10
Network Network Security Security

Network Security. Need for security Connecting to the Internet is quickly becoming a necessity for companies/ individuals Understand the security

Embed Size (px)

Citation preview

Page 1: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

NetworkNetworkSecuritySecurity

Page 2: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Need for securityNeed for security

Connecting to the Internet is quickly Connecting to the Internet is quickly becoming a necessity for companies/ becoming a necessity for companies/ individuals individuals

Understand the security threats that Understand the security threats that may exist and how to best control may exist and how to best control and react to themand react to them

100% secure is not possible100% secure is not possible

Page 3: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Security ModelSecurity Model

A security model is a generic term A security model is a generic term that describes methodologies used to that describes methodologies used to secure a systemsecure a system

– User-Level User-Level

– Share-LevelShare-Level

Page 4: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Windows Security SubsystemWindows Security Subsystem

There are four parts to the security There are four parts to the security subsystem in Windows NT. subsystem in Windows NT.

Page 5: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Windows Security SubsystemWindows Security Subsystem

Security Security Subsystem Subsystem ComponentComponent

DescriptionDescription

Logon Processes Logon Processes User interface User interface provided for provided for interactive logon. interactive logon. Also provides Also provides interface for interface for administrative tools. administrative tools.

Page 6: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Windows Security SubsystemWindows Security Subsystem

Security Security Subsystem Subsystem ComponentComponent

DescriptionDescription

Security Accounts Security Accounts Manager (SAM) Manager (SAM)

Handles Handles authentication authentication services for LSA. services for LSA. Database of user, Database of user, group, and machine group, and machine accounts. accounts.

Page 7: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Windows Security SubsystemWindows Security Subsystem

Security Security Subsystem Subsystem ComponentComponent

DescriptionDescription

Local Security Local Security Authority (LSA) Authority (LSA)

Handles local Handles local security policies and security policies and user authentication user authentication and generates audit and generates audit log messages. log messages.

Page 8: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Windows Security SubsystemWindows Security Subsystem

Security Security Subsystem Subsystem ComponentComponent

DescriptionDescription

Security Reference Security Reference Monitor Monitor

Verifies that a user Verifies that a user has the appropriate has the appropriate permissions to permissions to access an object. access an object.

Page 9: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Access TokensAccess Tokens

When the Security Accounts Manager When the Security Accounts Manager validates a user, an access token is validates a user, an access token is created. created.

The token is used until the user logs out The token is used until the user logs out and then it is permanently destroyed. and then it is permanently destroyed.

The token maintains all of the information The token maintains all of the information required for resource validation required for resource validation

Page 10: Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security

Access TokensAccess Tokens

The access token includes the The access token includes the following information:following information:– User Security Identifier (SID)User Security Identifier (SID)– Group Security IdentifierGroup Security Identifier– Access PermissionsAccess Permissions