tailieunhanh - Windows 2000 Security - Chapter 3

This chapter starts you off with a discussion on the need for powerful distributed security before introducing you to the specifics of Windows 2000 distributed security services. It also reviews the new Windows 2000 security protocols, and protection of services and data. | Windows 2000 Security This chapter starts you off with a discussion on the need for powerful distributed security before introducing you to the specifics of Windows 2000 distributed security services. It also reviews the new Windows 2000 security protocols and protection of services and data. Windows 2000 Security While the new era of computing and Windows 2000 will bring forth many benefits it will also herald dastardly attempts to rob you beat you up and shut you down. There are many forces out there that have only one thing on their evil minds and that is to find any way to break into your network to plunder and pillage. Before you start building your new corporate infrastructure around Windows 2000 it will pay for you to become thoroughly versed in the security mechanisms the operating system offers and how to go about locking down your assets. Without a doubt it is probably the most secure operating system available today. Not only has it inherited the Windows NT C2 security compliance which was a ton of work for Microsoft and set the stage for a secure Windows 2000 but also if there were showbiz awards for security Windows 2000 would clean up at the Oscars the Golden Globes the Grammies and more. But before we get into Windows 2000 security specifics let s look at the problem holistically then you can evaluate your current security status before devising a security plan. You have probably heard the term everywhere so what does C2 security mean to you the network or server administrator Absolutely nothing. C2 security is nothing more than a . government sanction. The United States keeps a series of books that grade the security levels of operating systems. Windows NT passed with distinction because it was able to In This Chapter Encryption Kerberos IPSec Microsoft Certificate Services Logon and Authentication 66 Part I Windows 2000 Server Architecture demonstrate compliance of the C2 specifications. These specifications include object ownership object .

TỪ KHÓA LIÊN QUAN