Electronic Commerce
Download
Report
Transcript Electronic Commerce
COMP2221
Networks in Organisations
Richard Henson
March 2013
Week 6:
Windows Services…
Objectives:
Explain the role of the registry in desktop
configuration, usability, and security
Explain the client-server mechanisms of typical
TCP/IP-based network services
Use appropriate software tools for network services,
system/network monitoring and troubleshooting
Rapid Boot-up with
Windows 7 (1)
Huge improvements in time to logon
screen…
32-bit colour animation appears at an early
stage
» driven by the CPU (& using Intel EFI)
graphics card not yet initiated…
meanwhile, operating system's kernel and
critical device drivers are loading into
memory in the background…
Rapid Boot-up with
Windows 7 (2)
Early stage of boot process bound to i/o:
loading the kernel
device driver files
other system component files
Dimensions of the boot animation limited
to a small region of the screen
avoids i/o delay loading animation images
during the early stage of boot…
Rapid Boot-up
with Windows
Even better with Windows 8….
BUT…
In an organisation, the user then needs
to log on…
endless loading of policy files…
subsequent configuration to accommodate
settings into the local registry…
Groups and Group Policy
Convenient for users to be put into
groups
Settings for group provides particular
access to data & services
Problems…
user in wrong group(s)
group has wrong settings
Policy Files: Controlling User
and System Settings…
Arguably the most
important part of a
network manager’s job
get it right: happy users,
happy managers
get it wrong:
» frustrated users…
» angry managers…
Revisiting Peer-Peer Networks
(formerly known as “workgroups”)
i.e. No domain logon
Advantages…
» no group policies to download!
» much faster boot up!
» run client-server apps
Disadvantages…
» no central accountability!
» users & computers both difficult to
manage
» more untested software…
Specifying a
Client-Server Application
May be (even…) trickier than stating
requirements for software residing on a
single machine
Even standalone software has been
known to have missed something…
OK with overtly specified requirements
problem with implicit requirements…
Implicit and Explicit Requirements
Typically, customers only really understand/care
about Explicit (Functional) Requirements
e.g. a Local Authority may want a Bridge
New
Bridge
• The expressed Functional Requirement may only be:
• Vector (end points direction, length)
• Capacity (number of lanes)
11
[TSI/2012/183]
© Copyright 2003-2012
Implicit Requirements (NFRs)
In most industries, Supplier also gives due
weight to all relevant guidance
{c.f. Ethical Principles}
including Non-Functional Requirements (NFR)
NFRs for the Bridge:
• Strength (of components and overall)
• Clearance required over river
• Known Failures modes - - - - - - - - - - >
NFRs & software industry?
1st Tacoma Narrows Bridge 1940-11-07
overlooked? not a good track record for
Trustworthiness…
12
[TSI/2012/295]
© Copyright 2003-2012
Trustworthy Software
Requirement (1)
•
Requirements for Trustworthy Software can
arise from
• Explicit (Functional) Requirement for Trustworthiness
• Implicit (Non Functional) Requirement (NFR) for
Trustworthiness
• direct NFR for software under consideration
• as Collateral NFR from other software in environment
13
[TSI/2012/183]
© Copyright 2003-2012
Trustworthy Software
Requirement (2)
• Requirements cover
• whole of ICT (including ICS)
• devt activities (Specification, Realisation and Use)
•
Assurance requirements range
• Due Diligence (all software)
• …
• to Comprehensive
Typical Implicit (Non-Functional)
Requirements: “NFR”
PAGICC
Performance
ARM (Availability (incl.
Resilience), Reliability (incl.
