Chapter 2 User Authentication, Authorization, and Security (1): Select Windows and SQL authentication, Authentication
Source: Workshop
Without the consent of the author, no one shall be published in the form of "original" or used for commercial purposes. I am not responsible for any legal liability.
Previous Article: http://blog.csdn.net/dba_huangzj/article/details/38656615
Preface:
SQL Server has two types of Identity Authentication: one is WIndows identity authentication. Windows Identity Authentication uses an account on Windows and uses its security token for authentication. One is SQL Server authentication, which uses the account defined in SQL Server for identity authentication.
Implementation:
1. In SSMS, right-click "Instance name", select "properties", and find the "Security" Page:
Windows Authentication: Only WIndows accounts are accepted. This is enabled by default and cannot be disabled. [SQL Server and Windows Authentication Mode] accepts WIndows and SQL Server accounts.
2. If Windows authentication is selected, you can create an SQL Server license, but it cannot be used. To switch to authentication, restart the service.
Principle:
During installation, SQL Server requires authentication. Windows authentication is the default and recommended, because it not only simplifies management, but also provides higher security. You cannot Disable Windows authentication, and use SQL Server authentication only when the accessed user exceeds the local network or in a trusted domain environment.
An SQL Server account is created in SQL Server. Both authentication and password verification are performed by SQL Server.
The recommended solution is to use Windows Authentication and define a group in the Active Directory to add the group to SQL Server only.
Help translate (3)
Type issues:
Basic concepts-multiple choice questions;
Reasoning and simple computing: multiple choice questions. This type of problem will be clearer when you see the choice in the trial; what you can do, now is familiar with the concepts and theories mentioned in the review of the issue.
Discussion, summary, computing (? ): Prose issues
Topics will include:
Chapter 1, September May 1
1. Layer 5: what are they and what do they do?
2. Comparison layer (I created a table)
3. The common standard is HTTP. SMTP, ftp ip, and Ethernet
4. Media Access Control: Debate and control: Which one is better?
5. Error Control: Source errors and Their Remedial Measures (methods to prevent errors), focusing on the control of about 1st projection Films
Calclation's data loss is due to sudden errors (impulsive; "spike")-simple computing will be provided, and your task is to understand them and choose the right one.
Possible essays:
Describes how to use Web-based email Engineering
Chapter 1, September May 2
1. Title bar, in the TCP packet
2. Title bar, in the IP packet
3. Type of address, used on the Internet; address for alteration or resolution, especially the application address and network address
4. DHCP: What is it and how it works
5. LAN components
6. Ethernet: basic functions: How to forward and process emails; collision and response to their tasks; how to avoid more collisions after
Chapter 1 7
1. General security goals (CIA)
2. Activities or functions of basic security: identification, verification, authorization, accountability, and assurance
3. Vulnerability, exploitation, and attack
4. Defense in depth
Possible essays:
Discussing why information security/network security is a bigger problem today and 20 years ago due to improved computing/communication technology.
Chapter 2
1. Social Engineering: What is the second and how to defend against it
2. "Three Principles"-principle, easy to penetrate, principle, timeliness, effectiveness principle; Relationship and password and encryption (we employ the password and encryption, because of the above principles)
3. Stream password and Bock Password
Possible essay issues:
1. Content and relationship of network security technology
2. Types of security threats
3. Potential and cost threats
4. The password should be at least 8 characters in length, in the upstream and downstream situations, and numbers. It is easy to remember and give it to yourself, but it is hard to guess by others. Country-specific design (password that you can easily remember ).
5. Mechanism, Digital Signature
Chapter 2
All types of problems:
What is the purpose of host scanning?
What is the purpose of port scanning?
What is the purpose (job system) fingerprint?
Break the program: How to manage Vulnerabilities
Denial of Service Attack-Single message D OS attack; s murf flooding D OS attack; Distributed Denial-of-Service (D DoS) attack
Prevent DoS Attacks
Basic functions and limitations of the firewall
Packet filtering firewall; proxy firewall; comparison of two firewall Technologies
Access Control List (ACL) (slides 9-71-9-75)
Slide in learning, use the "hide" of Notes on the slide-below:
Benefits of using Windows2000server
Write composition? Refer to the following changes.
Top 10 Reasons Why to Upgrade from Windows 2000 Server to Windows Server 2003 R2
Windows Server 2003 R2 builds upon the increased security, reliability, and performance provided by Windows Server 2003 Service Pack 1 (SP1) to provide a more secure and dependable platform on which to deliver business-critical applications and Web services. at the same time, Windows Server 2003 R2 is easier to manage and integrate into existing environments. this page describes the major new features and improvements encoded in Windows Server 2003 R2.
Centralize user authentication and authorization
Introduced in Windows 2000, the Active Directory directory service simplifies the administration of complex network directories and makes it easy to locate resources on even the largest networks. this enterprise-class service is scalable, is built on Internet-standard technologies, and integrates with the Standard, Enterprise, and Datacenter editions of Windows Server 2003 R2.
Windows Server 2003 R2 provides numerous features-of-use improvements to Active Directory and new features, including cross-forest trusts, the ability to rename domains, and the ability to deactivate attributes and classes in the schema so that their definitions can be changed.
Simplify end user policy management
Administrators can use Group Policy to define the settings and allowed actions for your users and computers. in contrast with local policy, organizations can use Group Policy to set policies Ies that ...... remaining full text>