Inside Windows Server 1002003 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Inside Windows Server 1002003 [Electronic resources] - نسخه متنی

Addison Wesley

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید










Chapter 11. Understanding Network Access Security and Kerberos


I

USED TO BE MIS

DIRECTOR FOR A company that ran telesales call centers. Every once in a while, a sales agent would get a prospect on the line with a network security background. How would I know? The prospect would ask questions like, "How do I know beyond a shadow of a doubt that you are who you say you are?" and "How do I know beyond a shadow of a doubt that you're permitted to sell this to me?" and "Do you mind if I record this call?"

These questions indicate that the prospect was familiar with the three pillars of network security:


  • Authentication


  • Authorization


  • Accountability (Auditing)



In case you're wondering, the sales agents would generally react to these types of questions by hanging up and moving on to a less sophisticated prospect, proving that IT training really does have practical uses in the real world.

This chapter covers how Windows Server 2003 achieves the three A's of network security. Chapter 18, "Managing a Public Key Infrastructure," covers advanced security topics associated with Public Key Infrastructure (PKI).


/ 245