- Five management areas
- user administration
- resource management
- configuration management
- performance management
- maintenance
User Administration
There is a large section on creating user accounts. No sense going over this again. Look at the Administration notes before you do the NE exam.
Here are a couple of highlights from the section:Profiles
- used to structure a network environment for certain users
- this may be for security
- can also control the user's logon environment
- profiles include network connections and program items that appear when the user logs on. These can include:
- printer connections
- window sizes and positions
- icons
- mouse settings
- the screen arrangement of colors
- screen savers
Types of Groups
- Local Groups => things
- Global Groups => People
- Special Groups => internal system access -- Interactive, Network
- Built-In Groups => Administrator, Users, Operators Groups, Guests
Administrator Responsibilities
- Creating and Managing Accounts
- Security
- Training and supporting users
- Updating and implementing new software
- Archiving and data backup
- Preventing data loss
- Monitoring and regulating server storage space.
- Tuning the network
- Virus protection
- Troubleshooting
- Upgrading and replacing hardware
- Adding new computers
Security Models
Two different security models have evolved:- Password-protected shares (share-level): each resource has a password
- there are 2 levels of passwords: Read access and Full Control Access
- Access permissions (user level): Rights are assign on a user by user basis. More secure than the share level method.
Other Methods of Network Security
- Auditing
- audit records show the users that have accessed or attempted to access specific resources in security log
- Diskless computers
- Data Encryption
- data can't be stolen from the cable. When the data gets to the proper PC, a key, the code for deciphering encrypted data, decode the bits into understandable info.
- DES data encryption standard
- CCEP commercial COMSEC endorsement program
- Virus protection
- The 4 standard measures to take when protecting against viruses:
- Passwords to reduce the chance of unauthorized access
- Well planned access and privilege assignments for all users
- Profiles to structure the network environment
- a policy determining what software can be loaded
No comments:
Post a Comment