COSC573 Instructor: Professor Anvari Student:Shen Zhong ID#: 91871 Summer semester,1999 Washington.D.C.

Slides:



Advertisements
Similar presentations
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Advertisements

Encrypting Wireless Data with VPN Techniques
Welcome to Middleware Joseph Amrithraj
An Overview Of Windows NT System Student: Yifan Yang Student ID:
Chapter 13 Review Questions
COURSE: COMPUTER PLATFORMS
Extensibility, Safety and Performance in the SPIN Operating System Presented by Allen Kerr.
Chorus Vs Unix Operating Systems Overview Introduction Design Principles Programmer Interface User Interface Process Management Memory Management File.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
1 Module 1 The Windows NT 4.0 Environment. 2  Overview The Microsoft Operating System Family Windows NT Architecture Overview Workgroups and Domains.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Lecture 6.2 System Architecture: Overview IMS1002 /CSE1205 Systems Analysis and Design.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Starting Windows NT An overview and introduction Instructor: Professor: Dr. Anvari Students: Li-Yen Chen & Chunwa (Joanna) Chan Southeastern University.
Dreams in a Nutshell Steven Sommer Microsoft Research Institute Department of Computing Macquarie University.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Designing Active Directory for Security
Enterprise Computing With Aspects of Computer Architecture Jordan Harstad Technology Support Analyst Arizona State University.
Module 7: Fundamentals of Administering Windows Server 2008.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
Chapter 2 Operating System Overview
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Windows NT Operating System. Windows NT Models Layered Model Client/Server Model Object Model Symmetric Multiprocessing.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
Architectural Design Identifying system components and their interfaces.
Active Directory Overview n Course: Operating System n Professor: Mort Anvari n Student: Lina Si n Date: 09/07/02.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
Introduction to Microsoft Windows 2000 Integrated support for client/server and peer-to-peer networks Increased reliability, availability, and scalability.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
INFORMATION SYSTEM-SOFTWARE Topic: OPERATING SYSTEM CONCEPTS.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Operating System Organization Chapter 3 Michelle Grieco.
University of Toronto at Scarborough © Kersti Wain-Bantin CSCC40 system architecture 1 after designing to meet functional requirements, design the system.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
1 Windows NT A Distributed Architecture Windows NT A Distributed Architecture Professor: Mohamed Khalil CSE 8343 GROUP-A5 Dhaval Sanghvi Amit Sharma Ali.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 6 Rutgers University Center for Applied Computer Technologies Instructor: Chris Uriarte.
Introduction to Network Operating Systems Edited by/ Maysoon Al Duwais
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
System Programming Basics Cha#2 H.M.Bilal. Operating Systems An operating system is the software on a computer that manages the way different programs.
Lecture 4: Windows Operating Systems. Symmetric Multiprocessing Memory Operating System User Thread User Thread User Thread User Thread Operating System.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Module 1: Introduction to Windows 2000 and Networking.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
The Functions of Operating Systems Network Operating Systems (NOS)
1.3 Operating system services An operating system provide services to programs and to the users of the program. It provides an environment for the execution.
© Copyright Nanda Ganesan1 CHAPTER NT Domains. © Copyright Nanda Ganesan2 Chapter Objectives Give an overall picture of the NT networking architecture.
Networking Week #10 OBJECTIVES Chapter #6 Questions Review Chapter #8.
Computer System Structures
Oracle Solaris Zones Study Purpose Only
Chapter 3: Windows7 Part 4.
Chapter 3: Windows7 Part 1.
An Introduction to Computer Networking
Goals Introduce the Windows Server 2003 family of operating systems
B.Ramamurthy Chapter 2 : Appendix
Introduction to Network Security
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Operating Systems Structure
Presentation transcript:

COSC573 Instructor: Professor Anvari Student:Shen Zhong ID#: Summer semester,1999 Washington.D.C

A Comparison of the Security Architectures of Microsoft Windows NT 4.0 and Novell IntranetWare 4.11 Architecture Overview The Network Client Workstation Architecture Network Client Workstation Security Requirements Network Client Architecture Comparison File Server Architecture File Server Architecture Comparison Enterprise Application Server Architecture Comparison

Architecture Overview Windows NT Network ArchitectureIntranetWare Architecture

The Network Client Workstation Architecture Windows NT Workstation Client Software yes entrusted application yes Operating system: in a separate execution domain that applications cannot enter. Applications make requests using well-defined programming interfaces. Communicate securely with servers--by Secure Distributed Component Object Model and Secure Sockets Layer. IntranetWare client Software no entrusted application difficult Operating system: third party product--Sistex. Not run the same software as the server, but it can host any MS-DOS or Windows 3,1 based application Security kernel provides security--it intercepts all references to files and devices.

Network Client Workstation Security Requirements Authentication,Access Control(ACL),Auditing, (1) Windows NTIntranetWare Username/password allows users to determine ACL covers all system objects can set ACL on the applications auditing more flexibility Username/password by intercepting bus traffic No ACL on system objects cannot be tampered with by application auditing system is limited to events

Network Client Workstation Security Requirements Security Partitioning, Secure Authenticated Clients, Secure Communications, Security Management (2) Windows NTIntranetWare Application execute in the user domain,security kernel execute in the kernel domain; only authenticated clients of Windows NT can join and participate in the Windows NT domain; Windows NT provides built-in cryptographic technology for secure communication. the security subsystem is provided by add-on hardware and, consequently, is separate from the operating system ; IntranetWare does not provide any facilities for authenticating clients on the network ; IntranetWare uses packet signing to create an unforgeable signature for every message

Network Client Architecture Comparison (1)

Network Client Architecture Comparison (2)

File Server Architecture Comparison

Enterprise Application Server Architecture  The ability to protect the operating system and applications by implementing and enforcing security partitions.  The ability to minimize risk by allocating operating system privileges to applications with a fine level of granularity and control, resulting in the least amount of privilege given to applications.  The ability to extend the trusted perimeter by providing applications developers with the facilities to incorporate proven operating system security functionality into applications.

Enterprise Application Server Architecture Comparison

Conclusion(1) It is clear that IntranetWare provides a secure solution for file and print server requirements, but in an enterprise network environment is limited by the inflexibility of the file server architecture. The need for a separate secure client workstation, the inability to securely host back-end applications on the server,and the lack of consistency in the overall security model make IntranetWare poorly suited for an enterprise network platform, where security is a concern..

Conclusion(2) Windows NT provides not only secure file and print services, but also:  1: A consistent set of security features available on both Windows NT Workstation and Windows NT Server.  2: A suite of security functionality, including cryptographic functions, that can be incorporated into applications. 3:A single set of security abstractions across the entire network, simplifying security administration. The flexibility of the peer architecture, along with improved authentication, auditing, security partitioning, and manageability make Windows NT an excellent solution for secure network environments. Together, these features make Windows NT the choice platform for modern enterprise networks.