Read this whole guide offline with no ads, for a very low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

NEW! Network+ N11-003 2005 Beta Exam Study Guide - Just $9!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Network+
 9  Chapter 1000:  Security in the Real World

Previous Topic/Section
III  Network Resource Security Models
Previous Page
Pages in Current Topic/Section
1
2
Next Page
Pop Quiz 1000.00
Next Topic/Section

IV  Windows NT Security
(Page 2 of 2)

Security Reference Monitor

The reference monitor checks to see if the user has permission to access a particular object. If this access is granted, the requested user action is performed. This module performs audit messages if enabled.

Guilty until proven innocent

In absence of a confirming access token, NT assumes negative access. In other words, it is pessimistic.


DACL (Discretionary Access Control List)

The NTFS (New Technology File System) available on Windows NT and its successors such as Windows 2000/XP, but not on Windows 9.x, supports the use of user-level network security by specifying at the OS level which users can and cannot access resources such as specific files and printers. Each resource has an associated DACL that specifies allow and deny access permissions for the resource, based on the user’s identity and security group memberships.

These OS-level permissions apply to both local accesses (to users sitting at the server’s console) and network accesses (by users connecting over the network). Simply giving network users Write permission to a network share does NOT mean that they can write to all files available at that share. The files’ DACL’s must also allow that user to write.

Event Logs

Windows NT includes logging for security-related events in its Security log, accessed via the Event Viewer utility.

Event Viewer

Windows NT includes event logs for Security, System and Application events.

These logs are accessed via the Event Viewer utility.



Previous Topic/Section
III  Network Resource Security Models
Previous Page
Pages in Current Topic/Section
1
2
Next Page
Pop Quiz 1000.00
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Network+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004

Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.