🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

it elective 4 IT415 Cybersecurity Learn about our WINDOW's ACL’s and linux acl’S Text-to-speech script of this resource is available. Agenda Objective: Provide an overview of the Windows Operating System and...

it elective 4 IT415 Cybersecurity Learn about our WINDOW's ACL’s and linux acl’S Text-to-speech script of this resource is available. Agenda Objective: Provide an overview of the Windows Operating System and Linux, focusing on their roles in network security. The Windows Operating 3 Culture 9 System Introduction to Windows Calendar and Key Dates 10 4 Security Features: Contact 11 Role of ACLs in Windows 5 Configuring Administrative Resources 12 6 Access Controls in Windows Whiteboard 13 Goals and Strategy 7 Brainstorm 14 Organizational Chart 8 all about acl ACL IN ACL WINDOWS BACK TO NAVIGATION PAGE Access Control Lists (ACLs) in Windows Security in IT is like locking your house or car – it doesn't stop the bad guys, but if it's good enough they BACK TO may move on to an easier target. — Paul Herbka NAVIGATION PAGE Definition and BACK TO NAVIGATION PAGE Purpose of ACLs: An ACL is a set of rules Purpose: Protect critical that determine the assets by defining who permissions granted to can access them and what users and systems for actions they can perform accessing resources. Types of ACLs Discretionary ACLs (DACLs): System ACLs (SACLs): 01 Control access to an object 02 Used for auditing access to an based on user permissions. For object. They record access example, allowing specific users attempts and actions performed to read or modify a file. on an object. How to Create and Manage ACLs in Windows Use tools like icacls, Windows Example: icacls command to set 01 Explorer, or PowerShell to create 02 read-only access for a user on a and manage ACLs on files, specific folder. folders, and registry keys. Links: https://petri.com/icacls-command/ https://learn.microsoft.com/en-us/windows- server/administration/windows-commands/icacls BACK TO NAVIGATION PAGE The Windows Operating System Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts BACK TO across the electrified borders. — Ronald Reagan NAVIGATION PAGE Introduction to Windows BACK TO NAVIGATION PAGE Security Features: Windows offers built-in These features protect the security features such as system from unauthorized User Account Control access, malware, and data (UAC), BitLocker, Windows breaches. Defender, and Windows Firewall. Role of ACLs in Windows ACLs specify which users or Access Control Lists (ACLs) are 01 crucial for managing 02 system processes can access objects, such as files or registry permissions and securing keys, and what actions they can resources. perform (read, write, execute). Example: Implementing ACLs Using Windows Firewall Windows Firewall uses ACLs to control inbound and outbound traffic based on IP addresses, ports, and protocols. Configuring an ACL to allow only specific IP addresses to access a web server. IT415 ACLS Implementing IPv4 ACLs in Windows BACK TO NAVIGATION PAGE The LINUX Operating System Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, BACK TO and the designer tries to close them. — Gosser NAVIGATION PAGE lINUX AND IT’S DISTRIBUTION BACK TO NAVIGATION PAGE Linux is an open-source Linux is considered to be operating system with more secure than other various distributions operating systems, such as (distros) like Ubuntu, Windows, because it is CentOS, and Red Hat. less susceptible to viruses and other forms of malware. Security Features in Linux Linux offers strong security features such as SELinux, AppArmor, and iptables for managing network traffic and enforcing security policies. ‘iptables is a command-line tool used to configure the IT415 netfilter firewall, which handles network traffic filtering. ACLS ACLs in Linux can be set up Implementing IPv4 ACLs in Linux to allow or deny traffic based on IP address, port, or protocol. BACK TO NAVIGATION PAGE Comparing ACL Management Between BACK TO NAVIGATION PAGE Linux and Windows Linux ACLs are typically Windows ACLs are more granular and managed primarily configurable through through a graphical command-line tools like interface and PowerShell. `setfacl`. Why do we need ACL? BACK TO NAVIGATION PAGE Innovation Why do 01 We always encourage new ideas. we need ACL? Integrity 02 We believe trust is a key factor BACK TO toward achieving success. NAVIGATION PAGE Sustainability 03 We are perpetually aiming to be good stewards of our world.

Use Quizgecko on...
Browser
Browser