当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

中国科学技术大学:《安全操作系统》课程教学资源(PPT课件讲稿)第八讲 主流操作系统中的安全技术——Windows GOS Windows Security

资源类别:文库,文档格式:PPT,文档页数:88,文件大小:4.73MB,团购合买
点击下载完整版文档(PPT)

主流操作系统的安全技术 Linux/Unix安全技术 Vindows安全技术 1958 嵌入式系统实验室 2/90 EMBEDDED SYSTEM LABORATORY SUZHOU INSTITUTE FON ADVANCED STUDY OF USTC

2/90 主流操作系统的安全技术 ❖Linux/Unix安全技术 ❖Windows安全技术

Windows的发展历史1 An Historical Perspective 1980 1985 1990 1995 2000 2005 8182838486878889 919293949697989901020304 Windows 1.01 Windows98 Windows XENIX Windows 3.0 Windows95 Windows NT 3.51 MS-DOS 1.0 Windows 3.1 Windows for Workgroups Windows NT 3.5 Windows Server 2003 Windows NT 3.1 Windows Windows 2000 WindowsMie 16-Bt 32-Bt 验室 From:http://blog.chinaunix.net/photo/19782_071112183558.jpg

3/90 Windows的发展历史1 From:http://blog.chinaunix.net/photo/19782_071112183558.jpg

Vindows的发展历史2 Windows 1.0 2.0 3.0 3.1 Medla Center 2003 Media Center 2005 XP foc x64 31 3.11 95 98 Millennium Fundamentals for Legacy PCs 3.11 WMWG Starter Edition OSR1 98SE OSR2 XP OSR2.5 XP SP2 Vista OSR3 Home NT Professional 2000 XP for IA64 Server Media Center 2003 Workstation Professional Embedded Server Server Multiple Advanced Server Advanced Server varants Data Center Adv Server IA64 Datacenter IA64 1985 1987 1990 1992 1995 1998 2000 2002 2006 From:http://www.xuecs.com/img/upload/osx/windows.jpg 嵌入式系统实验室 4/90 EMBEDDED SYSTEM LABORATORY 百uE料DUAN0 ITUTE FOR AOVANCED5 FUOY DF U百TC

4/90 Windows的发展历史2 From:http://www.xuecs.com/img/upload/osx/windows.jpg

Windows NT 4.0 architecture Windows NT 4.0 Win16 Architecture MS-DOS NTVDM Win32 subsystem POSIX Console 082 Security subsystem subsystem subsystem Misc.ervironment functions User MMode Kernel MMode Executive Services SystemServices lO Manager Window Cache Manager Object Security Local Virtual Manager Process Procedurel File System Manager Reference Memory Monitor Manager Call Manager Graphics Drivers Facilty Devicelnterface Network (IN32KSYS) Drivers hology of China Microkernel Graphics Hardware Device Device Drivers Hardware Abstraction Layer (HAL) Drivers 嵌入式系统实验室 Hardware 5/90 EMBEDDED SYSTEM LABORATORY SUZHOU INSTITUTE FON ADVANCED STUDY OF USTC

5/90 Windows NT 4.0 architecture

Windows 2000 architecture Win32 POSIX 0S2 Application Application Application Work- station Server Securty Win32 POSIX 0S/2 service service Integral subsystems Environment subsystems User mode Executive Services 量b。 lO IPC 门smer Process PnP 品 n。。t 门n4日 GDI Object Manager Executive Kernel mode drivers Microkernel Hardware Abstraction Layer(HAL) Kernel mode Hardware From: http://upload.wikimedia.org/wikipedia/commons/5/ 5d/Windows_2000_architecture.svg 嵌入式系统实验室 6/90 EMBEDDED SYSTEM LABORATORY SUZHOU INSTITUTE FON ADVANCED STUDY OF USTC

6/90 Windows 2000 architecture From: http://upload.wikimedia.org/wikipedia/commons/5/ 5d/Windows_2000_architecture.svg

