Paper Details  
 
   

Has Bibliography
2 Pages
583 Words

 
   
   
    Filter Topics  
 
     
   
 

NT Security

When Windows NT was developed the designers ensured that security features were built in unlike when for example when MS Dos was developed. By default NT has a minimum-security standard as developers assumed that the average user would not want a highly secured operating system. As a result, administrators must configure or ‘harden’ the security levels to meet the users requirements. There are three levels :1)Minimum – no/few security features are used, however the spreading of viruses should still be taken into consideration2)Standard – most machines store some sort of sensitive information, which is where the use of log-ons, passwords etc apply3)High-level - used when highly sensitive data is involved, where there is a risk of theft etcAuthentication an important area of security in relation to access controls, both to the system itself and to particular applications. NT allows the creation of accounts, which can be assembled into separate sections of e.g. users and administration. Both are set with separate privileges depending on the User ID and the password the user enters. The permission controls are based on security Ids found in a security access token which determines the users privileges. However in highly secured systems fingerprints can be used for authentication. Also, the built – in Guest account can restrict entry for casual users. As well as tracking the users access controls, NT also manages the applications access controls by using a subject. These can be divided into two classes, a simple subject and a server subject. With regards to the simple subject, depending on the users access token, it will be allocated a security context. While the server subject is implemented as a protected server which uses the security context of the client when acting on behalf of the client.There are two file systems available for NT, these include the FAT (File Allocation Table) system and the NTFS....

Page 1 of 2 Next >

    More on NT Security...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA