III Network Resource Security Models
As mentioned in the NOS chapter, resources in a network can be shared based on user-level permissions, or based on share-level permissions. With share-level permissions, anyone who knows the password to a resource can access it. Access control is accomplished by providing some users with passwords to some resources, and other users with passwords to other resources and hoping that they dont share the resources passwords with each other without authorization. With user-level authentication, the network administrator must have explicitly permitted the user (or a group of users) access to the resource before they can get to it.
User-level security usually assumes the existence of a central server on which user information is stored, and on which user authentication occurs. In the following sections, well discuss a few important security aspects of popular network operating systems often used as servers in the corporate environment.
Home - Table Of Contents - Contact Us
CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004
Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.