Share-Level

4 Windows Security Subsystem Windows Security Subsystem  There are four parts to the security subsystem in Windows NT.

5 Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Logon Processes User interface provided for interactive logon. Also provides interface for administrative tools.

6 Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Security Accounts Manager (SAM) Handles authentication services for LSA. Database of user, group, and machine accounts.

7 Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Local Security Authority (LSA) Handles local security policies and user authentication and generates audit log messages.

8 Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Security Reference Monitor Verifies that a user has the appropriate permissions to access an object.

9 Access Tokens  When the Security Accounts Manager validates a user, an access token is created.  The token is used until the user logs out and then it is permanently destroyed.  The token maintains all of the information required for resource validation

10 Access Tokens  The access token includes the following information: –User Security Identifier (SID) –Group Security Identifier –Access Permissions


Download ppt "Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security."

Similar presentations


Ads by Google