1 00:00:01,610 --> 00:00:08,390 Welcome to another lecture on operating system security this time we'll examine the mechanisms of authentication 2 00:00:08,390 --> 00:00:13,100 and authorization and talk about managing user accounts and resource access in a system 3 00:00:19,480 --> 00:00:24,130 this module will teach you how to differentiate between authentication and authorization. 4 00:00:25,900 --> 00:00:33,130 The two terms should not be confused with user identification. 5 00:00:33,140 --> 00:00:38,060 We'll find out which types of passwords are secure and which are not and carefully examine the methods 6 00:00:38,060 --> 00:00:40,020 for storing user passwords in Windows 7 00:00:43,360 --> 00:00:50,220 remote user authentication protocols will be used will show you protocols used for proving identity 8 00:00:50,220 --> 00:00:51,730 of remote computer users 9 00:00:56,400 --> 00:01:01,720 will also tell you why one of the types of credentials stored by Windows cached credentials is not putting 10 00:01:01,720 --> 00:01:04,920 system security at risk as the popular myth would tell you 11 00:01:08,290 --> 00:01:10,650 the Kerberos protocol will be examined. 12 00:01:12,160 --> 00:01:16,460 This is the safest protocol for authenticating users in Microsoft Windows networks 13 00:01:20,120 --> 00:01:23,600 will also try to crack different kinds of passwords used by Windows users 14 00:01:26,570 --> 00:01:32,060 and then we'll also try to give you an answer to the questions on authorization mechanisms such as What 15 00:01:32,060 --> 00:01:36,460 is the difference between role based access control and discretionary access control 16 00:01:39,990 --> 00:01:45,240 only the module will cover the purposes and applications of a new access control system introduced in 17 00:01:45,240 --> 00:01:52,750 Windows Vista which was an implementation of the belt loop Adullam model. 18 00:01:52,780 --> 00:01:53,790 See you in the training.