Computer Security U8 - Windows 2000 Security

Beschreibung

Mindmap am Computer Security U8 - Windows 2000 Security, erstellt von Nick.Bell2013 am 29/04/2013.
Nick.Bell2013
Mindmap von Nick.Bell2013, aktualisiert more than 1 year ago
Nick.Bell2013
Erstellt von Nick.Bell2013 vor mehr als 11 Jahre
59
9

Zusammenfassung der Ressource

Computer Security U8 - Windows 2000 Security
  1. Introduction
    1. Memory & Privilege levels
      1. linear 32-bit (4GB) address space
      2. Object-based security
        1. Securable objects
          1. Active Directory
            1. objects with attributes
          2. programs
            1. processes
              1. threads
          3. Basic concepts
            1. Principals
              1. Security principals
                1. Security Identifiers (SIDs)
                2. groups
                  1. security
                    1. e-mail distribution
                  2. Objects
                    1. instance of a class
                    2. Classes
                      1. Object Handler
                        1. controls objects
                          1. kernel objects
                            1. executive obejcts
                        2. Active Directory
                          1. secure, distributed, scalable & replicated hierarchical directory service
                            1. integrates DNS
                              1. single point of admin (incl. security)
                                1. Objects
                                  1. GUID
                                    1. schema
                                      1. container
                                        1. can hold other objects
                                          1. e.g. directory
                                        2. leaf
                                        3. Names
                                          1. security principal
                                            1. SIDs
                                              1. LDAP Distinguished Name (DN)
                                                1. Relative DN (RDN)
                                                  1. canonical
                                                    1. GUID
                                          2. Domains & Organizational Units
                                            1. domain controller
                                              1. member server
                                                1. organizational unit
                                                  1. organize and contain AD objects
                                                  2. Trust relationships
                                                    1. domain tree
                                                      1. domains with common schema/configuration
                                                      2. domain forest
                                                        1. trees with common schema
                                                          1. not a contiguous namespace in AD
                                                          2. managed domains
                                                          3. Domain models
                                                            1. single
                                                              1. master
                                                                1. multiple master
                                                                  1. complete trust
                                                                2. Authentication
                                                                  1. ID verification
                                                                    1. interactive logon
                                                                      1. network authentication
                                                                      2. SAS
                                                                        1. GINA DLL
                                                                          1. Local Security Authority (LSA)
                                                                          2. Kerberos
                                                                            1. Key Dist. Centre (KDC)
                                                                              1. ticket-granting ticket (TGT)
                                                                                1. ticket-granting service (TGS)
                                                                              2. Single Sign-On (SSO)
                                                                            2. Access Control
                                                                              1. DACL
                                                                                1. object handles
                                                                                  1. handle table
                                                                                    1. 28-bit pointer to object header
                                                                                      1. 32-bit access mask
                                                                                        1. handle file entries
                                                                                          1. access control entires
                                                                                            1. access requests
                                                                                          2. generic access rights
                                                                                            1. (R)ead
                                                                                              1. (W)rite
                                                                                                1. (X)ecute
                                                                                                  1. (A)ll
                                                                                          3. 4 flags: (L)ock (A)udit (P)rotect (I)nherit
                                                                                        2. Control Access Rights
                                                                                          1. extended
                                                                                            1. property sets
                                                                                              1. validated writes
                                                                                              2. privilege
                                                                                                1. take-ownership
                                                                                                2. Impersonation
                                                                                                  1. Principle of Least Privilege
                                                                                                  2. Access Tokns
                                                                                                    1. primary
                                                                                                      1. LSA
                                                                                                      2. Security Descriptor
                                                                                                        1. control flags
                                                                                                          1. owner
                                                                                                            1. primary group
                                                                                                              1. DACL
                                                                                                                1. SACL
                                                                                                        2. AC Entries
                                                                                                          1. Access-denied
                                                                                                            1. Access-allowed
                                                                                                              1. System-audit
                                                                                                        3. Security Management & Audit
                                                                                                          1. Security Configuration Tool Set (SCTS)
                                                                                                            1. Group Policy Objects (GPOs)
                                                                                                              1. Audit
                                                                                                                1. detect behaviour that violates policy
                                                                                                                  1. analyse security breaches
                                                                                                                    1. provide evidence for prosecution
                                                                                                                  Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                                                                                  ähnlicher Inhalt

                                                                                                                  Certified Information Systems Security Professional (CISSP)
                                                                                                                  GoAsk Chaz
                                                                                                                  SSCP Domains
                                                                                                                  Abdul Issa
                                                                                                                  Computer Security Potential Flaws
                                                                                                                  Rob Speirs
                                                                                                                  Europäische Städte
                                                                                                                  JohannesK
                                                                                                                  Einführung in das wissenschaftliche Arbeiten
                                                                                                                  Flo Ma
                                                                                                                  Deutsch Abitur 2016: Der Prozess
                                                                                                                  Lena S.
                                                                                                                  Vetie - Histo & Embryo - P 2017
                                                                                                                  Fioras Hu
                                                                                                                  GPSY ALPS (Lösung während dem bearbeiten sichtbar)
                                                                                                                  Mischa Kräutli
                                                                                                                  Vetie - Immuno Altfragen
                                                                                                                  V R
                                                                                                                  Vetie Pharma 2019
                                                                                                                  Lea Schmidt
                                                                                                                  Vetie: Geflügelkrankheiten: Fragen aus dem Zyklus
                                                                                                                  Johanna Tr