Chapter 17 -- Planning for Security

[Previous] [Next]

Chapter 17

Security, in definition and practice, has changed tremendously within just the past few years. Stretching technology to increase the scope and latitude of what we're able to accomplish exposes new and often venomous danger points. Amidst the legions of hackers, spies, terrorists, corporate raiders, professional criminals, and vandals, unprotected networks can fall prey to attack. Today's system administrator has real security threats to address and needs to implement a solution that is both safe and unobtrusive.

Microsoft Windows 2000 includes a bevy of configurable security features and options ranging from an entire public-key infrastructure to a protocol that protects individual packets as they cross the network. But before we dive into implementing the security features of Windows 2000 in Chapters 18 and 19, let's review some of the basic security considerations.

In this chapter, we revisit some of the security components that are integral to earlier Microsoft products and explore the new security features added to Windows 2000. We'll review the common denominators of security such as authentication, data protection, and access control. We'll tour the Windows 2000 public-key infrastructure and take a detailed look at some of the security-enabled protocols the server uses. We'll introduce virtual private networks (VPNs). Finally, we'll cover the underlying cryptographic application interface in Windows 2000, Microsoft Cryptographic Application Programming Interface (Cryptographic API or CryptoAPI).



Microsoft Windows 2000 Server Administrator's Companion, Vol. 1
Microsoft Windows 2000 Server Administrators Companion (IT-Administrators Companion)
ISBN: 1572318198
EAN: 2147483647
Year: 2000
Pages: 366

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net