Windows NT Security
نویسنده
چکیده
Revised June 1, 1998 Page 1 of 15 Preventing unauthorized access to sensitive data is essential in environments in which multiple users have access to the same physical or network resources. Operating systems (OSs) and individual users must be able to protect files, memory, and configuration settings from unauthorized viewing and modification. OS security includes obvious mechanisms such as accounts, and passwords. However, OS security also includes less-obvious mechanisms for protecting the OS from corruption, preventing less-privileged users from performing actions such as rebooting the computer, and preventing the programs of less-privileged users from adversely affecting the programs of other users or the OS.
منابع مشابه
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inputs are filtered out by the program, or to ensure that only trusted people can access those inputs. In the second approach, we sure do not want to put such constraint on every input, instead, we only want to restrict t...
متن کامل50-30-19 Windows NT Architecture
Windows NT is a 32-bit, preemptive multitasking operating system that includes comprehensive networking capabilities and several levels of security. Microsoft markets two version of Windows NT: one for workstations—appropriately named Windows NT Workstation—and a second for servers—Windows NT Server. This article, which describes the workings of the NT architecture, collectively references both...
متن کاملApplying Security Configurations to a Large Number of Windows NT Computers Without Visiting Each Machine
Security administration in large Windows NT sites is a very challenging task. Windows NT’s environments has a reputation to be a system requiring hands-on administration, that is, it needs a manual by-hand work. It is necessary the administrator's physical presence in each one of the machines every time it needs to do some modification or configuration. This paper presents a case study of a cha...
متن کاملA Quick Take on Windows Security Evolution
A while back I wondered how software developers’ concerns about security evolved over time. Obviously, studying under-the-hood changes would be a major research undertaking—and frankly beyond my interest. But mightn’t there be a feasible shortcut, a sort of poor man’s time-series analysis of security concerns? Behind this question was my speculation that the tightening user-controlled security ...
متن کاملSecurity Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a centrally administered security policy under the Windows NT operating system platform. The mechanism provides mandatory access control, encryption, and auditing on an individual file basis across distributed systems whi...
متن کاملInformation Security in Multiprocessor Systems Based on the X86 Architecture
Debugging multiprocessor systems is much more tedious and complex because of the limited support offered by debuggers for solving synchronization problems for these types of processor systems. The most advanced kernel mode debugger available for Windows NT gives multiprocessor support by completely stopping one of the processors while the code is being debugged in the other processor.We will ta...
متن کامل