Robustness) & Maintainability
(incl. Documentation))
Governance (Legal (incl. IPR),
Regulatory, Policy)
ILS (Integrated Logistic Support
incl. Escrow)
Compatibility (Operating
Environment, Interfaces,
Platforms and Dependencies)
Cultural Fit (including Reputation,
Brand)
QUESTESS
Quality (e.g. Faults Delivered,
Fault Removal Efficacy)
Usability / human factors and
Accessibility
Evolution (incl. Extensibility /
Scalability, PDS (Post Design
Services))
Standards
TEA (Training, Education and
Awareness)
Environmental Impact
Security (incl. IA, Audit/control
and DPA)
Safety
15
[TSI/2012/183]
© Copyright 2003-2012
Platforms and Software
Trustworthiness
Only through
extensive testing….
over many years…
Local user control and
Local Policy Settings
Users and groups – exactly the same
principle as domain users and domain
groups
System settings for computer may
need to be changed for particular users
»e.g. lower screen refresh rate required for
epileptic
The all-important Registry
Hierarchical store of system and user settings
Reminder:
HKEY_LOCAL_MACHINE : local computer info.
Does not change no matter which user is logged on
HKEY_USERS : default user settings
HKEY_CURRENT_USER : current user settings
HKEY_CLASSES_ROOT : software config data
HKEY_CURRENT_CONFIG : “active” hardware
profile
Editing “Live” Registry Settings
Registry data that is loaded into memory
was taken from locally saved copy
some then overwritten by:
» local user profile file (ntconfig.pol)
» local groups
» local computer settings
Special command line tool available for
editing individual system settings:
REGEDT32
What is a Policy File anyway?
Collection of registry settings in a text file
settings depend on the user or group logging
on
Can overwrite:
local machine registry settings
current user registry settings
Should therefore only be created and used
by those who know what they are doing!!!
Peer-Peer Sharing
No active Directory!
Resources shared through:
File shares
Printer shares
Responsibility rests with the
administrator of the local machine
Contradictions of Peer-peer
Meant to be just for small networks
e.g. <10 computers
but what about the Internet?
Still client-server!
depending on the process
» peer computer could be acting as server…
» or client!!!
The Redirector
(OSI Level 5)
Client-server
service
Provides file and
print connectivity
between
computers
one end must be
“server”
provides the
service…
may be
redirector logged on
requests
service
server
client
Server
Provides
service
Redirector
(“Workstation” i.e. client-end)
Implemented as a file system driver
called… if local file system cannot find the
file or service
then… sends request to active directory to
locate the data object via next OSI layer
(4): Transport Driver Interface (TDI)
» communicates directly with transport protocols
» allows independence of networking
components in OSI layers 2-4
Redirector
(Workstation Service)
Adherence to OSI layers…
Can independently add or remove:
» transport protocols (layers 3 & 4)
» network cards (layers 1 & 2)
without reconfiguring the whole system
Completely transparent in redirection of i/o
calls not serviced locally
esp. important when applications are being used
Server Service
Server end of redirector:
implemented as a file system driver
communicates with lower layers via TDI
Supplies the network connections
requested by the client redirector
Receives requests via adapter card
drivers, transport protocol (e.g. TCP/IP),
and TDI
Running Client-Server
Applications
Client process & server process provide a
mechanism for:
pipes to link processes that need bi-directional
communication
mailslots to link processes only requiring onedirectional communication
running Winsock to manage the communication
channel
RPCs (Remote Procedure Calls) allowing
distributed applications to call procedures
anywhere on the network
File and Print Sharing
Shared resource access requires use of
redirector
server service…
Multiple UNC Provider allows connection to a
resource on any computer that supports UNC
Universal Naming Convention) names
Files \\server\shared folder[\sub-folder]\filename)
Printers \\server\shared printer
Multiple Provider Router supports multiple
redirectors
Network Binding
Binding is about linking network components
working at different OSI levels together to
enable communication
Windows binding is about linking the
redirector & server service with the transport
protocol and (via NDIS) adapter card drivers
happens automatically when:
» there is a change of protocol, or protocol settings
» different network adapter drivers are installed
» existing adapter card settings are altered
WINS (Windows Internet
Names Service)
Client-server protocol like DNS, DHCP
used on first Windows TCP/IP networks to enable
computer devices to communicate using IP
manages a dynamic database of IP addresses and
local network (NetBIOS) names
clients request IP addresses for particular NetBIOS
names
WINS server provides that information
Historical, but NETBIOS names still used in
some places
Terminal Services
Allows any PC running a version of
Windows to remotely run a Windows
server
uses a copy of the server’s desktop on the
client machine
Client tools must be installed first, but the
link can run with very little bandwidth
possible to remotely manage a server
thousands of miles away using a phone
connection…
The www service
Provided by Microsoft’s Web Server (IIS)
links to TCP port 80
can also provide:
» ftp service (port 21)
» smtp service (port 25)
Purpose of www service:
Works with http protocol make html pages
available:
» across the network as an Intranet
» across trusted external users/domains as an Extranet
Features of IIS
Provides server end program execution
environment:
runs server-scripts
Sets up its own directory structure on the
Server for developing Intranets, Extranets,
etc.
