Upload
austen-mccormick
View
215
Download
2
Embed Size (px)
Citation preview
NetworkNetworkSecuritySecurity
Need for securityNeed for security
Connecting to the Internet is quickly Connecting to the Internet is quickly becoming a necessity for companies/ becoming a necessity for companies/ individuals individuals
Understand the security threats that Understand the security threats that may exist and how to best control may exist and how to best control and react to themand react to them
100% secure is not possible100% secure is not possible
Security ModelSecurity Model
A security model is a generic term A security model is a generic term that describes methodologies used to that describes methodologies used to secure a systemsecure a system
– User-Level User-Level
– Share-LevelShare-Level
Windows Security SubsystemWindows Security Subsystem
There are four parts to the security There are four parts to the security subsystem in Windows NT. subsystem in Windows NT.
Windows Security SubsystemWindows Security Subsystem
Security Security Subsystem Subsystem ComponentComponent
DescriptionDescription
Logon Processes Logon Processes User interface User interface provided for provided for interactive logon. interactive logon. Also provides Also provides interface for interface for administrative tools. administrative tools.
Windows Security SubsystemWindows Security Subsystem
Security Security Subsystem Subsystem ComponentComponent
DescriptionDescription
Security Accounts Security Accounts Manager (SAM) Manager (SAM)
Handles Handles authentication authentication services for LSA. services for LSA. Database of user, Database of user, group, and machine group, and machine accounts. accounts.
Windows Security SubsystemWindows Security Subsystem
Security Security Subsystem Subsystem ComponentComponent
DescriptionDescription
Local Security Local Security Authority (LSA) Authority (LSA)
Handles local Handles local security policies and security policies and user authentication user authentication and generates audit and generates audit log messages. log messages.
Windows Security SubsystemWindows Security Subsystem
Security Security Subsystem Subsystem ComponentComponent
DescriptionDescription
Security Reference Security Reference Monitor Monitor
Verifies that a user Verifies that a user has the appropriate has the appropriate permissions to permissions to access an object. access an object.
Access TokensAccess Tokens
When the Security Accounts Manager When the Security Accounts Manager validates a user, an access token is validates a user, an access token is created. created.
The token is used until the user logs out The token is used until the user logs out and then it is permanently destroyed. and then it is permanently destroyed.
The token maintains all of the information The token maintains all of the information required for resource validation required for resource validation
Access TokensAccess Tokens
The access token includes the The access token includes the following information:following information:– User Security Identifier (SID)User Security Identifier (SID)– Group Security IdentifierGroup Security Identifier– Access PermissionsAccess Permissions