210 likes | 225 Views
Explore the comprehensive security mechanisms in Windows 2000, from access controls to auditing, logon procedures, and more. Understand the importance of safeguarding multi-user systems, preventing unauthorized access, and protecting against corruption. Dive deep into security components, object protection, access checks, security identifiers, and auditing processes. Delve into Windows 2000 security descriptors, access control lists, and authentication examples to enhance system security comprehensively. Learn about Windows 2000 logon components and initialization procedures for a secure computing environment.
E N D
Lecture 11 Security xlanchen@04/29/2005
Why security? • Multi-user system must • preventing unauthorized access • Providing Security configuration mechanism • Obvious security mechanisms • Accounts/passwords/file protection • Others mechanisms • protecting OS from corruption • preventing less privileged users from performing privileged actions • not allowing user programs to adversely affect the programs of other users or OS Understanding the Inside of Windows2000
Contents • Security Ratings • Security System Components • Protecting Objects • Security Auditing • Logon Understanding the Inside of Windows2000
Security Ratings • TCSEC • C2 security rating • A secure logon facility • Discretionary access control • Security auditing • Object reuse protection • B-level security • Trusted path functionality • Trusted facility management Understanding the Inside of Windows2000
Security System Components Understanding the Inside of Windows2000
Lsass • Local security authority subsystem Understanding the Inside of Windows2000
Protecting Objects • the essence of discretionary access control and auditing • The objects that can be protected on 2K include • files, devices, mailslots, pipes (named and anonymous), • jobs, processes, threads, events, • mutexes, semaphores, shared memory sections, • I/O completion ports, LPC ports, • waitable timers, access tokens, • window stations, desktops, network shares, • services, registry keys, and printers Understanding the Inside of Windows2000
Access Checks Understanding the Inside of Windows2000
Security Identifiers Understanding the Inside of Windows2000
Tokens Understanding the Inside of Windows2000
Impersonation Understanding the Inside of Windows2000
Restricted Tokens Understanding the Inside of Windows2000
Security Descriptors & Access Control • ACL Assignment • Determining Access Understanding the Inside of Windows2000
Discretionary access-control list (DACL) Understanding the Inside of Windows2000
ACL Assignment Understanding the Inside of Windows2000
Determining Access Understanding the Inside of Windows2000
Access validation example Understanding the Inside of Windows2000
Security Auditing • Flow of security audit records Understanding the Inside of Windows2000
Process and thread security structures Understanding the Inside of Windows2000
Logon • Components involved in logon Understanding the Inside of Windows2000
Winlogon Initialization • \Windows\WinSta0 • three desktops • an LPC connection • a window class data structure • Registers the SAS • Registers the window • User Logon Steps Understanding the Inside of Windows2000