Security Access Token example essay topic
The permission controls are based on security Ids found in a security access token which determines the users privileges. However in highly secured systems fingerprints can be used for authentication. Also, the built - in Guest account can restrict entry for casual users. As well as tracking the users access controls, NT also manages the applications access controls by using a subject. These can be divided into two classes, a simple subject and a server subject. With regards to the simple subject, depending on the users access token, it will be allocated a security context.
While the server subject is implemented as a protected server which uses the security context of the client when acting on behalf of the client. There are two file systems available for NT, these include the FAT (File Allocation Table) system and the NTFS. However, the FAT system provides very little security as it was developed primarily with DOS in mind. In contrast NTFS was created specifically for Windows NT. It is fast, allows longer file names and is backward compatible with DOS programs.
In order to facilitate the integrity of data at the hardware level, NT has a 'built-in fault tolerance'. NTFS creates fault-tolerant disk subsystems in different ways. One of which is called disk mirroring, whereby two partitions are required on two different disks, both using a single hard disk controller. Every directory / file is copied from one disk to the next, 'mirroring' the data. The benefit of this is when one disk fails the next can take over and successfully act as a replacement for the failed disk.
A recent addition to the NT security aspect in relation to the Internet is the introduction of Web Enforcer. It works in conjunction with HP, and is supposed to enforce security issues and correct recognised security holes found in NT Web servers. HP claims that Web Enforcer 'resets configuration settings if they have been changed (either maliciously or by installing other software). ' [1] NT is suitable for all areas of business and personal use as its security can be configured to the users needs. Security issues are especially important to businesses, which is why new security software such as Web Enforcer already mentioned, is constantly being developed to keep up with demand. NT provides a large number of security features to prevent unauthorised access etc., yet as well as a secure operating system, the external environment also needs to be taken into consideration.
Reference [1] web.