Presentation is loading. Please wait.

Presentation is loading. Please wait.

MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control.

Similar presentations


Presentation on theme: "MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control."— Presentation transcript:

1 MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control Lists & Entries

2 MA194Using WindowsNT2 General Security In general, WindowsNT was designed with an eye towards security, both from a network aspect as well as an individual or user account point of view. When you first log into a WindowsNT system (workstation or server), there are a series of checks that are performed by the system.

3 MA194Using WindowsNT3 Internal vs. External Security Security can be broken into two areas, internal and external. By external, we refer to the set of security issues that deal with networked environments. User authentication, machine and domain relationships and trusts and user profile storage come into play here. To better understand these, we would need to look at the NT approach networking first. Today, we’ll instead look at the internal security issues.

4 MA194Using WindowsNT4 Internal security issues User identity verification –The operating system must have some way of uniquely identifying you from another user –The operating system also needs a way to insure that it IS you and not someone else Filesystem permissions –Controlling access to various documents, programs and functions of the system you use

5 MA194Using WindowsNT5 Steps taken to try to login CTRL-ALT-DEL brings up login window User account and password are entered User’s input is passed to the Security Account Manager (SAM) SAM looks up entry in the Security Accounts Database (SAD) System returns an access token for the user or an error message indicating failure.

6 MA194Using WindowsNT6 Steps taken after login The system creates a process for the user and associates the access token to it and starts up the initial programs for the user. The access token contains the information the system will use to grant or deny access to various files, programs and functions. Thus, getting the access token right is a must.

7 MA194Using WindowsNT7 Access Token information User’s ID (SID) - Assigns a user’s ID for this token. Group ID (GID) - Lists the groups to which the user belongs. Privileges - System functions the user is allowed to do (print queues, backups, etc) Primary group - Default entry of GIDs Default ACL

8 MA194Using WindowsNT8 Object Permissions An object (a file, program, folder, printer, etc.) has a list of permissions associated with it that determines who has the ability to access, use or modify the object. Each entry in the list is called an Access Control Entry (ACE). All of the entries are collectively known as an Access Control List (ACL).

9 MA194Using WindowsNT9 Assigning Permissions Assigning permissions to a file, for example, means generating an ACL and listing who has permission to do what to the file. The who part of an ACL may be a user or a group (of users), whichever youi prefer. The what part of the ACL is a little trickier.

10 MA194Using WindowsNT10 Users vs. Groups For easier administration, a list of users can be put into a group and permissions assigned to the group instead of each individual user. As a result, each user (account) belongs to at least one group. Often, a user will be assigned to several groups, based on the administrator’s preference, the common tasks and resources for some users, etc.

11 MA194Using WindowsNT11 File Access Permissions Read - Access or view the file contents Write - Modify the contents of the file Execute - Execute (that is, run) the program Delete - Delete the file (different than write) Change Permissions - Change these Take Ownership - Change the owner to you

12 MA194Using WindowsNT12 File Access Types No Access - Nothing is granted (El Zilcho) Read - Actually allows Read and Execute Change - Read, Write, Execute and Delete Full - Everything listed in the previous slide Certain sets of permissions are commonly used and, as a result, are listed as Access Types in a pull down menu. They are:

13 MA194Using WindowsNT13 Folder Access Types No Access - Nothing is granted (El Zilcho) List - Actually allows Read and Execute Read - Same as list but may include the files within the directory as well. Add - Write and Execute Add & Read - Read, Write, Execute. It may also includes the files within the folder. Change - Read, Write, Execute and Delete Full - Everything listed in the previous slide

14 MA194Using WindowsNT14 Setting a file’s permissions Bring up the file’s Permissions Screen –Highlight the file (left mouse click) –Bring up the Properties screen (right click) –Choose Security (left click on tab) –Choose Permissions Choose either a group or an individual user Select the Access Type or choose Special to set the permissions individually.

15 MA194Using WindowsNT15 Notes about file permissions If the Security tab doesn’t show up in the Properties section, the filesystem may not be an NTFS (that is, it doesn’t support the security features of NTFS) If clicking on the Security tab results in an error message (“Access Denied” or “Nice Try, Shnookums”), that means the ACL denies you access to the file.

16 MA194Using WindowsNT16 Steps taken to open an object WindowsNT has bundled security throughout the levels of the OS. The Security Reference Monitor (SRM), besides sounding important, is in charge of verifying/granting access to files, directories, etc. The first time you access a file, the system checks with the SRM first. The SRM checks the access token against the ACL for the object and either grants or denies access to the object.

17 MA194Using WindowsNT17 Fun HTTP sites Http://www.crayon.net http://www.ms.uky.edu/~chaney - Choose ‘Danews’ from the top The IRS Home page (it’s that time again) http://www.washingtonpost.com

18 MA194Using WindowsNT18 Resolving access conflicts What if a user is granted access but the group they belong to is denied access? Or if the user belongs to ten groups, nine of which has access and one of which doesn’t? Denied. NT checks the ‘Deny’ list first and stops looking as soon as it finds a hit.


Download ppt "MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control."

Similar presentations


Ads by Google