Professional Documents
Culture Documents
PREPARING TO ADMINISTER
A WORKSTATION
1
2
Involved Topics
1 36 3 minutes .000018s
4 1700000 3 months 1s
User education
Computer-generated passwords
• mathematically have:
• C = EK(P)
• P = DK(C)
Plaintext A B C D E F G H I J K L M N
Ciphertext S T U V W X Y Z A B C D E F
Plaintext O P Q R S T U V W X Y Z
Ciphertext G H I J K L M N O P Q R
24
Caesar Ciphers (Cont.)
This enable us to use the same rule for encryption and
decryption with the decryption key 18 corresponding to the
encryption key 8.
An exhaustive search for the encryption key for cryptogram HSPPW yields two
possibilities that lead to complete English words for the assumed message.
These shifts are 4, that gives DOLLS, and 11, that gives WHEEL.
When this happens we need more information, possibly the context of the
message, or some extra ciphertext, before we can determine the key uniquely.
27
Simple Substitution Ciphers (Random)
ABCD EFGH I J KLM
DI QMTB ZSYK VOF
For a Simple Substitution Ciphers (or monoalphabetic ciphers), we write the alphabet
in a randomly chosen order underneath the alphabet written in strict alphabetical
order.
The encryption rule is ‘replace each letter by the one beneath it’ while the decryption
rule is the opposite procedure
28
Simple Substitution Ciphers (Cont.)
The number of keys for a Simple Substitution Cipher is equal to the
number of ways in which the 26 letters of the alphabet can be
arranged.
It is called 26 factorial and is denoted by 26! It is 26 x 25 x 24 x … x 3
x 2 x 1 which equals 403,291,461,126,605,635,584,000,000 keys.
❑ The left-hand (key) column of this square contains the English alphabet
and for each letter, the row determined by that letter contains a
rotation of the alphabet with that letter as the leading character.
So each letter in the left-hand column gives a Caesar Cipher
whose shift is determined by that letter.
Example: the letter g gives the Caesar Cipher with shift 6.
31
Vigenere
Tableau
32
Example: Polyalphabetic Substitution Cipher
Based on Vigenere, get the ciphertext for the plaintext “A minutes success pays the
failure of years” in 4-letter words and “failure” as the repeating key. Use ‘x’ to pad out
the blanks.
33
Breaking vigenere cipher
This cipher was secure from about 1553 till 1854 (301 years!!!)
b. In 1863 Friedrich Kasiski was the first to publish a successful attack on the
Vigenère cipher.
c. The primary weakness of the Vigenère cipher is the repeating nature of its key.
34
Transposition
Letter is rearranged
Letter are retain but moved from its position
Two type
Unkeyed single transposition
Keyed single transposition
35
Example: Unkeyed Single Transposition
Members of these groups are granted permissions to perform specific system tasks
Administrators should always be a member of a group that is the most restrictive
3. On the Select a Title for the program page, in the Type a name
for this shortcut box, type Performance and then click Finish.
41
•How to Set Up Run As Shortcuts
How to set up a Run as shortcut to:
Computer Management runas /user:nwtraders\administrator
"mmc %windir%\system32\ compmgmt.msc"
Tool Description
Monitor system events
Create and manages shared resources
System tools
View a list of users who are connected to a local or remote computer
View device configurations and adds new device drivers
Administrators use the Group Policy MMC snap-in to specify options for managed desktop configurations for groups of computers
and users. Group Policy provides options for registry-based policy settings, security settings, software installation, scripts, and
folder redirection. The Group Policy settings that administrators create are contained in a Group Policy object (GPO) that is in turn
associated with selected Active Directory containers: sites, domains, and organizational units (OUs).
Administrators can also set local Group Policy for computers that are not members of a domain. To set local Group Policy,
administrators use the Group Policy snap-in focused on the local computer.
47
Benefits of MMC
Task Orientation: The tools being defined to work with MMC are task oriented in nature—they cater to the task
being performed rather than merely displaying the raw objects that can be manipulated. Also, because
administrators can customize their own tools, using pieces from various vendors, they can create tools that
contain only the UI they need to complete their tasks.
Integration: The UI for all the management tasks an administrator must perform are collected into a single
console. As new applications are added to a computer or network, their administration is integrated into the
existing administration common console.
Customization of Consoles: Administrators can create custom consoles tailored to their particular
management needs. This is useful in enterprise environments that divide administrator groups according to
duties. For example, you can create a custom console for software installation and maintenance, another
one for scripts administrators, another one for security Group Policy, and so on.
48
Benefits of MMC
Delegation: Administrators can easily modify existing tools to create new tools with reduced functionality and
less complex views of the tool namespace, then give these tools to others. A person who receives such a tool
is presented with a simpler, more manageable view of the tasks they are being asked to perform.
Overall Interface Simplification: All tools built for MMC, from Microsoft or third-party software vendors, will have
a similar appearance, making it easier for users to use all tools after learning one. Because you can mix and
match tools from any vendor, you can use the best tool from each management product category. MMC
also enables a single piece of software to provide functionality across the interface in a consistent manner.
Extensibility: Developers can extend the base functionality of MMC snap-ins by creating extension snap-ins.
This allows software vendors to reuse Microsoft tools without writing a lot of code. Various mechanisms are
available for extending snap-ins, including extending the namespace, context menus, toolbars, Property
pages, and creating Wizard 97-style pages.
Example of snap-in: The administrator is concerned with
49
managing security.
Security Templates—Administrators use this snap-in to view, configure, and apply the full
range of system security to a local computer. Administrators can also import the security
templates to a Group Policy object associated with a site, domain, or organizational unit. All
computers and users in the site, domain, or organizational unit to which the Group Policy
object is applied will receive the security template settings. A Security Template includes
security settings for the following:
Security Policies: Includes account and local policies. Account Policies includes security
for passwords, account lockouts, and Kerberos policies. Local Policies includes user rights,
and logging for security events.
Restricted Groups: Local group membership administration.
Registry: Security for local registry keys.
File System: Security for the local file system.
System Services: Security and startup mode for local services.
50
How to Configure MMC to Manage a Server Remotely
LAN
Remote computer
running Remote
Desktop Connection
53
Why Use Remote Desktop for Administration?
1. Log on as Administrator.
2. On the Start menu, right-click My Computer.
3. Click Properties.
4. Click Remote.
5. Select the Allow users to connect remotely to this
computer check box.
What Are Client Preferences for Remote Desktop
Connection?
Idle session limit Disconnects the user after the amount of idle time is exceeded
63
How to Configure Timeout Settings for Remote Connections
1. Click Start.
2. On the Administrative Tools menu, click Terminal Services
Configuration.
3. In the details pane, right-click RDP-Tcp, and then click Properties.
4. On the Sessions tab, select the first Override user settings check box.
5. Adjust the appropriate settings:
6. End a disconnected session
7. Active session limit
8. Idle session limit
64
What Is Terminal Services Manager?
Monitors user sessions
Manually forces user logoff or session disconnect
You can oversee all users and sessions on a server from one location
65
How to Manage Sessions by Using Terminal Services Manager