4.5 Operating System Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

Active Directory

A centralized database used in Windows environments to manage users, devices, permissions, and network resources like printers and file shares.

  • Every user account and system is listed in this directory.

  • Allows centralized authentication, so users log in with the same credentials across the network.

  • Permissions can be set individually or assigned to groups.

  • Admins use to manage accounts, change passwords, and control access to resources.

2
New cards

Group Policy

Allows administrators to apply specific configurations and security settings to users and devices within Active Directory

  • Managed through the Group Policy Management Editor

  • Can control login scripts, network settings like quality of service, and enforce security rules.

3
New cards

Security-Enhanced Linux (SELinux)

A security module in Linux that enforces the principle of least privilege, granting users and processes only the permissions they need to perform their tasks.

  • Limits the potential damage from breaches or malicious code.

  • Available for many Linux distributions and provides strong, customizable access control policies.

  • Open-source tool

4
New cards

Discretionary Access Control (DAC)

The user has their own discretion to be able to assign rights and permissions to different resources.

  • in many highly secure environments, this discretionary access control is not appropriate.

5
New cards

Mandatory Access Control (MAC)

All of those rights and permissions are assigned by a central administrator.