Download presentation
Presentation is loading. Please wait.
Published byAusten McCormick Modified over 9 years ago
1
Network Security
2
Need for security Connecting to the Internet is quickly becoming a necessity for companies/ individuals Understand the security threats that may exist and how to best control and react to them 100% secure is not possible
3
Security Model A security model is a generic term that describes methodologies used to secure a system –User-Level –Share-Level
4
Windows Security Subsystem Windows Security Subsystem There are four parts to the security subsystem in Windows NT.
5
Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Logon Processes User interface provided for interactive logon. Also provides interface for administrative tools.
6
Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Security Accounts Manager (SAM) Handles authentication services for LSA. Database of user, group, and machine accounts.
7
Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Local Security Authority (LSA) Handles local security policies and user authentication and generates audit log messages.
8
Windows Security Subsystem Windows Security Subsystem Security Subsystem Component Description Security Reference Monitor Verifies that a user has the appropriate permissions to access an object.
9
Access Tokens When the Security Accounts Manager validates a user, an access token is created. The token is used until the user logs out and then it is permanently destroyed. The token maintains all of the information required for resource validation
10
Access Tokens The access token includes the following information: –User Security Identifier (SID) –Group Security Identifier –Access Permissions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.