Week Fifteen - A Guide to Managing and Maintaining Your PC...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 19 Security Essentials
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
A+ Guide to Managing and Maintaining Your PC, 7e 2 Controlling Access to Secured Resources Controlling access in Windows – Authentication • Proves that an individual is who he says he is – Authorization • Determines what an individual can do in the system after authentication – Physical security in place is also required
Background image of page 2
A+ Guide to Managing and Maintaining Your PC, 7e 3 Authenticate Users Local computer and network users – BIOS settings control computer access – Local user account login to Windows Large networks – Domain controllers manage network authentication Most common authentication method – Password Other methods – Biometric data – smart cards
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Authenticate Users (cont’d.) Creating a password reset disk – Open the User Accounts window in Control Panel • Vista: click Create a password reset disk • XP: click Prevent a forgotten password A+ Guide to Managing and Maintaining Your PC, 7e 4 Figure 19-8 Create a password reset disk Courtesy: Course Technology/Cengage Learning
Background image of page 4
Authenticate Users (cont’d.) Authenticate users for larger networks – User accounts and passwords sent over the network when authenticating the user must be encrypted – Encryption protocols • CHAP (Challenge Handshake Authentication Protocol) • Kerberos: Windows Vista/XP default A+ Guide to Managing and Maintaining Your PC, 7e 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Authenticate Users (cont’d.) Smart Cards – Small device containing authentication information • Keyed into a logon window by a user • Read by a smart card reader – Used in two-factor authentication • Acts as a token – Variations of smart cards • Key fob • Credit card like smart cards with embedded microchip • Smart cards with magnetic stripes • Smart card plugging directly into a USB port A+ Guide to Managing and Maintaining Your PC, 7e 6
Background image of page 6
Authenticate Users (cont’d.) Using biometric data – Validates the person’s physical body • Iris, facial features, fingerprint – Disadvantage • Danger of false negatives or false positives • Must decide input data fault tolerance limit A+ Guide to Managing and Maintaining Your PC, 7e 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Authenticate Users (cont’d.) Create strong passwords – Not easy to guess by humans and computer programs – Criteria • Use eight or more characters • Use a passphrase if possible • Combine uppercase and lowercase letters, numbers, symbols • Use at least one symbol: second through sixth positions
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/05/2011 for the course CINT 210 taught by Professor Endris during the Spring '11 term at Ivy Tech Community College.

Page1 / 28

Week Fifteen - A Guide to Managing and Maintaining Your PC...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online