null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
60791
Computer Security U8 - Windows 2000 Security
Descrição
Mapa Mental sobre Computer Security U8 - Windows 2000 Security, criado por Nick.Bell2013 em 29-04-2013.
Mapa Mental por
Nick.Bell2013
, atualizado more than 1 year ago
Mais
Menos
Criado por
Nick.Bell2013
mais de 11 anos atrás
59
9
0
Resumo de Recurso
Computer Security U8 - Windows 2000 Security
Introduction
Memory & Privilege levels
linear 32-bit (4GB) address space
Object-based security
Securable objects
Active Directory
objects with attributes
programs
processes
threads
Basic concepts
Principals
Security principals
Security Identifiers (SIDs)
groups
security
e-mail distribution
Objects
instance of a class
Classes
Object Handler
controls objects
kernel objects
executive obejcts
Active Directory
secure, distributed, scalable & replicated hierarchical directory service
integrates DNS
single point of admin (incl. security)
Objects
GUID
schema
container
can hold other objects
e.g. directory
leaf
Names
security principal
SIDs
LDAP Distinguished Name (DN)
Relative DN (RDN)
canonical
GUID
Domains & Organizational Units
domain controller
member server
organizational unit
organize and contain AD objects
Trust relationships
domain tree
domains with common schema/configuration
domain forest
trees with common schema
not a contiguous namespace in AD
managed domains
Domain models
single
master
multiple master
complete trust
Authentication
ID verification
interactive logon
network authentication
SAS
GINA DLL
Local Security Authority (LSA)
Kerberos
Key Dist. Centre (KDC)
ticket-granting ticket (TGT)
ticket-granting service (TGS)
Single Sign-On (SSO)
Access Control
DACL
object handles
handle table
28-bit pointer to object header
32-bit access mask
handle file entries
access control entires
access requests
generic access rights
(R)ead
(W)rite
(X)ecute
(A)ll
4 flags: (L)ock (A)udit (P)rotect (I)nherit
Control Access Rights
extended
property sets
validated writes
privilege
take-ownership
Impersonation
Principle of Least Privilege
Access Tokns
primary
LSA
Security Descriptor
control flags
owner
primary group
DACL
SACL
AC Entries
Access-denied
Access-allowed
System-audit
Security Management & Audit
Security Configuration Tool Set (SCTS)
Group Policy Objects (GPOs)
Audit
detect behaviour that violates policy
analyse security breaches
provide evidence for prosecution
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
SSCP Domains
Abdul Issa
Computer Security Potential Flaws
Rob Speirs
Processo Administrativo Federal - Quiz I
tiago meira de almeida
ESTRUTURA DAS PALAVRAS - Morfologia
Viviana Veloso
Recrutamento e seleção de pessoas
brunocmt
Direito Constitucional
GoConqr suporte .
12 maiores atributos dos líderes
Liliane Tubino
O que estudar para a OAB
GoConqr suporte .
Tempos Modernos 80 Anos
Marcus Vital
TIGRES ASIÁTICOS
Savio Andrade
Explore a Biblioteca