понедельник, 1 апреля 2019 г.

Information Search and Analysis Skills

Information Search and Analysis Skills1.0 SYNOPSISThe research was carried on one of Microsoft Windows operating clays which is Windows 2000. The various factors such as bail measures, reliability and smoothgoing to recitation port were discussed. In Windows 2000 security is to a greater extent improved as compargond to previous chance variables, point-to-point Tunnel protocol (PPTP) and layer 2 Tunneling Protocol (L2TP as alternative security for Virtual Private Ne dickensrk (VPN)). Windows 2000 security has portentous benefits like confidentiality, authentification, Data wholeness, Smarts cards, encoding and Kerberos. It is a reliable background knowledge and laptop computer operating carcass for business of all types. It is a build on NT technology and offers rock solid reliability and manageability. The operating system will an intelligent exploiter interface that adapts to the way users work and this foxs it more efficient.2.0 entrywayAccording to Silberschatz (2007), Windows 2000 is a type of operating systems released by Microsoft Company for use on business desktops, notebook computers and servers. This operating system was released on 17 February 2000. Windows 2000 was originally named Windows NT 5.0, this is because it was a successor to Windows NT 4.0, then Windows NT 2000 and finally was called Windows 2000. Windows NT 5.0 was the last version of Windows NT. An operating system is a boundary between the hardw ar and the user that manages and coordinates the activities in order to sh be the resources of the computer. It acts as basic curriculum for computation applications that are run on the machine. As a basic program some of the tasks it performs are recognizing input from the signaliseboard, sending output to the display screen, holding track of files and directory on the criminal record and dictatorial peripherals devices such as printers and disk drives. In a nutshell, operating system handles the details of the operation of the hardware.As it is the successor of Windows NT 4.0 operating system it was titled Windows NT 5.0. This operating system combines the stableness and security of Windows NT 4.0 and Plug-and-Play capabilities of Windows 9x. windows 2000 supports new technologies such as Accelerated Graphics Ports, USB devices, videodisc drives, multifunction adapter cards and also a full line of PC cards. This operating system also duty assignments a new distributed directory service for controlling resources across an enterprise, FAT 32 support, and the internet Explorer 5 weave browser.Crowley C. (1998) said, Windows 2000 has four basic editions, these are Windows 2000 Professional, Windows 2000 server, Windows 2000 advanced server and Window 2000 datacenter server. These editions were targeted for distinguishable markets and they share the most signifi raftt features and system utilities, which include Microsoft Management cabinet and typical system administration applications. The entire set of versions sustains Windows NT file system, NTFS 3.0, Encryption File System and disk storage. Windows 2000 might be installed in two ways, that is either manual or unattended installation and it requires at least 133MHZ Pentium class system with 64mb of RAM.BACKGROUND STUDYSecurityhttp//www.answers.com/topic/microsoft.windows tell that, it is important to implement security on computing environment so that unauthorized users bunsnot halt access, steal or damage system resources. Implementing security has signifi masst benefits on computer users because only authorized personnel have access.TCP/IP provides security on windows 2000 with internet standards that use cryptanalytic security services3.1.1 Confidentiality net profit Protocol security (IPSec) traffic is encrypted and laughingstock only be decrypted with and encryption delineate.3.1.2 Authentification Before the receiver verifies that the mendingage was move by IPSec peer, the IPSec traffic has to be digitally signed with the shared encryption key.3.1.3 Data Integrity A cryptographic checksum that have the encryption key is found in IPSec traffic. Confirmation on modification of packets can be done by a receiver.3.1.4 Smart Cards To defend your electronic network chichi card technology is used in windows 2000 environment, unlike victimisation password protection. Tamper-proof storage is offered for a users key pair and an associated public key certificate and these keys are termed as symmetric and asymmetric keys which are saved through Personal Identification Number (PIN) that the users required to enter. If you are a bright card keepr you are also a smart card reader, this means you preserve to use a generic smart card reader to write certificate to a smart card. ( http//technet Microsoft.com/en-us/ subroutine library/dd316363.aspx)3.1.5 Encryption for data Windows 2000 offer the ability to make tuition undecipherable that is encryption, by using the techniques of NTFS file sys tem so that unauthorized users can not access your data. Files and folders can be encrypted by setting an evaluate under Properties dialog box. Encryption is done through the use of algorithms that mess up, reorganize and encode the data. There is a key pair that has a private and public key. It is used to encode and decode the encrypted information. The user has to assign a recovery agent so that the data can be recovered when the key pair is lost or damaged. If the user has not designated a recovery agent the data cannot be recovered. (http//www.answers.com/topic/microsoft.windows)3.1.6 underlying storage of security form _or_ system of government and account information the purpose of this policy is to implement security that is required by computer systems and data and grant accountability agenda for users. It also creates, processes and manages sensitive information on daily basis. The appropriate mechanism are developed and maintained to protect the confidentiality, integ rity and availability of computerized information. (http//www.answers.com/topic/microsoft.windows)3.1.7 Kerberos Dr.R.C.Joshi e tal (2005) stated that, these are protocols used to modify users to authenticate without sending a password over the network. A user obtains a special kind of key from the network central security at login. The protocol prevents outside attacks. The name Kerberos comes from Greek mythological three- headed computer-aided design that guarded the entrance to Hades.ReliabilityThis refers to the ability of the operating system to protect itself from handling error conditions, protect its users from malfunctioning software. Windows 2000 is reliable on desktop and notebook computers operating system for businesses of all kinds. It is more reliable as compared to Windows 95 and 98. Windows 2000 uses hardware protection for virtual memory to be broad to failings and attacks. It also uses software protection mechanism for operating system resources. Windows 2000 has local anesthetic file system, which is NTFS file system and it recovers automatically from many types of file-system errors after system crash, said Dr. Joshi R. C. (2005).Dr. Joshi R.C (2005) also stated that, changes were made on kernel-mode to make windows 2000 reliable. Kernel-mode write protection offers and reads only subsections of device drivers and kernel. It has code signing which verifies the source of system file and existing Digital Signature Cryptographic technology ahead windows 2000 is installed. There is also Pool tagging where better drivers and cleaner code are produced by kernel mode device drive because memory allocations are made to selected device drivers out of a special pool, unlike a shared system pool. The recovery time is reduced on hurried CHKDSK. An administrator is given one step process to dependably summarise Internal Information horde. There is a kill process manoeuvre which when a parent process is stopped makes sure that all processes ini tiated by parent process are removed. Kernel-only crash dumps are added for contents of the kernel to be written optionally to disk after a crash. Users can correct installation problems or change settings that have caused heyday problems when Safe-mode boot uses its minimal services to boot the computer.Easy to use interfaceThe user interface of Windows 2000 id more improved compared to other versions. In Windows 2000 the information is accessed quickly whether it is on a computer or network. Improved wizards of windows 2000 do users to achieve tough tasks quicker. Only items that are used more frequently are displayed on Start menu and this made the Screen mares nest to be reduced. The Dialog box has been improved as talking to are automatically completed when the user types and most recently used words are listed so that the user can select the appropriate. The Quick frame tool bar can be used to open Microsoft Internet Explorer or to read the e-mail by adding the customiz able toolbars. Also with Windows 2000 desktop, it is easy to switch between windows and the desktop because the new Show Desktop departure is located on the task bar. My Documents offers a permanent location which investment company personal files and folders and it also has My Picture folder where photos can be stored and scanned. Windows 2000 supports trilingual, that is it can identify and establish any essential fonts or signs to observe multilingual information. Encryption and decryption methods are made transparent to authorized users because separately file is encrypted with its key. Windows 2000 also provide smart cards which require users name and passwords unlike depending on a single factor to authenticate a user. (http//technet Microsoft.com/en-us/library/dd316363.aspx)Windows 2000 offers 25% faster performance than Windows 95 and 98 on systems with 64MB and more memory. Its web intergrated capabilities and broad support for mobile computers and hardware devices mak e easy for business operators to connect to internet and work anywhere and at anytime. (http//technet Microsoft.com/en-us/library/dd316363.aspx)4.0 CONCLUSIONTo conclude on this, Windows 2000 is a far more secure and reliable than previous other version. The process of installation and shape of hardware is easy compared to NT platforms. It provides centralized management of users and resources over the network and it also offers enhanced security management of users, computers and devices. This makes Windows 2000 to support a security pose stronger than those of previous Microsoft operating systems. It is interoperable with various operating systems, like Novell Netware, Windows NT Server 4.0, Macintosh, Linux and UNIX. The operating system runs on a wide variety of computers and users can choose and upgrade hardware to match their budgets and performance requirements without needing to alter the applications that they run. summons1. Available http//technet Microsoft.com/en-us/lib rary/dd316363.aspx (cited on 15 July 2009)2. Available http//www.answers.com/topic/microsoft.windows (cited on 17 July 2009)3. Dr.R.C.Joshi e tal (2005) Operating Systems4. Crowley C, (1998) Operating Systems, a design lie Approach5. Silberschatz A, e tal (2007) Operating System concepts

Комментариев нет:

Отправить комментарий