40 likes | 141 Vues
Explore a layered/barrier approach, host-based security, USB administration, and Active Directory in network security. Understand access control models, tokens, single sign-on, and principal of least privilege. Dive into ACL, security groups, physical security, and GPO management.
E N D
Section 0 and Section 1 Intro, Access Control, and more Namuo – CIS 160
Feedback? • Layered/Barrier approach • Host-based security • Disable USB.adm • Security formula • Active Directory • X.500 standard (ITU) • Novell 1993 • Microsoft 1999 Section 0
Group Policy Management • 1.1 Access Control Models • NTFS is DAC • 1.2 Tokens, SmartCards (CAC cards) • 1.2 Single Sign-on (college portal) • 1.3 Active Directory Users and Computers • GPO inheritance Section 1
1.4 Authorization • ACL and inheritance • Security group vs Distribution group • 1.5 Physical security • 1.6 Principle of least privilege Section 1 continued