System Security Administration for NT
نویسنده
چکیده
System security administration has, for the most part, been largely ignored as network administration has flourished. The result of this is that there are large installations of NT that need to be retrofitted with some form of security administration and management system. There are various third party tools available to assist in this endeavor, but they are somewhat general and not tailored to meet the needs of a particular user or organization. System administrators must therefore learn to mold their infrastructure to the tool, rather than the other way around. Often times, the tools may also be quite expensive, and difficult to learn and maintain.
منابع مشابه
Applying Security Configurations to a Large Number of Windows NT Computers Without Visiting Each Machine
Security administration in large Windows NT sites is a very challenging task. Windows NT’s environments has a reputation to be a system requiring hands-on administration, that is, it needs a manual by-hand work. It is necessary the administrator's physical presence in each one of the machines every time it needs to do some modification or configuration. This paper presents a case study of a cha...
متن کاملNT Security in an Open Academic Environment
Stanford Linear Accelerator Center (SLAC) was faced with the need to secure its PeopleSoftOracle business system in an academic environment that has no firewall. To provide protected access to the database servers for NT-based users all over the site while not hindering the lab’s open connectivity with the Internet, we implemented a pseudo three-tier architecture for PeopleSoft with Windows Ter...
متن کاملIdentifying factors affecting hospital holding administration in Social Security Organization in Iran using Structural Equations Modeling
Introduction: Hospitals, major components of health system, have a high contribution to healthcare resources. Therefore, considering the importance of hospital holding in effective and efficient hospital management, the current study aimed to identify and explain the role and importance of factors affecting hospital holding administration in Iran Social Security Organization. Methods: This was...
متن کاملThe Design of a Minimal Role Based Access Control System under the Windows Nt 4.0 Workstation Operating System
....................................................................................................................................................................2 Introduction................................................................................................................................................................2 Role Based Access Control Review ...........................
متن کاملFile System Security: Secure Network Data Sharing for NT and Unix
Sharing network data between UNIX and NT systems is becoming increasingly important as NT moves into areas previously serviced entirely by UNIX. One difficulty in sharing data between UNIX and NT is that their file system security models are quite different. NT file servers use access control lists (ACLs) that allow permissions to be specified for an arbitrary number of users and groups, while ...
متن کامل