
Résumé
Contents
Introduction xxi
Self-Assessment xxxiii
Chapter 1
Microsoft Certification Exams 1
Assessing Exam-Readiness 2
The Exam Situation 3
Exam Layout and Design: New Case Study Format 4
Multiple-Choice Question Format 5
Build-List-and-Reorder Question Format 7
Create-a-Tree Question Format 8
Drag-and-Connect Question Format 10
Select-and-Place Question Format 11
Microsoft’s Testing Formats 13
Strategies for Different Testing Formats 15
The Case Study Exam Strategy 15
The Fixed-Length and Short-Form Exam Strategy 16
The Adaptive Exam Strategy 17
Question-Handling Strategies 18
Mastering the Inner Game 19
Additional Resources 20
Chapter 2
Security Overview 25
The Key Questions 26
Required Technical Background 27
IT Controls and Corporate Objectives 28
IT Security Controls 28
Corporate Objectives 30
Physical and Logical Access 30
System Security Audits 31
Risk Management 32
Security Requirements 33
Deployment of a Security System 34
Problems with Procedural Paradigms 34
A Microsoft Historical Perspective 35
Key Historical Trends 36
Active Directory 38
Integrating Security Account Management 41
Physical Organization 42
A Layered Security Paradigm 43
Evaluating Risks 45
Documenting Nontechnical Procedures 48
Using Security Protocols 49
Mapping Security Technologies 49
Competencies 50
Practice Questions 53
Need to Know More? 58
Chapter 3
Public Key Infrastructure (PKI) 59
Applying the Basic Security Scheme 61
Encrypted Exchanges 62
Symmetric Key Encryption 63
Cryptanalysis 65
Distribution Problems 66
Asymmetric Key Encryption 66
Active Interception 68
Authentication and Integrity Controls 68
One-Way Hash Functions 69
The Windows 2000 Implementation 70
Entity Authentication through Proof of Possession 70
Secret Key Agreements 71
Bulk Data Encryption 71
Digital Envelope 71
Certificates and Key
Management Services 72
Digital Signatures 73
Extensibility 73
Certificates 74
The PKI Suite 76
Microsoft CryptoAPI 78
Global Encryption Policies 79
Practice Questions 80
Need to Know More? 85
Chapter 4
Kerberos Security 87
MIT Kerberos: The Basis for
Microsoft’s Implementation 88
Goals and Requirements 88
Assumptions 89
Components of the Protocol 89
Version 5 Enhancements 90
Microsoft’s Implementation of
Kerberos 5 91
Public Key Infrastructure (PKI) 92
Ticket Structure 92
Other Enhancements 92
KDC 94
Cross-Domain Authentication 98
Delegation of Authentication 100
Account Database 101
Kerberos Policy 101
Interoperability 102
Kerberos and Alternative Protocols 103
The Big Picture 103
SSPs 104
A Kerberos Case Study 110
ExamCram Ltd.: Sharing Resources with
Other Companies 110
Commentary 112
Practice Questions 114
Need to Know More? 123
Chapter 5
IP Security Architecture 125
IP and Security 126
Examples of IPSec Deployment 128
Building upon IPSec 129
Industry Standards 131
Security Protocols 131
IPSec Architecture 132
Encryption Techniques 133
Key Management Protocols 134
TCO 135
Software Upgrades 135
Training 135
Cryptographic Key Management 136
Deployment Strategy 136
Analyze Information 136
Create Communications Scenarios 136
Determine Security Levels 137
Build Security Policies 137
An IP Security Architecture Case Study 141
ExamCram Ltd.: Considering Network Layer
Security Solutions 141
Commentary 142
Practice Questions 144
Need to Know More? 150
Chapter 6
Remote Connectivity Issues 153
An Overview of VPN 154
Security Protocols 155
Basic Remote Access Models 156
Tunneling 158
NAT 159
VPN Security Protocols 159
Design Considerations 160
IPSec Tunnel and Transport Modes 162
Security Protocols Compared 162
VPN Management Policies 164
Remote Access Policy Management 164
Client Management 165
Firewall Technologies 165
Firewall Components 166
Firewall Architectures 167
Firewall Policies 171
Practice Questions 173
Need to Know More? 180
Chapter 7
Other Network Issues 183
IIS 5 185
Network Addressing and Domain Name Security 185
IIS Authentication Security 186
IIS Permissions 189
Combining NTFS and IIS Permissions 189
