null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
60791
Computer Security U8 - Windows 2000 Security
Description
Mind Map on Computer Security U8 - Windows 2000 Security, created by Nick.Bell2013 on 29/04/2013.
Mind Map by
Nick.Bell2013
, updated more than 1 year ago
More
Less
Created by
Nick.Bell2013
over 11 years ago
59
9
0
Resource summary
Computer Security U8 - Windows 2000 Security
Introduction
Memory & Privilege levels
linear 32-bit (4GB) address space
Object-based security
Securable objects
Active Directory
objects with attributes
programs
processes
threads
Basic concepts
Principals
Security principals
Security Identifiers (SIDs)
groups
security
e-mail distribution
Objects
instance of a class
Classes
Object Handler
controls objects
kernel objects
executive obejcts
Active Directory
secure, distributed, scalable & replicated hierarchical directory service
integrates DNS
single point of admin (incl. security)
Objects
GUID
schema
container
can hold other objects
e.g. directory
leaf
Names
security principal
SIDs
LDAP Distinguished Name (DN)
Relative DN (RDN)
canonical
GUID
Domains & Organizational Units
domain controller
member server
organizational unit
organize and contain AD objects
Trust relationships
domain tree
domains with common schema/configuration
domain forest
trees with common schema
not a contiguous namespace in AD
managed domains
Domain models
single
master
multiple master
complete trust
Authentication
ID verification
interactive logon
network authentication
SAS
GINA DLL
Local Security Authority (LSA)
Kerberos
Key Dist. Centre (KDC)
ticket-granting ticket (TGT)
ticket-granting service (TGS)
Single Sign-On (SSO)
Access Control
DACL
object handles
handle table
28-bit pointer to object header
32-bit access mask
handle file entries
access control entires
access requests
generic access rights
(R)ead
(W)rite
(X)ecute
(A)ll
4 flags: (L)ock (A)udit (P)rotect (I)nherit
Control Access Rights
extended
property sets
validated writes
privilege
take-ownership
Impersonation
Principle of Least Privilege
Access Tokns
primary
LSA
Security Descriptor
control flags
owner
primary group
DACL
SACL
AC Entries
Access-denied
Access-allowed
System-audit
Security Management & Audit
Security Configuration Tool Set (SCTS)
Group Policy Objects (GPOs)
Audit
detect behaviour that violates policy
analyse security breaches
provide evidence for prosecution
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
SSCP Domains
Abdul Issa
Computer Security Potential Flaws
Rob Speirs
'The Merchant of Venice' - William Shakespeare
cian.buckley
Spanish Adjectives (Describing People)
Niat Habtemariam
Cell Structure
daniel.praecox
GCSE English Literature: Of Mice and Men
Andrea Leyden
UNIT 1 DIGITAL MEDIA SECTORS AND AUDIENCES
carolyn ebanks
GCSE Combined Science
Derek Cumberbatch
1PR101 2.test - Část 1.
Nikola Truong
Část 3.
Gábi Krsková
Browse Library