Vindows安全:NT是分水岭 NT设计目标:TCSEC标准的C2级 >在用户级实现自主访问控制 >提供对客体的访问的审计机制 >实现客体重用 Windows NT 4.0 1958 >1999年11月通过美国国防部TCSEC C2级安全认证 >Windows NT安全子系统 ●提供身份鉴别、自主访问控制、客体共享和安全审计等安全 特性。 ● 主要由本地安全授权(LSA)、安全账户管理(SAM)和安 全参考监视器(SRM)等组成 嵌入式系统实验室 7190 EMBEDDED SYSTEM LABORATORY 5uE料DUN0 ITUTE FOR AOVANCED5 UOY DF U百TC

7/90 Windows安全:NT是分水岭 ❖NT设计目标:TCSEC标准的C2级 ➢在用户级实现自主访问控制 ➢提供对客体的访问的审计机制 ➢实现客体重用 ❖Windows NT 4.0 ➢1999年11月通过美国国防部TCSEC C2级安全认证 ➢Windows NT安全子系统 ⚫提供身份鉴别、自主访问控制、客体共享和安全审计等安全 特性。 ⚫主要由本地安全授权(LSA)、安全账户管理(SAM)和安 全参考监视器(SRM)等组成

"[security]...really is a journey rather than a destination." 1958 From:Hacking Exposed Windows:Windows Security Secrets Solutions Bill Gates,"Trustworthy Computing",January 2002 Refer:http://www.microsoft.com/mscorp/execmail/2002/07-18twc.mspx 嵌入式系统实验室 8/90 EMBEDDED SYSTEM LABORATORY 5uE料DUAN0 ITUTE FOR AOVANCED5 FUOY OF U百TC

8/90 From:Hacking Exposed Windows: Windows Security Secrets & Solutions Bill Gates,“Trustworthy Computing”,January 2002 Refer:http://www.microsoft.com/mscorp/execmail/2002/07-18twc.mspx “[security]… really is a journey rather than a destination

security wheel What asset am I trying to secure? What are the asset's security requirements? What are the risks unique to that asset's security requirements? How do I prioritize and most efficiently address those risks(especially those with heavy impact such as industry and regulatory compliance requirements)? Plan Incident response(IR) Education and training ●Remediation Communications ●Audit resolution Respond Prevent Security operations ●Recovery Rinse and Repeat Security architecture Detect Automated vulnerability scanning Security event and information management(SEIM) Intrusion detection systems (IDS) Anomaly detection systems(ADS) Security audits (including penetration testing) 、嵌入式系统实验室 From:Hacking Exposed Windows:Windows Security Secrets Solutions

9/90 security wheel From:Hacking Exposed Windows: Windows Security Secrets & Solutions

Kernel User 物理逻辑 Security context Connect As.. ☒ By defaut,you ml connect to the network foider as RIOUoel To connect as anocher user,enter their user name and password below. User name: user Eassword: 88088●0年 Attacking Windows security using both kernel and user mode approaches

10/90 The Windows Security Architecture from the Hacker’s Perspective Attacking Windows security using both kernel and user mode approaches 物理/逻辑

Vindows安全技术 Vindows NT/2000/XP中的常用安全技术 >Windows!身份验证与访问控制 >Windows审核机制 >Windows注册表 >Windows加密文件系统 >Windowsz基准安全注意事项 Windows2003中的新安全技术简介 of Science and Technol 嵌入式系统实验室 11/90 EMBEDDED SYSTEM LABORATORY SUZHOU INSTITUTE FON ADVANCED STUDY OF USTC

11/90 Windows安全技术 ❖Windows NT/2000/XP中的常用安全技术 ➢Windows身份验证与访问控制 ➢Windows审核机制 ➢Windows注册表 ➢Windows加密文件系统 ➢Windows基准安全注意事项 ❖Windows 2003中的新安全技术简介

点击下载完整版文档(PPT)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共88页,可试读20页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有