Title: Security Properties
1Security Properties
- Authentication is the process of reliably
determining the genuine identity of the
communicating computer or user. - Integrity is the correctness of data as it was
originally sent. - Confidentiality ensures that data is disclosed
only to intended recipients. - Anti-replay ensures that datagrams are not
retransmitted.
2Cryptography
- Cryptography is a set of mathematical techniques
for encrypting and decrypting data. - Cryptography uses keys in conjunction with
algorithms to secure data. - The algorithm provides the infrastructure in
which the key is applied. - A number of well-known cryptographic algorithms
support security operations. - Microsoft Windows 2000 supports public key
cryptography. - A secret key is used in much the same way as a
public key.
3Public Key Cryptography
- Overview of public key cryptography
- Data encryptions
- Digital message signing
4Secret Keys
5Certificates
- Public key encryption assumes that the identity
of the key pair owner is established beyond
doubt. - A digital certificate is a set of data that
completely identifies an entity. - The recipient of the message can use the senders
public key to verify that the sender is
legitimate.
6X.509
- The term X.509 refers to the ITU-T standard for
certificate syntax and format. - The Windows 2000 certificate-based processes use
the X.509 standard. - At a minimum, certifications should contain
certain specific attributes.
7Certificate Revocation Lists (CRLs)
- Certificates can expire and become invalid.
- The Certificate Authority (CA) can revoke a
certificate for any reason. - The CA maintains a CRL.
8CA Hierarchy
- CAs can certify other CAs.
- The chaining of CAs provides several benefits.
9Microsoft Certificate Services
- Enables an organization to manage the issuance,
renewal, and revocation of digital certificates - Allows an organization to control the policies
associated with issuing, managing, and revoking
certificates - Logs all transactions
10Features of Certificate Services
- Policy independence
- Transport independence
- Adherence to standards
- Key management
11Certificate Services Architecture
12Processing a Certificate Request
13Enrolling Certificates
14CA Certificates
- The CA validates the identity of the individual
requesting the certificate and then signs the
certificate with its own private key. - A client application checks the CA signature
before accepting a certificate. - The CA certificate is a signature certificate
that contains a public key used to verify digital
signatures. - A self-signed CA certificate is also called a
root certificate. - CA certificates can be distributed and installed.
15Installing Certificate Services
- You can install Certificate Services by using
Add/Remove Programs in Control Panel. - Certificate Services supports four Certificate
Authority types. - You must supply information about the initial CA
that is created when you install Certificate
Services. - The advanced configuration contains options for
the type of cryptography algorithms to be used
for the CA that you are creating.
16Administering Certificate Services
17Secure Channel (SChannel) Authentication Package
18Smart Cards
- Smart cards can be used to store a users public
key, private key, and certificate. - To use a smart card, a computer must have a smart
card reader. - A smart card contains an embedded microprocessor,
a cryptography coprocessor, and local storage. - Windows 2000 supports PK-based smart card logon
as an alternative to passwords for domain
authentication.
19Authenticode
- Ensures accountability and authenticity for
software components on the Internet - Verifies that the software hasnt been tampered
with and identifies the publisher of the software - Allows software publishers to digitally sign any
form of active content
20Encrypting File System (EFS)
- EFS is an extension of NTFS that provides strong
data protection and encryption for files and
folders. - The encryption technology is based on use of
public keys and runs as an integrated system
service. - The encrypting users public key is used in the
encryption process. - Encryption and decryption are done transparently
during the I/O process. - EFS supports encryption and decryption of files
stored on remote NTFS volumes.
21Data Protection
- EFS uses a combination of the users public key
and private keys as well as a file encryption
key. - Windows 2000 uses the Data Encryption Standard X
algorithm to encrypt files.
22Data Recovery
- The Encrypted Data Recovery Policy is used to
specify who can recover data in case a users
private key is lost. - For security, recovery is limited to the
encrypted data it is not possible to recover
users keys.
23Encrypted Backup and Restoration
- Members of the Backup Operators group do not have
the keys necessary for decryption. - Encrypted data is read and stored in the backup
as an opaque stream of data.
24Fault Tolerance
- The processes of encryption and decryption are
automatic and transparent to users and
applications. - You can encrypt a file or folder in Windows
Explorer and from the command prompt.
