Security Technologies Flashcards
Directory permissions: Read
Effect on folder: User can view the contents of a folder and any subfolders.
Effect on file: User can view the contents of the file.
Directory permissions: Write
Effect on folder: Read permission, plus the user can add files and create new subfolders.
Effect on file: Read permission, plus the user can make changes (write) to the file.
Directory permissions: Read & Execute
Effect on folder: Read permission, plus the user can run executable files contained in the folder. This permission is inherited by any subfolders and files.
Effect on file: Read permission, plus the user can run a file if it is executable.
Directory permissions: List Folder Contents
Effect on folder: Read permission, plus the user can run executable files contained in the folder. This permission is inherited by subfolders only.
Effect on file: N/A
Directory permissions: Modify
Effect on folder: Read and Write permissions, plus the user can delete the folder.
Effect on file: Read and Write permissions, plus the user can delete the file.
Directory permissions: Full Control
Effect on folder: Read, Write, and Modify permissions and the user can delete all files and subfolders.
Effect on file: Read, write, modify, and delete the file.
Security Enhanced Linux (SELinux)
A component included with many Linux distributions that allows more options for setting file and folder permissions.
Inherited permissions
The permissions assigned to a parent object that flows down and apply to a child object.
Credential Manager
A Control Panel utility which allows individual users to access their stored user names, passwords, and certificates.
Folder redirection
A flexible approach which allows an administrator to decide which folders are stored only on the network and which are copied locally.
Email filtering
A software-based tool that can sort or block emails from being delivered to a user’s inbox based on the configured criteria.
Port security
A switch feature that tracks device MAC addresses connected to each port on a switch, and allows or blocks traffic based on source MAC addresses.
Proxy server
A server which intercepts and mediates communications between internal and external hosts on the network.
File attributes: R
Read-Only - Allows a user or the operating system to read a file, but not write to it.
File attributes: A
Archive - Specifies the file should be backed up.
File attributes: S
System - Indicates the file is a system file and shouldn’t be altered or deleted. By default, system files are hidden.
File attributes: H
Hidden - Suppresses the display of the file in directory lists, unless you issue the command to list hidden files.
File attributes: D
Directory - Indicates a folder or sub-folder, differentiating them from files.
File attributes: I
Not content-indexed - Windows has a search function that indexes all files and directories on a drive to achieve faster search results.
File attributes: C
Compressed - On an NTFS file system volume, each file and directory has a compression attribute. Other file systems may also implement a compression attribute for individual files and directories.
File attributes: E
Encrypted - On an NTFS file system volume, each file and directory has an encryption attribute as part of the Encrypting File System (EFS).
Linux permissions: Read (r)
User can view the contents of a file.
Linux permissions: Write (w)
User can write to (modify) the contents of a file or directory.
Linux permissions: Execute (x)
User can run an executable file and view the contents of a directory.
Windows security features: Windows registry
A database containing low level settings for all aspects of the Windows operating system as well as for some installed applications. Individual entries or keys in the database can be restricted by ACLs, just like Windows services and NTFS files.
Windows security features: Local Users and Groups
A MMC snap-in (also available in Computer Management) which allows you to centrally manage users and groups on the computer. You can use it to create, rename, or delete users and groups; add users to groups; and set other user settings such as password policies, logon scripts, and folder locations.
Windows security features: Local Security Policy
A utility which allows you to configure a wide range of security settings for the local computer, including those related to account management, default user rights, network functions, and so on. It works primarily by changing registry settings, but provides a much safer and more focused interface than REGEDIT.
Windows security features: Local Group Policy Editor
A utility which allows you to edit group policies for the entire computer. Local group policies include the same settings as the local security policy, but also many other Windows settings. Critically, they can apply to specific users or groups, rather than all users on the computer. Group policies don’t actually edit the registry directly. Instead, when a group policy is loaded its settings override the corresponding registry keys.
Windows security features: Security Account Manager
A database which stores user passwords and performs authentication of local users. Users don’t directly interact with the SAM. It just stores passwords in a hashed format that can’t easily be extracted.
Windows security features: Credential Manager
A Control Panel utility which allows individual users to access their stored user names, passwords, and certificates. These may be from websites, or from other network services. Unlike SAM, you can view your passwords and other credentials in Credential Manager, but Windows still protects them from view by any other user.
Windows security features: User Account Control
Notifies you when an action will change Windows settings and gives you an option to stop. This applies even when you are logged on as an administrator. By default, UAC only notifies you when an application wants to change Windows settings on your behalf, but you can configure it to also notify you when your actions will change system settings.
Windows security features: Windows Resource Protection
A feature that runs in the background to protect critical system files, folders, and registry keys from unplanned alterations. WRP uses a combination of ACLs for each resource, and backed up copies of files and settings to restore from in case one is altered. Even the Administrator can’t directly alter resources protected by WRP; instead, changes must go through the Windows Module Installer service.
Active Directory security features: Active Directory Lightweight Directory Services (AD LDS)
provides directory services independent of the Windows domain model. You might find it used it networks which need authentication for distributed applications, or when it’s useful to install a directory on a computer that isn’t a domain controller.
Active Directory security features: Active Directory Federation Services (ADFS)
a single sign-on system that uses the common internet standard SAML instead of LDAP. Unlike LDAP it is intended for use over the internet, and for integrating services with other organizations. You’re likely to find it used to integrate web applications with Active Directory, especially those which aren’t directly compatible with Windows authentication systems.
Active Directory security features: Active Directory Certificate Services (AD CS)
allows the Active Directory network to maintain a public key infrastructure. It creates, validates, and revokes digital certificates wherever they might be needed on the network - to identify users or computers, encrypt files or email, or establish secure VPN connections.
Active Directory security features: Active Directory Rights Management Services (AD RMS)
an information rights management service that can encrypt and limit access to specific types of information on the domain, such as emails, Word documents, webpages, and so on. It can be used to centrally secure access to sensitive information wherever it is stored on the domain