Sets up communication via TCP port 80 in
response to client request
Client end:
browser HTML display environment on client
“Static” web page service
client (browser) requests information (HTML page)
server (IIS, web server) processes the request, sends
HTML page back to the client…
CLIENT
Client
Program
SERVER
REQUEST
RESPONSE
Send Request
Read Results
Server
Program
Process Request
Send Back Results
More Features of IIS
Access to any client-server service can
be restricted using username/password
security at the server end
or could bypass security with “anonymous
login
» uses a “guest” account – access granted only
to files that make up the Intranet
» prevents worries about hacking in through
guessing passwords of existing users
Client-Server Web
Applications
Associated with “dynamic” web pages
Web servers provides a server-side
environment that can allow browser data to
query remote online databases using
SQL…
processing takes place at the server end…
» usually .aspx or .php
centralised and secure!
Some recent challenges to
client-server applications
apps (especially phone apps…) using
local processing, even storage (!)
open to wireless retrieval?
again…issue of availability v security
Server with logically attached database
can be wide open to SQL injection
attack….
Troubleshooting Local Resources
Task Manager
Applications tab just gives the name and status of
each application that is loaded into memory
Processes tab:
»
»
»
»
all system processes
Memory usage of each
% CPU time for each
Total CPU time since boot up
Performance tab
» Total no. of threads, processes, handles running
» % CPU usage
Kernel mode
User mode
» Physical memory available/usage
» Virtual memory available/usage
Troubleshooting Local Resources
Event viewer
System events recorded into “event log” files
» Three by default: system, auditing, application
» customisable
Three types of events:
» Information
» Warning
» Error
More information for each event obtained by
double-clicking
Event management also required…
» E.g. new files daily, old ones archived? dumped? when?
» how often to check event files?
» Important to detect security issues and potential failures
Troubleshooting Local Resources
System Monitor (perfmon.msc)
monitor many aspects of system performance
e.g. capture, filter, or analyses frames or packets sent over
the network, or capture data from hardware devices
» either display current data graphically, in real-time
» or log data at regular intervals to get a longer term
picture
Alerts
» notify when a particular threshold value has been reached
System Recovery…
If a fatal error occurs:
» immediate dump of system memory is made
can be used for identifying the cause of the problem
» alerts are sent to users
» system is restarted automatically
NFR Example:
Possible Security Features
Remote diagnostic and configuration port
Information labelling and handling
protection
Equipment siting and protection
Segregation in networks
Supporting utilities
Network connection control
Cabling security
Network routing control
Maintenance
Secure log-on procedures
Secure disposal or re-use
User identification and authentication
Separation of development, test and operational
Password management system
facilities
Use of system utilities
Controls against malicious code
Session time-out
Controls against mobile code
Limitation of connection time
Information back-up
Information access restriction
Network controls
Sensitive system isolation
Security of network services
Input data Verification
Electronic messaging
Control of internal processing, including Least
On-line transactions
Privilege
Publicly available information
Message integrity
Audit logging
Output data Verification
Auditing system use
Cryptographic controls
Protection of log information
Key management
Clock synchronisation
Technical vulnerability management (patches and
Privilege management
updates)
A Checklist
of areas to consider, abstracted from ISO/IEC
27001 / 27002 Control Sets
Equipment identification
in networks
Collection of evidence
41
[TSI/2012/183]
© Copyright 2003-2012