25EFS Encryption
26EFS Decryption
27EFS Recovery
28Cipher Command-Line Utility
- The cipher command-line utility allows you to
encrypt and decrypt files from a command prompt. - The cipher command includes a number of
parameters.
29IP Security (IPSec)
- IPSec protects sensitive data on a TCP/IP
network. - The computer initiating communication
transparently decrypts the data by using IPSec. - The destination computer transparently decrypts
the data before passing it to the destination
process. - IPSec ensures that any TCP/IP-based communication
is secure from network eavesdropping.
30IPSec Policies
- Negotiation policies
- IP filters
- Security policies
31IPSec Components
- IPSec Policy Agent service
- ISAKMP/Oakley (IKE) protocols
- IPSec driver
32Example of IPSec Communication
33Kerberos Protocol in Windows 2000
- Kerberos is the default authentication provider
in Windows 2000 and the primary security
protocol. - Kerberos verifies the identity of the user and
the integrity of the session data. - Kerberos operates as a trusted third party to
generate session keys and grant tickets for
specific client/server sessions. - When the Kerberos service issues a ticket, it
contains a number of components. - The expiration period of a ticket is defined by
the domain policy.
34Kerberos Terminology
- Principal
- Realm
- Secret key
- Session key
- Authenticator
- Key distribution center (KDC)
- Privilege attribute certificate (PAC)
- Ticket
- Ticket granting ticket (TGT)
35Features of the Kerberos Protocol
- Mature open standard
- Faster connection authentication
- Mutual authentication
- Delegation of authentication
- Transitive trust
36Kerberos Authentication Process
37Kerberos Delegation
38Local Interactive Logon
39Domain Interactive Logon
40Security Configuration
- The Security Configuration and Analysis snap-in
can be used to directly configure local system
security. - You can import security templates and apply them
to the group policy object (GPO) for the local
computer.
41Security Analysis
- The state of the operating system and
applications is dynamic. - Regular analysis enables an administrator to
track and ensure an adequate level of security. - The Security Configuration and Analysis snap-in
enables quick review of security analysis
results. - You can use the Secedit command-line utility to
analyze a large number of computers.
42Security Configuration and Analysis Snap-In
43Security Templates Snap-In
44Group Policy Snap-In
- Through the use of GPOs in Active Directory
services, administrators can centrally apply the
security levels required to protect enterprise
systems. - The Group Policy snap-in allows you to configure
security centrally in the Active Directory store. - The security settings allow group policy
administrators to set policies.
45Windows 2000 Auditing
- Auditing is the process of tracking both user
activities and Windows 2000 activities on a
computer. - An audit entry in the Security log contains
several types of information. - You can use an audit policy to define security
events.
46Planning an Audit Policy
- You must determine the computers on which to set
up auditing. - Auditing is turned off by default.
- You can audit a number of events.
- You must determine whether to audit the successes
and failures of events. - Follow the recommended guidelines when
determining an audit policy.
47Configuring Auditing
- You can implement an audit policy based on the
role of the computer in the Windows 2000 network. - You must follow specific requirements to set up
auditing. - Setting up auditing is a two-part process.
48Setting an Audit Policy
49Auditing Access to Files and Folders
- You can set up auditing for files and folders on
NTFS partitions. - Once you set up an audit policy, you enable
auditing for specific files and folders and
specify which types of access, by which types of
users or groups, to audit.
50Auditing Access to Active Directory Objects
- You must configure an audit policy and then set
auditing for specific objects. - To enable auditing of access to Active Directory
objects, enable the appropriate policy in the
Group Policy snap-in. - To enable auditing for specific Active Directory
objects, use the Active Directory Users and
Computers snap-in.
51Auditing Access to Printers
- Enable the Audit Object Access policy, and then
enable auditing for the specific printer. - You can set up auditing on a printer in the
properties for that printer.
52Using Windows 2000 Logs
- Application log
- Security log
- System log
53Viewing the Security Log
54Locating Events
- When you first start Event Viewer, it
automatically displays all events that are
recorded in the selected log. - You can use the Find command to search for
specific events.
55Managing Audit Logs
- You can archive event logs and compare logs from
different periods. - You can configure the properties of individual
audit logs.
56Archiving Logs
- Archiving Security logs allows you to maintain a
history of security-related events. - You can use Event Viewer to save a log file,
clear all events, or open a log file.