Other Security Methods 190
Secure Channel (SChannel) Protocols 191
SSL3/TLS1 192
Deployment of SSL 192
Certificate Services 193
Deploying Security for
Distributed Services 194
SSL in Windows 2000 195
Application Standards and Policies 195
Authenticode 196
Secure Multipurpose Internet Mail Extensions (S/MIME) 197
Permission Management 197
Identity Management 198
Requirements for Identity Management 199
Deployment of Identity Management 200
Practice Questions 205
Need to Know More? 211
Chapter 8
Constructing a Security Policy 213
Steps in Planning Network Security 214
Identifying the User Population 216
Determining the Scope, Sizing, and Placement of IT Resources 217
Scoping Physical Assets 217
Scoping Logical Assets 218
Assessing Network Security Risks 220
Attack Modalities 220
Ring Model 221
Creating Secure Boundaries: Physical Scoping 224
Creating Secure Boundaries: Protocol Scoping 225
Creating Secure Boundaries: Application Scoping 225
Creating Secure Boundaries: Policy Scoping 225
Preparing a Support Team 226
Monitoring and Auditing 227
Help Desk Support 228
Developing a Security Deployment Plan 228
Creating and Publishing a Security Policy 228
Developing Strategies for Secure
Network Connections 228
Deploying Network Strategies for the Everyone Group 229
Deploying Network Strategies for Staff Members 229
Deploying Network Strategies for Users
and Applications 232
Deploying Network Strategies for Business Partners 233
A Security Policy Case Study 234
ExamCram Ltd. Reformulates Its Plans 234
Commentary 236
Practice Questions 243
Need to Know More? 248
Chapter 9
Identity Management Issues 251
Basic Directory Services 252
The X.500 Standard 253
LDAP v3 254
AD Directory Services 254
Objects and Attributes 255
Names/Name Resolution 256
Terms and Components 257
Access Control 262
Limiting Authenticated Access 262
Managing Access Control Lists 264
Managing Security Administration 264
Establishing Trust Relationships 266
Resources 267
EFS 267
Practice Questions 269
Need to Know More? 274
Chapter 10
Group Policy 275
The Concept of Group 276
Enhancements 277
Policies and Settings 278
Securing the Desktop Environment 281
Securing Access and Permissions 281
Policy Scoping: Secured Boundaries 282
Types of Policy Management 283
Group Policy Administration 284
Group Policy Processing 286
Permission Management Tools 290
Practice Questions 292
Need to Know More? 296
Chapter 11
Security and Configuration Tools 299
Centralized Administration Tools 301
WMI 301
WSH 302
TSA 302
RIS 303
AD 303
MMC 303
Desktop Management with IntelliMirror 304
The Security Configuration (SC) Tool Set 306
Security Areas 306
Security Settings 307
Tool Set Components 308
Security Templates 309
The secedit.exe Tool 310
Other System and Security Tools 312
IPSec Monitoring Tool 313
Certificate Services CLI Tools 313
Support Security Management Tools 314
Tools from the Windows 2000 Server Resource Kit CD 317
Practice Questions 319
Need to Know More? 323
Chapter 12
Other Technical Issues 325
Centralized Identity Management 326
Identity Administration 327
Community Management 328
Identity Integration 329
Standardizing Access for Users 330
Single Sign-On (SSO) 331
Securing Access for Users 333
Enhancement: Smart Cards 334
Terminal Services Uses 339
RIS 340
SNMP 341
SMB Signing 342
OS Migration vs. Coexistence 343
Interoperability/Migration: NetWare 343
Interoperability/Migration: Unix 345
Interoperability/Migration: Apple Macintosh 349
Extensibility: COM+ 350
Distributed Services 351
Security and RBAC 353
Practice Questions 354
Need to Know More? 358
Chapter 13
Sample Test 361
Chapter 14
Answer Key 389
Glossary 409
Index 421
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Coriolis |
Auteur(s) | Phillip G Schein |
Parution | 15/09/2000 |
Nb. de pages | 442 |
Format | 15 x 23 |
Couverture | Broché |
Poids | 673g |
Intérieur | Noir et Blanc |
EAN13 | 9781576107157 |
ISBN13 | 978-1-57610-715-7 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse