objectivesptgmedia.pearsoncmg.com/images/073570984x/sample... · chapter 3 analyzing technical...

56
O BJECTIVES 3 CHAPTER Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the “Analyzing Technical Requirements” section of the Designing Security for a Microsoft Windows 2000 Network exam: Evaluate the company’s existing and planned technical environment. Analyze company size and user and resource distribution. Assess the available connectivity between the geographic location of work sites and remote sites. Assess the net available bandwidth. Analyze performance requirements. Analyze the method of accessing data and systems. Analyze network roles and responsibilities. Roles include administrative, user, service, resource ownership, and application. . Security exists to protect the network. The network exists to support the business. The business is composed of people and activities. Before you can devise a security strategy, you need to know the business needs of the company, its people, its processes and locations, and its current information system and infrastructure. This objective addresses specific technical areas of the infrastructure. Analyze the impact of the security design on the existing and planned technical environment. Assess existing systems and applications. Identify existing and planned upgrades and rollouts. Analyze technical support structure. Analyze existing and planned network and systems management. 07NSD/TGch_03 10/11/00 1:04 PM Page 95

Upload: others

Post on 17-Feb-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

OBJECT IVES

3C H A P T E R

Analyzing TechnicalEnvironments

This chapter covers the following Microsoft-specifiedobjectives for the “Analyzing Technical Requirements”section of the Designing Security for a MicrosoftWindows 2000 Network exam:

Evaluate the company’s existing and plannedtechnical environment.

• Analyze company size and user and resource distribution.

• Assess the available connectivity between the geographic location of work sites and remotesites.

• Assess the net available bandwidth.

• Analyze performance requirements.

• Analyze the method of accessing data and systems.

• Analyze network roles and responsibilities. Rolesinclude administrative, user, service, resourceownership, and application.

. Security exists to protect the network. The network exists to support the business. The business is composed of people and activities.Before you can devise a security strategy, youneed to know the business needs of the company,its people, its processes and locations, and its current information system and infrastructure.This objective addresses specific technical areas of the infrastructure.

Analyze the impact of the security design on the existing and planned technical environment.

• Assess existing systems and applications.

• Identify existing and planned upgrades and rollouts.

• Analyze technical support structure.

• Analyze existing and planned network and systems management.

07NSD/TGch_03 10/11/00 1:04 PM Page 95

Page 2: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

OBJECT IVES

. As you formulate your security design, you mustconsider the impact on the systems and applicationsin your environment. Security structures are oftenat exact odds with ease of use. After all, the securestsystem is one that is unplugged from the networkand locked away where no one can get to it. Yourability to lock down your system will be greatlyenhanced in Windows 2000. If correctly designed,much of the increased security can be transparentto the user. If the design effort ignores the usabilityquotient, the effect can be disastrous.

. You may have already witnessed this as you havedealt with applications that disregarded the securitystructure of the Windows NT registry. These appli-cations insisted on writing to areas of the registrythat should be protected from normal user access.Running these applications in your environmentoften was challenging because you had to determineexactly what access users needed and then eitherrelax your security or give elevated privileges tousers so that they could run the applications orquickly find alternative applications.

. Creating a security design may mean major changesto the operation of your systems and applicationswithin it. Do not create your design in a vacuum.

Introduction 98

Analyze Company Size and User andResource Distribution 98

Assess Available Connectivity 101

Identify Network Topology 106

Assess Net Available Bandwidth 109

Analyze Performance Requirements 110

Analyze Data and Systems AccessMethod 112

Physical Access 113

Authentication 113

Authorization 113

Backups and Other Data Stores 115

External Access 116

Analyze Network Roles and Responsibilities 117

Administrative 118

User 118

Service 119

Resource Ownership 120

Application 121

OUTL INE

07NSD/TGch_03 10/11/00 1:04 PM Page 96

Page 3: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Analyze the Security Design 122

Assess Existing Systems andApplications 123

Line of Business Applications 124Domain Structure 125

Identify Existing and Planned Upgradesand Rollouts 126

Analyze Technical Support Structure 126

Analyze Existing and Planned Network and Systems Management 126

Security Policy 127Network Management Tools and Systems 127

Systems Management Tools and Systems 129

Chapter Summary 133

Apply Your Knowledge 134

. Complete your studies of the current andplanned information systems with a comprehen-sive understanding of the scope of your busi-ness and its IT needs. It’s not just a matter ofknowing how many users there are and wherethey are located. It’s not just listing the data-bases and hardware and transport systemsthat make up the infrastructure. It’s also notjust who needs access to what when. It is howthis organism comes together to function as acoherent entity.

. Take time to learn that, because you are aboutto change it.

. Take time to develop a close understanding ofthe factors that you will need to know. Dissectcase studies, examples, and references untilyou can flash a company description up on ascreen and tick off in an organized fashion theinformation present and the questions you’dneed to ask.

OUTL INE STUDY STRATEGIES

07NSD/TGch_03 10/11/00 1:04 PM Page 97

Page 4: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

98 Par t I I ANALYZING TECHNICAL REQUIREMENTS

INTRODUCTION

Are you surprised that it’s taking so long to get to a discussion ofWindows 2000? The process of security design is not so differentfrom building a house. If you spend time understanding the currentliving arrangements, it will help you in planning the new house andwill save money and heartache later.

In the first section of this book, you learned how to analyze businessand IT management. This chapter completes your preliminary stud-ies with a study of the current IT technology so that you can dorequirements planning in the next. Here you will study the informa-tion resources, as well as their users and the connectivity technolo-gies that permit access and communication, whether user toresource, user to user, across the network, and across the world. Youwill finish your study of your current network by examining the fac-tors that currently provide security for business information assets.

ANALYZE COMPANY SIZE AND USERAND RESOURCE DISTRIBUTION

Analyze company size and user and resource distribution.

Grab those maps you made in Chapter 1, “General BusinessAnalysis”—you’re about to put some useful information in them.(You can use tables to hold detail if you want.) First, label each loca-tion with the number of users. Next, place markers to indicate thelocations of all resources. Resources include printers, file servers,mail servers, databases, and similar items. Finally, map groups ofusers to resources they must access (see Figure 3.1).

A good source of information is the resource owner. Productionmanagement, for example, will have data on where productioninformation is generated, who needs the information, who workswith it from where, and where the information resides. If you havemaps or network diagrams to assist you in your work, so much thebetter. If you are part of a Windows 2000 deployment team, someof this work may already be done. However, check for accuracy. Arethere users in locations who should have access but do not? Arethere resources not on the charts? Departmental servers and Web

07NSD/TGch_03 10/11/00 1:04 PM Page 98

Page 5: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 99

sites are resources that often are not included in IT charts andgraphs. Don’t be judgmental at this stage; your purpose is to sketchthe current situation.

Collect or examine network design maps. You need a differentkind of map here. A network design map should show all thedetails of hardware in your infrastructure, including each router,switch, server, and connection. Public networks can be identifiedby using a cloud configuration. Locate servers and IP addresses,and identify server role and domain membership. Indicate specialserver applications. Where is the location of the DHCP servers?DNS servers? WINS servers?

Create a physical network diagram (see Figure 3.2) and a logical network diagram (see Figure 3.3). Physical network diagramsinclude details of communication links; server name and special services; locations of printers hubs, switches, modems, routers,bridges, proxy servers, and communication links; and the available

Mail Server

File Server

1234

File Server

File Server500

250

Mail ServerFile Server

400

Print Server

Mail Server

File ServerDatabase

Call Center

867

F IGURE 3 .1Mapping location resource data.

07NSD/TGch_03 10/11/00 1:04 PM Page 99

Page 6: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

100 Par t I I ANALYZING TECHNICAL REQUIREMENTS

Cabling100 BASE-TEthernet

Windows 2000 Domain ControllerDNS/WINS Server207.156.4.50

Windows 2000 File Server207.156.4.51DHCP Server

SQL Server207.156.4.55

Windows NTDC207.156.2.52

Proxy Server207.156.2.55

AIXUNIX Server207.156.3.60

Windows NTBDC207.156.4.52

Internet

F IGURE 3 .2Physical network diagram.

Windows 2000 DCnewway.com208.54.25.4

Windows 2000 DCabid.com208.54.25.3

Windows 2000File Server

NT ServerExchange

Windows 2000 DCeast.abid.com Windows 2000 DC

east.newway.com

F IGURE 3 .3Logical network diagram.

07NSD/TGch_03 10/11/00 1:04 PM Page 100

Page 7: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 101

NO

TE Small Price/Easy Diagrams Title If

you do not have a diagramming toolyou may be able to download a 30-day trial tool, Smart Draw, fromwww.smartdraw.com. This site has alibrary of more than 1,500 picturesof network hardware. Don’t forget topurchase it if you feel that it willmeet your needs. Pencil and paperare also adequate.

bandwidth between sites. A logical network diagram shows thedomain architecture, including hierarchy, names and addressingscheme, server roles, and trust relationships.

If network diagrams are available, make sure that you understandthem. Verify the existence of hardware. Make sure that the diagramis up to date.

If you need to develop your own diagram, you can follow these suggestions:

Determine the hierarchical structure of your network. Becauserouters work best if they have information only on immediate con-nections, and humans work best if they can break down informationinto small chunks, networks are usually designed in a hierarchicalfashion. Layers beneath the backbone are often hidden, and youmay find that existing diagrams lack the inner details. Or, you mayneed to create multiple diagrams to expose the architecture of yourcompany’s design.

Identify backbone locations. The backbone represents the shape ofyour network. Backbone locations often came about due to physicalfactors (room to house equipment, circuit mileage characteristics,and traffic patterns).

ASSESS AVAILABLE CONNECTIVITY

Assess the available connectivity between the geographiclocation of work sites and remote sites.

How is information getting from resources to users, and from serverto server? While local users access LAN resources, users at other sitesgain access across WAN connections. You should identify andrecord connectivity between sites. Add this information to your dia-grams, and be sure to include the type of transmission technology.Transmission technologies include x.25, Frame Relay, ATM, andISDN, among others. Table 3.1 lists common transmission tech-nologies and their relative speed in kilobits per second (Kbps). Table3.2 lists transmission technologies and the type used. You shouldidentify speed wherever there may be confusion because manydesign decisions will depend on the transmission speed availablebetween different locations.

07NSD/TGch_03 10/11/00 1:04 PM Page 101

Page 8: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

102 Par t I I ANALYZING TECHNICAL REQUIREMENTS

TABLE 3.1

IDENT IFY MAJOR TRANSMISS ION TECHNOLOGIES

Transmission Technology Speed in Kbps Notes

Copper leased lines 56–45,000 In the past, High Level Data Link Control (HDLC) was used to provide errordetection; today, with more reliable circuits, Point-to-Point Protocol (PPP),which provides HDLC framing, is used.

SONET leased lines 51,000–2,488,000 Synchronous Optical Network.

Synchronous transmission takes place over fiber optic cables. Transmissionspeed is reported in Optical Carrier (OC) rates from OC-1, at 51.85Mbps, upto OC 48, at 2.488Gbps.

A similar international standard is Synchronous Digital Hierarchy (SDH).

Channelization 56–2,480,000 Aggregated circuits (combined or multiplexed circuits) are used.

Circuit switching 56–2,480,000 A circuit is routed through one location to reach another. Drop and insert,and/or add and drop multiplexes (ADMs)are used. Static assignments aremade and changing is labor intensive.

Frame Relay 56–45,000 Virtual circuits are used. A logical path from one location in a network toanother is made at the data link level of OSI. This option is best for multipleconnections.

SMDS 56–155,000 A switched-multimegabit data service which involves high overhead, and iscomplex. Large frames are transmitted in ATM cells across the network.SMDS is connectionless.

ATM 1,544 (T1) to This option involves voice and video over a single network. Primarily Asynchronous 2,480,000 (fiber) is a WAN protocol that operates at the data link layer and operates at T3 orTransfer Mode above. Transmission is by fixed-sized packets or cells instead of the larger,

irregular packet size of other protocols. The fixed-sized cells allow transmissionof voice as well as data over the same network and offers greater control ofbandwidth.

POTS 56 Analog dial-up, dial-up terminal servers, and telephones are used.

ISDN BRI 64–2* 64 Integrated Digital Services Network is used for transmission of voice, data,Basic Rate Interface and video over standard telephone lines.

ISDN PRI 64–23 * 64 This option provides digital access, transmitted on T1 lines.Primary Rate Interface

Cable 128–10,000/home Faster than POTS, this option offers stability and reliability. After this sharedmedium is up, it stays up.

ADSL 128–6,000 This asymmetric digital subscriber line was developed with interactive videoservices in mind; the higher speeds are reached during the downloading ofdata. Uploading is much slower.

07NSD/TGch_03 10/11/00 1:04 PM Page 102

Page 9: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 103

Transmission Technology Speed in Kbps Notes

VDSL 20,000–155,000 A faster DSL, this option is a very high-speed digital subscriber line for voice,video, and high-definition TV.

IP tunneling 56–45,000 This operates over various networks, including the Internet and iVPN.

Wireless 19.2 This option uses normal analog cellular telephone channels and multiplexesCDPD them for greater bandwidth. CDPD is Cellular Digital Packet Data, which

was developed for use on cellular phone frequencies. CDPD provides bettererror correction than regular analog lines. It uses unused cellular channels.

Public wireless Public wireless uses normal cellular phones services.

T1 1,544,000 Dedicated 23 B channels are used for data, and 1 D channel is used for clocking, in addition to fractionalized T1 divides T! into separate. 64 Kbps segments.

TABLE 3.2

TRANSMISS ION TECHNOLOGIES AND TYPE USED

Transmission UsageTechnology

Residential Access Backbone CommercialConcentration

Copper leased lines x x x

SONET leased lines x x x

Channelization x x x

Circuit Switching x

Frame Relay x x x

SMDS x x

ATM x x x

POTS x

ISDN BRI x x

ISDN PRI x

Cable x

ADSL x x

VDSL x x

continues

07NSD/TGch_03 10/11/00 1:04 PM Page 103

Page 10: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

104 Par t I I ANALYZING TECHNICAL REQUIREMENTS

TABLE 3.2

TRANSMISS ION TECHNOLOGIES AND TYPE USED

Transmission UsageTechnology

Residential Access Backbone CommercialConcentration

IP tunneling x x x x

Wireless CDPD x

Public wireless x x

T1 x

Note each transmission type used. Understanding something about each transmission type will enable you to consider the possibleimplications for your security design. You also will have a betterchance to recognize the additional hardware that should be present.Knowing whether hardware should exist is useful in preventingrogue connections.

Implications for design include the following:

á Permanent virtual circuits (PVC), though created administratively, may remain active for years and may not beeasy to move; switched virtual circuits (SVC) can be createddynamically when needed. Both SVC and PVC are possiblewith ATM and Frame Relay.

á The current implementation of L2TP is not capable of tunneling over ATM, Frame Relay, or X.25.

á Bandwidth will be affected by some security design decisions.

á Windows 2000 has limited support for ATM. There is anupdated NDIS 5.0 miniport driver, limited support for theinstallation of ATM hardware adapters, and ARP/MARS service, which enables MS TCP/IP stack to resolve ATMaddresses to hardware addresses. (The IP over ATM modelmeets RFC 2225, specifications for ARP over ATM.)

á ADSL is particularly suited for home and small businessInternet access because it supports higher transmission speeds

continued

07NSD/TGch_03 10/11/00 1:04 PM Page 104

Page 11: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 105

in one direction over the other, reducing crosstalk. It is possible to have 6Mbps downlink (outbound to the consumerfrom the ISP) and 600Kbps uplink (inbound), although carri-ers implement at lower speeds.

á Windows 2000 offers dial-up connection support for PPP overATM, ATM over DSL, and ATM over cable modem.

Don’t forget to locate any instances where the Internet is used as if it were a transmission medium. Here, I mean the creation of IP tunnels or virtual private networks (VPNs) (see Figure 3.4). Each IP tunnel can be though of as if was a Frame Relay or ATM PVC.

A VPN is a logically or virtually private internetwork that intercon-nects multiple locations that are under a common ownership oradministration. Similar technology can be used in e-commerce (see Figure 3.5), but both points in a VPN are owned by the company; in e-commerce, the customer, whether commercial or consumer, owns half of the connection. A VPN creates multiplepoints of exposure for the network administrator or architect to secure.

What about the movement, transport or otherwise, of non-IP data?You should document this as well.

Tunnels

Salesman

New York

Philadelphia

F IGURE 3 .4Virtual private network (VPN).

NO

TE A B2B VPN In Figure 3.5, The Tilapi

Automotive company has a business-to-business (B2B) site set up for itsparts suppliers to bid on orders andfor plants to purchase parts atapproved prices. A VPN provides secu-rity. In addition, dealerships can usethe VPN to access inventory informa-tion, post their inventory, and learnabout promotions. Customers andprospects can use the normal Internetchannels to learn about the new carmodels, find a dealership, and contacta salesperson.

07NSD/TGch_03 10/11/00 1:04 PM Page 105

Page 12: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

106 Par t I I ANALYZING TECHNICAL REQUIREMENTS

IDENTIFY NETWORK TOPOLOGY

Knowing network topology tells you about the connection pointsand the information flows. Knowing where information goes helpsyou to protect it. Knowing where the major connection points areenables you to look for security vulnerabilities.

A good example of examining information flow is the requirement ofsome sort of a gateway. For example, if the topology is a physical starand various mail servers are used, there must be a central gateway ormail hub; all mail travels to the center of the star and then back outagain. Examine the Mid Ho Pharmaceuticals case study at the end ofthe chapter for an example of a mail hub/physical star topology.Connection points are points to check for security weaknesses.

Home User

Tilapi Car Dealership

New York

PhiladelphiaParts-is-Parts

Tilapi Automotive

Firewall

Home UserShopping for Car

3

3

2

1

F IGURE 3 .5An e-commerce configuration.

07NSD/TGch_03 10/11/00 1:04 PM Page 106

Page 13: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 107

Topology includes the following:

á Physical star—(See Figure 3.6.) This configuration may haveresulted from the need for a hub at the greatest traffic intensitypoint. When leased lines were the only solution, the obviouschoice was to end all lines at the center location. This wasoften the corporate headquarters. The center then can beaccessed from any location in one hop, and any location is nomore than two hops from any other.

á Logical star—(See Figure 3.7.) Leased lines create permanentcircuits directly between company-owned points. Frame Relay,which creates virtual circuits between Telco-owned points, isbetter served by this architecture. There is no need to locatethe hub at “the geographic center of gravity of network.”Traffic concentration is important as distances becomes almostirrelevant. (Carrier service usually provides distance-insensitivetariffs.) Propagation delay, or the extra time it takes for data totravel longer distances, may be insignificant.

á Full mesh—(See Figure 3.8). Every location has direct con-nectivity to every other location. This is usually accom-plished with leased lines. (This configuration is fairly rarebecause it is costly.)

Seattle

ChicagoNew York

San Francisco

Dallas

F IGURE 3 .6Physical star.

07NSD/TGch_03 10/11/00 1:04 PM Page 107

Page 14: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

108 Par t I I ANALYZING TECHNICAL REQUIREMENTS

á Partial mesh—(See Figure 3.9.) This configuration providesgood performance and vigorous recovery from failure at amore modest cost.

Continue to add detail to your network diagrams. Indicate the location of routers, especially Interior Gateway Protocol (IGPswithin the organization) and Exterior Gateway Protocol routers that border your extremities and connect to the outside world.

Document security standards for routing configuration. Havedefault passwords been removed? Are routers remotely managed? Arerouters used as packet filtering firewalls?

Seattle

ChicagoNew York

San Francisco

Dallas

Seattle

ChicagoNew York

San Francisco

Dallas

FRAMERELAY

F IGURE 3 .7Logical star.

F IGURE 3 .8Full mesh.

07NSD/TGch_03 10/11/00 1:04 PM Page 108

Page 15: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 109

Document your addressing and naming standards. Is addressingassigned using DHCP? Are BOOTP-enabled routers used? Whatabout DHCP relays? Do naming conventions follow DNS standardsor NetBIOS standards? (The Internet standard character set for DNShost naming is defined in RFC 1123 and is composed of all uppercaseand lowercase letters [A–Z and a–z], numbers [0–9], and the hyphen[–]). Microsoft DNS includes support for extended ASCII andUnicode characters, although this is useful only in pure Windows2000 networks. Are your DNS servers Microsoft Windows 2000DNS servers? Other DNS servers meet standards as well and may pro-vide support for an extended character set. BIND 8.x (Berkell InternetName Domain, a UNIX DNS server) supports an extended characterset (“ ”) or underscore, but earlier versions may not.

If your naming standard does not meet the Internet standard, or ifyou use extended character sets that are not available elsewhere, youmay find yourself battling connectivity issues.

ASSESS NET AVAILABLE BANDWIDTH

Assess the net available bandwidth.

Net available bandwidth is the bandwidth available after all currentservices and applications are accounted for. This seems logical, but how do we assess the bandwidth of the current services andapplications, and why is this important to our security design?

Seattle

ChicagoNew York

San Francisco

Dallas

F IGURE 3 .9Partial mesh.

07NSD/TGch_03 10/11/00 1:04 PM Page 109

Page 16: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

110 Par t I I ANALYZING TECHNICAL REQUIREMENTS

Bandwidth, of course, is the number of bits that can be transmittedper second (the throughput) over a network medium. Many securityfeatures such as IPSec, encryption, and tunneling add demands tothe network and can reduce throughput. It is important to develop autilization baseline before implementing these new features.Knowing the raw capacity of communication resources on the LAN,between networks in your WAN, is not enough. You need to knowhow much of it is currently used. Before implementing new tech-nologies, you need to determine if existing capacity will support,within performance requirements, the load that new features willdemand.

You can use a number of Windows 2000 tools to obtain metrics forbytes and packets sent and received; transmit and received errors;and packets per second. Performance Monitor, Network Monitor,and the extended SMS Network Monitor have these capabilities.Network Monitor also reports the percentage of network utilization.

A number of existing third-party network and systems managementtools also can be used in your network, for these purposes. Moreinformation can be found under the section “Analyze Existing andPlanned Network and Systems Management,” later in this chapter.

Document the existence location and administrative responsibilityfor these tools. Obtain current reports, and provide input to net-work engineers and deployment and planning teams on the addi-tional requirements of security protocols and functions.

ANALYZE PERFORMANCEREQUIREMENTS

Analyze performance requirements.

What are the current performance requirements for your network?Performance requirements may be specified in response time andthroughput, or the amount of data transferred per second orprocessed in a particular amount of time. Typical measurements arebandwidth, latency (wasted time and propagation delay), number oflost packets, and guarantee of connectivity. Database applicationsmay be benchmarked at a number of transactions per second.

07NSD/TGch_03 10/11/00 1:04 PM Page 110

Page 17: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 111

If you contract with an ISP for a VPN, or if you purchase lineservices directly from a Telco for Internet access, you may also havenegotiated service agreements that specify the level of acceptable performance. These service level agreements (SLA) also specify yourrecourse if these are not met.

Record these SLAs. Although they reflect performance on transmission outside the scope of your organization, they do represent performance upon which your organization depends. As more organizations add increased demands on these external circuits, your need for SLA agreements will increase. Your bench-marks and performance requirements for communications betweensites will be impacted by the delivery they offer.

It important to note that while pure movement of bits can be quan-tified, the actual level of performance required may vary dependingon the application used. For example, VPN performance require-ments may specify network backbone availability and server avail-ability above throughput guarantees.

Conversely, major signs of network problems are these:

á Peak utilization—Greater than 70% on backbone circuits.

á Frame or cell loss—Greater than 2–3%.

á Network latency—Increase by more than 10%.

Additional signs of trouble are these:

á Permanent virtual circuit flapping—Routes between twonodes alternate rapidly between two paths because of intermit-tent failures.

á Cyclic redundancy check—Errors increase.

á Data loss during peak periods—The committed informationrate (CRI) is substantially oversubscribed.

á Applications—Periodic timeouts occur.

á Help desk—A rapid increase in help desk calls occurs, or agradual increase in related help desk calls is noticed over time,with no new upgrades or rollouts in process.

NO

TE The Ivory Soap Statistic Years ago,

Ivory soap advertised that it was99.99% pure, and this became astandard for all things—only the bestwas 99.99%. It is interesting to notethat availability guarantees from AT&T,MCI, Sprint and Concentric Networkhave offered guarantee of 99.9% to100% availability for Frame Relay, ATMservices, and IP-based services.Average round-trip latency guarantees80–85 milliseconds (ms), with a maxi-mum latency of 120ms and a guaran-tee that packet loss will not exceedan average of 1% per month for dedi-cated connections.

Internet guarantees usually are at99.9% availability as well.

07NSD/TGch_03 10/11/00 1:04 PM Page 111

Page 18: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

112 Par t I I ANALYZING TECHNICAL REQUIREMENTS

Computer performance is also important. Baselines on important,widely used, or critical servers should be made because increasedsecurity may affect them as well. Performance Monitor can be usedto develop this baseline. A good reference is the Windows 2000Resource Kit. Both Windows 2000 Server and Windows 2000Professional editions have extensive information on performancemonitoring. For more information on computer performance evalu-ation, visit The Standard Performance Evaluation Corporation(www.spec.org).

ANALYZE DATA AND SYSTEMSACCESS METHOD

Analyze the method of accessing data and systems.

As you know, one of the major areas of security concern involves the access points to your network, your systems, and your data. Your network diagrams identify physical connection points to yournetwork from other parts of your corporation and from external networks. They should be evaluated for possible security issues. Arefirewalls and intrusion-detection systems in place? Is management of routers secured? Is there a strict policy about modem location?Are remote access servers protected and protective?

Next, examine connection points on your internal network, bothphysical and programmatical. Physical access includes availability of both computers and connection points or ports. Programmaticalaccess includes user authentication to systems and application accesscontrol, as well as restrictions possible at the file and/or folder level.

Are users required to log on? How are files protected? What granularity exists?

You can categorize your search and documentation efforts.

á Physical access to systems

á Authentication

á Authorization

á Handling of backups and other data stores

á External access

07NSD/TGch_03 10/11/00 1:04 PM Page 112

Page 19: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 113

Physical AccessAre servers located in rooms where access is restricted? Note locations of all servers and their physical environment. Determinewho has physical access and when. Are any security devices (key lock doors, biometrics, or badges) used to restrict access?

Are all access ports documented and accounted for? You should beespecially concerned with those exposed ports—ports that may existin lobbies, conference rooms, training rooms, or other areas open tomore public access and potential abuse.

AuthenticationAuthentication is the process of proving that you are who you sayyou are. In computer networks, this usually is accomplished bythe use of a user ID and password, and the confirmation of thisinformation by some cryptographic algorithm. List all the authen-tication mechanisms used on your network. Windows networks,for example, use LM and/or NTLM to authenticate users.Windows 2000 offers significantly more secure authenticationmechanisms, including Kerberos, certificate-based authentication,and Extensible Authentication Protocol (EAP). The algorithmsand more details can be found in Chapter 10 “Designing anAuthentication Strategy.”

If your environment is more varied, how is authentication handled?Do users have multiple user IDs and passwords? Are accounts syn-chronized between systems? Are passwords passed in the clear acrossthe network? Other systems already use algorithms such as Kerberosand RADIUS that Windows 2000 supports. Which of these will youneed to plan integration with?

Applications in your enterprise may not rely on the OS for authentication, but they may use a security structure of their own.Investigate and document how they handle security. It may be aweak or strong point in your authentication scheme, but in designinga Windows 2000 authentication strategy, it is critical to understandso that you may determine how to deal with it. Database applicationsare one of the first applications to consider in searching for thesealternative plans.

07NSD/TGch_03 10/11/00 1:04 PM Page 113

Page 20: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

114 Par t I I ANALYZING TECHNICAL REQUIREMENTS

Are additional authentication mechanisms currently in place in yournetwork? Are smart cards, tokens, and biometrics used? Documentthe existence of public key usage and architecture.

AuthorizationIs there a carefully planned, granular design that controls user accessto shares, files, and folders? Is this periodically reviewed for correct-ness? Who controls the access to sensitive files? Is it the owner? Whocan delete files? Windows 2000 uses discretionary access control lists(DACLs) to set authentication privileges on files, folders, and shares.

Registry keys also use DACLs.

You should document the file and registry key DACLs for all servers. Useful, downloadable tools for this purpose are availablefrom Somarsoft (www.somarsoft.com). The Windows 2000 ResourceKit also has utilities that might help, and other third-party tools maybe used as well.

MEANWHILE, AT THE CUSTOMER SITE

How many of you have been arrested for data destruction? One ofmy friends narrowly escaped.

Not too many years ago, I worked for a training firm that sent mostof its trainers to customer sites to do training. This was at a timewhen the networking model was just beginning to spread across thebusiness landscape. Most end-user trainers had little to no experi-ence with operating systems, and no experience with networks.

My friend—I’ll call her Amy—was an experienced trainer. Shealways arrived early, got along well with folks, and got excellentreviews. The curriculum she taught required her to place data filesfor the students on their PCs when she arrived. One day shearrived and found that the student computers were networkedtogether. She asked if she might put her data files on the networkto make that job easier.

She was given a user ID and a password, as well as a location to place the files. She copied the files to the network and thenrealized she had put them in the wrong folder. Amy had just learnedthis really cool DOS command deltree. Well you can guess whathappened. She had been given administrative privilege on the

IN THE FIELD

07NSD/TGch_03 10/11/00 1:04 PM Page 114

Page 21: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 115

network. She had placed her files at the root of the network fileserver. When she ran deltree, in the words of the network adminis-trator, “she deleted everything on the server.”

It took some pretty hard talking to convince that company that theyreally shouldn’t have made it so easy for an outsider to destroytheir file server.

Backups and Other Data StoresDetermining who has access to your backup data is as critical asdetermining access to your systems. Record backup managementprocesses and the location of onsite and offsite copies.

Don’t forget to check for emergency repair disks (ERDs). WhileWindows NT stores a copy of the Security Accounts Manager(SAM) (if it’s small enough) on the ERD disk, Windows 2000 stores data that can be used during system recovery. (No registrydata is stored on it.)

Both Windows NT and Windows 2000 use the %systemroot%\repair folder to store a copy of the SAM. This folder can beused during recovery. Windows 2000 systems include only localaccounts in the SAM (domain accounts are in the Active Directory),but don’t forget that for Windows 2000 Professional and Windows2000 Server, that includes the local Administrator account. If amalicious individual obtains a copy of the SAM, he could use it in a dictionary attack on accounts and passwords. With knowledge ofthe local Administrator account or NT 4.0 domain Administratoraccount (in mixed-mode Windows 2000 networks), your attackerhas significant power.

Windows NT discs were a great source for hackers, so Windows2000 ERD disks cannot be used alone to recover the registry.Instead, they are used to repair system files, the partition book sector, and the startup environment. The registry is recovered usingthe Recovery Console and system state backups. System state backuptapes, like any form of backup, should be protected.

Security policy may dictate how ERD disks and repair folders areprotected or managed. If written policy does not indicate this, besure to record this information.

NO

TE Dictionary Attacks A dictionary

attack is one in which a list of com-mon words (or a dictionary) isencrypted with the same algorithm asthe passwords the hacker wishes tocrack. The encrypted passwords thenare compared one by one with everyword in the dictionary, hoping for amatch. A match, of course, meansthat the hacker has cracked a pass-word. Sadly, many people use com-mon words as their passwords.

07NSD/TGch_03 10/11/00 1:04 PM Page 115

Page 22: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

116 Par t I I ANALYZING TECHNICAL REQUIREMENTS

Windows 2000 systems also offer the opportunity to back up systemstate information only. System state backups include the following:

á Registry

á COM+ Class registration database

á Boot files

á Certificate Services Database

á Active Directory directory service

á SYSVOL directory

á Cluster service information

Another area to research is the status of recovery programs.Windows 2000 uses the Recovery Console, a set of command-lineadministrative commands that can be used to stop and start services,read and write data on local drives (including NTFS drives), repairmaster boot records, and format drives. The recovery console can beinstalled on the system or, if left off, requires the Windows 2000CD-ROM. Only administrators can use the Recovery Console.Policy should dictate who can use the Recovery Console.

Gather similar significant information on other OSs in your projectscope.

External AccessWhat are the entry points to your network? Dial-up servers? VPNendpoints? Border gateway routers? Internet Web sites? Any point atwhich authorized access can occur must be documented so that itcan be protected. Be sure to look for dial-up modems on desktopmachines. Also document wireless entry points. Modern computersystems are coming equipped with wireless ports, making every com-puter system a potential point of entry.

What is the policy on bringing software and data from outside thenetwork? Who is traveling with corporate data and access softwareon a laptop? What is policy on protection of corporate data thattravels? Is it followed? Are security devices, smart cards, tokens, andbiometrics issued with laptops?

07NSD/TGch_03 10/11/00 1:04 PM Page 116

Page 23: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 117

ANALYZE NETWORK ROLES ANDRESPONSIBILITIES

Analyze network roles and responsibilities. Roles includeadministrative, user, service, resource ownership, and application.

For Windows networks, each domain, standalone server, andProfessional workstation, has a list of users and groups. Non-Windows systems do as well.

Your job is two-fold: You must validate the roles of all the users and groups that exist, and you must determine whether there areadditional roles that are not being addressed, or whether the currentplan could or should be modified in some way. You can start byobtaining or making a list of current roles and responsibilities, or youcan start with hypothetical roles and responsibilities based on yourview of the network, the company, and its processes. If you haveextensive background in these things, then you will realize that manyof the roles and responsibilities will be the same on every network,but that each company will have special assignments of its own aswell. An organization’s business practice should not have to be forcedinto a preconceived notion of what users and groups it needs.

NO

TE Double-Loop Learning In all your

documentation efforts, use the dou-ble-loop learning process. Thisprocess was first described by GarethMorgan in Images of Organization(Berrett-Koehler Publishers, 1998,page 80) to define how errors that goagainst the norm should be handled.I adapt it here for documentation processing.

Single-loop learning is the process of documenting the system beforeupgrading it. You assume that the system works; you are just going tomake it work faster or make it moresecure.

Double-loop learning is the process of questioning whether the currentsystem is the correct one (seeFigure 3.10). Designing a securesystem that doesn’t work isn’t a goodthing. Users will do their job somehowand will look for ways around anysecurity if it means getting the jobdone faster or easier.

1. What’s There?

3. Action if Necessary

2. Is This Normal?

2A. Is the Norm

Correct?

F IGURE 3 .10Double-loop learning process.

07NSD/TGch_03 10/11/00 1:04 PM Page 117

Page 24: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

118 Par t I I ANALYZING TECHNICAL REQUIREMENTS

AdministrativeAdministrative roles should be granular within any but the smallestorganization. In many networks, administrative roles are brokendown by job responsibilities and include things such as the following:

á Backup operator

á Account management

á Server operator

á Database management

á Security management

á Global management

á Audit management

á Domain name server management

Within this structure, there may be a need for further horizontal orvertical organization. Roles may need to be delegated for particulargroups of servers.

Are there additional management groups? Look for network and OSand database management, not production or accounting; perhapsalso look for network engineers, folks who need special access tosystems and networks.

UserThe standard definition of a user on most networks is that it repre-sents the lowest common denominator. Users have the basic right tolog on to the network or a system.

Other groups may be devised to denote resource ownership or addi-tional responsibility beyond basic access to the network. Contractorswho need the right to add Windows 2000 workstations to thedomain come to mind. This group of individuals is hired to assistwith installation, and they may need this one administrative right inthe domain. While Windows 2000 users can add up to 10 computeraccounts to the domain, these contractors may be responsible formaking sure that hundreds or even thousands of systems are set upcorrectly. By creating a group and giving the group the added

07NSD/TGch_03 10/11/00 1:04 PM Page 118

Page 25: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 119

responsibility (and right), you have given these employees only whatthey need, and no additional administrative access to your systems.

ServiceIn a Windows 2000/NT system, all programs must run in the con-text of some authorized account (see Figure 3.11). When you useMicrosoft Word, its processes use your account to access resources.The application can access resources and perform actions that youare authorized to do.

Many server-based applications, on the other hand, run processesinternally that have nothing to do with user access. They need spe-cial rights and privileges similar to users. They need to be able torun, even if no real user is logged on, and they need to run consis-tently, no matter who accesses the data. These processes run whetheror not the application is being used by users. Applications that usethis approach are Microsoft Exchange, Microsoft SQL Server, IBM’s

User runsapplication.

Application has useof key.

Application runs incontext of user.

Resources

Users run application.Don’t need keys to access resources. Application has a

service that usesan account.

Account has keysto accessresource.

User has keys orrights to access.

F IGURE 3 .11An application runs in the context of an account.

07NSD/TGch_03 10/11/00 1:04 PM Page 119

Page 26: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

120 Par t I I ANALYZING TECHNICAL REQUIREMENTS

DB2 Universal Database, and the Windows 2000/NT operating systems itself. Other OSs have similar setups. UNIX calls theseprocesses daemons. In Windows 2000/NT, these processes are calledservices. Because they are accessing resources on the system, theymust have an account to use for authentication and authorization.Many can use the local system account, an account that representsthe OS. Others need regular Windows 2000/NT user accounts, towhich they have been given the right to log on as a service, in addi-tion to perhaps other privileges.

Resource OwnershipEach resource on your system has an owner. The owner may be theuser who created the object, or ownership may be in the hands ofthe Administrators group. Access to file objects is defined inWindows 2000/NT by the type of file system, whether access isinteractive or across the network, and by permission placed on filesystem objects. Permissions are granted to users and/or groups. Theright to grant permissions is also specified and belongs to the ownerof the object and any group or user granted the Permission right.

Windows 2000 supports three basic file types: NTFS, FAT32, andFAT. (Windows NT 4.0 supports FAT and NTFS). Access to objectsin the FAT file system cannot be controlled except through shares.Access through shares implies network access. Interactive users arenot bound by permission specified on shares. NTFS, however, allowsgranular access on an object to be specified. DACLs are created foreach file and folder.

Access to network printers and remote access servers is also controlled. Other server application access can be controlled throughfile permissions and through the application itself. The Windows2000/NT registry is also controlled by ACLs set on registry keys.

Other operating systems in your enterprise may also have accesspermissions and definitions of resource ownership.

You will find multiple groups of users defined in Windows2000/NT domains as well as on standalone and member servers,NT workstations, and Windows 2000 Professional systems. You

07NSD/TGch_03 10/11/00 1:04 PM Page 120

Page 27: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 121

should make a record of these groups, their purposes, and theirrights. Record the resource ownership. When designing Windows2000 security, you must not allow arbitrary changes to these permission sets.

You should also validate current arrangements.

Are groups given appropriate rights and not any extra? Are files and folders, printers, RAS services, and registry keys, appropriatelyassigned? Do appropriate shares exist? What compromises have beenmade to security because of improperly assigned permissions? Whatapplications necessitate this arrangement? Are updated, Windows2000-certified versions of these applications available?

Windows 2000 offers new possibilities for group assignment.Knowing current group arrangements and how well they fit yourorganization’s needs will make for a smoother transition. More information on Windows 2000 groups can be found in Chapter 7,“Designing a Security Group Strategy.”

ApplicationApplications also access resources and operate according to ruleswithin the OS. When their processes are running under the contextof service accounts, the resource DACLs must give them appropriateaccess. When they are not, these applications operate under contextof the user who is using them.

Which folders and files and registry keys does the applicationrequire access to? Are there registry keys, files, or system files wherethat access is inappropriate and causes a relaxation in protection, oran elevation in user privileges, just so the user can run the program?These types of programs may also cause problems in Windows2000. Windows 2000 gives users more innate privileges and systemfile and registry access than Windows NT does. However, Windows2000 uses the Power Users groups as a replacement for the Usersgroup. Those users who need to run poorly designed applications in Windows 2000 may need to be given membership in the PowerUsers group until replacement or upgraded applications can be found. More information on user groups, privileges, and authentication can be found in Chapter 7.

07NSD/TGch_03 10/11/00 1:04 PM Page 121

Page 28: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

122 Par t I I ANALYZING TECHNICAL REQUIREMENTS

ANALYZE THE SECURITY DESIGN

Analyze the impact of the security design on the existing and planned technical environment.

Windows 2000 offers a plethora of new security features designed toprovide high levels of security and ease of implementation andadministration. These include IPSec, L2TP, Kerberos, an EncryptingFiles system (EFS), public key infrastructure, RADIUS, smart cardsupport, new security groups, and a higher level of default file andsystem access restrictions. What security features you implement,how easy implementation and administration will be, and theimpact your design has, depend greatly on policy and current net-work physical and security structure. Now that you have docu-mented this, you must round up documentation, ask forclarification, and examine company policy, needs, and requirementsin light of this.

What systems does your Windows NT network interface with? Areyou using Gateway Services for NetWare? Service for UNIX? Third-party integration strategies? The number of opportunities you havefor interoperability with other OSs is widely expanded in Windows2000. Kerberos, RADIUS, and IPSec all can be used in this effort.There are new versions of old tools, with enhanced capabilities andincreased requirements. Will your third-party tools work withWindows 2000? Some of these features were written with interoper-ability in mind. Information on interoperation with externalKerberos realms (the administrative domains of MIT Kerberos v5)can be found in Chapter 10, “Designing an AuthenticationStrategy.” If you are using third-party solutions involving smartcards, you may no longer need the server-side software to use them.You will need to contact third-party tool vendors for information ontheir interoperability with Windows 2000.

You must understand current server applications that may requireservice packs or patches, such as Proxy Server and Exchange Server.New versions of these products will take advantage of Windows2000’s additional directory and security services. You must plan timeto study new and different security features that these upgrades willbring. At this point, you must document what you do have in thecurrent environment.

07NSD/TGch_03 10/11/00 1:04 PM Page 122

Page 29: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 123

Assess Existing Systems and ApplicationsPreviously, you created current hardware and software inventories of server and client computers in your network—get them now. You listed all routers, modems, and remote access servers. Nowinclude details: BIOS settings, peripheral device configurations, and driver versions.

Did you list all the applications found on all the computers withversion numbers, date and time stamp data, dynamic link libraries,and service packs applied? Do you have network configuration documented for servers and client computers?

Use the results collected by any systems management programs, suchas Microsoft’s Systems Management Server.

If your security design team is a member of a greater deployment or migration effort, then much of this documentation may reside in this group’s domain. Make sure that you have access to it. Whilemigration and upgrade efforts need this data to enable efforts at basic hardware and software compatibility level, you need it todetermine the best way to implement security policy in your design.

Pay particular attention to problem areas. If current hardware orsoftware is not working well, is it related to security? Will newWindows 2000 security features resolve the issue or make it morecomplicated?

Examine non-Windows NT DNS servers for their implementationof dynamic registration and service (SRV) resource records. If theyare not capable of these features, does an upgrade exist that wouldenable them? Windows 2000 uses these features, and you may wantto have integration with non-Windows 2000 DNS servers. SomeDNS servers, such as BIND 4.97 and BIND 8.x, support SRVresource records.

Does existing documentation include information on services running on all servers? Be sure to include services running onnon-Microsoft servers, such as UNIX BIND, Service Advertising

Protocol (SAP), and Routing Information Protocol (RIP).

Check details on servers, and look for configurations that shouldhave been documented elsewhere. For example, servers may host

07NSD/TGch_03 10/11/00 1:04 PM Page 123

Page 30: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

124 Par t I I ANALYZING TECHNICAL REQUIREMENTS

banks of modems but not be identified as RAS servers, or servers maybe multihomed (have multiple network adapters) (see Figure 3.12).This may mean that they are looking for the increased throughputthat this arrangement might offer, or it may mean they are undocu-mented links to the outside world. Firewalls, routers, and proxyservers usually are multihomed. Note whether servers require or relyon special protocols. Do applications require residence on a domaincontroller? Domain controllers should have tighter security settings—in fact, Windows 2000 domain controllers do. If applications mustrun on a domain controller, they may require a loosening of thesesecurity settings to run.

Web and proxy servers require special security and bandwidthbecause of their nature and location. For more information, seeChapter 4, “Designing a Security Baseline,” and Chapter 10.

Line of Business ApplicationsLine of business applications should also be considered for theimpact of a new security design. You identified core applicationssuch as database, email, and financial systems. If these are beingmigrated to Windows 2000 or have already been moved, basic compatibility studies may have been already completed. Areupgrades planned to make them compatible, or simply to providenecessary business features? Look for the “Certified for Windows”logo. Microsoft has implemented a new application certification program that has significant security requirements for approval.Applications that are certified will work more smoothly and

192.156.7.3

192.156.7.2 208.234.56.3

Internet

Proxy Server

192.156.7.3

F IGURE 3 .12The presence of an undocumented multihomedcomputer may pose a security problem.

07NSD/TGch_03 10/11/00 1:04 PM Page 124

Page 31: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 125

appropriately within your new security design. Understanding their appropriateness and functionality before requiring strict compliance can help. Whether only certified applications will residein the upgraded network is a policy decision. Implementing the bestand most workable security design, whatever the policy, is your job.To do so, you need to know application status.

What are the built-in security features of these applications? Do you integrate with Windows NT users and groups, or develop yourown security structure? Do these applications require particular protocols for communication or authentication? How are passwordscommunicated across networks? Windows NT and Windows 2000,as well as many other OSs do not pass passwords in the clear acrossthe network. However, applications that insist on their own securitystructure, and even many that integrate with Windows securityarchitecture, may communicate passwords across the network formtheir client applications to the server in clear text. Before Version 6of IBM’s DB2-UDB for Windows NT, client passwords were trans-mitted in clear text. DB2UDB utilized Windows NT usernames andpasswords to delegate authentication and authorization, but failed to integrate fully with the security architecture and thus exposed network passwords. I am told that DB2-UDB for Windows NTVersion 6 corrects this problem.

Domain StructureAre current domain structure and trusts adequate and appropriate?Why do they exist? Are they the result of corporate IT administra-tion division politics? Do they stem from misunderstandings ofdomain structure?

Knowing how and why current structure exists can help you determine whether things can and should be changed in the administrative model. Doing so can reduce costs, make operationmore efficient, and improve security. You may be the voice of reason. The trust structure in Windows 2000 is very different.Transitive trust relationships can be created automatically duringconfiguration, and trust extends automatically to all servers in a tree.A tree is a logical grouping of Windows 2000 domains within aDNS namespace.

07NSD/TGch_03 10/11/00 1:04 PM Page 125

Page 32: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

126 Par t I I ANALYZING TECHNICAL REQUIREMENTS

Identify Existing and PlannedUpgrades and RolloutsYou cannot rely on things staying the same. At this point, you wanta snapshot so that you can analyze the implication of your design;while you work, things are changing. Identify upgrades and rolloutsthat are currently in progress. Inquire about and document anythingin a planning stage. While it may be true that it’s difficult to hit amoving target, it doesn’t make sense to pretend that the target hasn’tmoved or won’t move.

You will need to coordinate your planning efforts with those ofother systems.

Analyze Technical Support StructureKnowing what kind of support is available, how it’s managed, andwhat the level of support staff expertise is can be invaluable.

Document the location of support staff. Is support internal? Is itoutsourced?

Determine what you can expect during your implementation phase. Your knowledge of other upgrade and planning efforts is critical here. If everyone is off working on that other project, where’syour help going to come from? Is support organized by levels ofexpertise? Is there a budget for training in the new technologies?Who controls the assignment of support staff to projects?

Analyze Existing and Planned Networkand Systems ManagementHow are the network and its systems managed? Who is in charge?Previously you examined the structure of IT management. Here youwill look at security policy, and network and systems managementtools.

07NSD/TGch_03 10/11/00 1:04 PM Page 126

Page 33: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 127

Security PolicyDocument existing policy and guidelines on security. Are thererequirements for appropriate network usage? Is Internet accessallowed? For what purpose? What constitutes prohibited or inappropriate access?

What are the policies in place regarding partner access to companynetworks? Are partners able to access the entire work as recognizedusers (or as anonymous users, such as Web site visitors)? What areyour policies concerning their access to data and resources? Is theiraccess to data read-only? Or are they allowed to change or add dataon your network? How is their access to applications restricted?

Are encryption and security standards in place or planned? Whatpermissions exist by user and user group? What are the domains andtheir trust relationships? What are your password standards? ForWindows NT domains and computers, information can be found inUser Manager for Domain Account Policy. Are there security proto-cols implemented on your network, such as Secure Sockets Layer(SSL), IP Security (IPSec), and Point-to-Point Tunneling Protocol(PPTP)? How are users from the Internet authenticated? How aredial-up users authenticated? What about users that cross WAN links?

Do multiple accounts exist for single users? Do these users requirethese multiple accounts due to their usage of multiple operating sys-tems, due to separate user and administrative actions by the sameperson, or due to appropriate or inappropriate domain structure orresource management? By documenting users with multipleaccounts, you may find ways to reduce this without compromisingsecurity. Tools exist for integration of passwords—are they in use onyour network?

Network Management Tools and SystemsWhat tools are used for network management? Commercial toolsexist that enable you to assess multiple network parameters andchange remote server configurations. Some of them work with multiple OSs.

07NSD/TGch_03 10/11/00 1:04 PM Page 127

Page 34: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

128 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A useful resource on network management can be found atnetman.cit.buffalo.edu/index.html.

Several categories of tools exist:

Network sniffers, or protocol analyzers, used to be the toys of thewealthy, or used only as a last resort. Network General producesgeneral expert sniffers; agents are placed on network segments asrouters block network utilization measurements.

Microsoft Network Monitor comes with Windows NT. Althoughthis version can monitor packets only directed at it or of a broadcastnature, a more elaborate version is available with SystemsManagement Server.

Sophisticated devices dynamically allocate bandwidth as required forATM switches and hubs.

Other Simple Network Management Protocol (SNMP) managementtools can be used to control the tables of a router, bridge, or concen-trator.

CyberGauge (from neon software, at www.neon.com) is a bandwidthmeasurement utility and monitor. It analyzes the throughput of arouter and determines how much bandwidth is being used on vari-ous switches and hubs. It uses the Simple Network ManagementProtocol (SNMP). CyberGauge displays information on a real-timegraph, saves information for review, and exports or prints ondemand. You also can use this tool to find out your bandwidth uti-lization. It is often used to measure your link to the Internet.

LANsurveyor automatically maps networks, if computers have theLANsurveyor client responder on them.

Netcomsystems (www.netcomsystems.com) produces network mea-surement products. SmartBits Network Performance Analysis systemis hardware and software that can be used to simulate network use.

Concord Communications, Inc. (www.concord.com), producesNetwork Health suite, which monitors your network and producescontinuous graphical data on capacity and resource allocation.

Hewlett Packard (www.hp.com) and Radcom Ltd. (www.radcom-inc.com)also produce network management tools.

07NSD/TGch_03 10/11/00 1:04 PM Page 128

Page 35: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 129

Systems Management Tools and SystemsNative Windows NT tools allow management of users’ (UserManager for Domains) account policy, services, and servers.Microsoft’s Systems Management Server brings remote control, pushapplication installation, and software and hardware inventory.Various third-party tools allow broad and enterprise-wide manage-ment of systems and servers as well as management of multiple OSs.

ESSENCE OF THE CASEA good way to begin your approach to understanding any case study is to first summarize the key points. Don’t forget toexamine any exhibits.

• International company with six locations

• Oracle database in Paris and Boston; replication desired

• Diverse mail systems and mail hub in Boston

• Plans to migrate all to Exchange 2000

• Plans to put copies of database at otherlocation.

• Apparently has a rogue Web site in Fort Myers

CASE STUDY: MID-HO PHARMACEUTICALS

BACKGROUNDMid-Ho Pharmaceuticals has five locations in theUnited States and one in Paris, France. The distri-bution of users and other details can be found inFigure 3.13; additional information is presentedin Figures 3.14 and 3.15.

DATA CENTERS ANDADMIN ISTRAT IONMid-Ho has a corporate-wide multimasterWindows NT domain architecture.

BostonMid-Ho has an Oracle database that managesdata on inventories and is located in Boston.Replication of the database to the Paris, France,location is online, and replication is planned foreach of the other U.S. locations.

A mail hub in Boston allows communicationbetween different mail systems.

WarehousesWarehouses are located in Paris, Dallas, andChicago. Each warehouse has a data centerstaffed by “first-level” technicians. First-level

continues

07NSD/TGch_03 10/11/00 1:04 PM Page 129

Page 36: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

130 Par t I I ANALYZING TECHNICAL REQUIREMENTS

CASE STUDY: MID-HO PHARMACEUTICALS

Seattle250cc:mail Server

Dallas786Notes

Little Rock300Microsoft Mail

Paris890Oracle Database

Mail ServerProfs for MailMainframe

56Kbps

T1

T1

56Kbps

56Kbps

Boston1500Oracle DatabaseExchange Server Mail Hub

Fort Myers564SQL ServerWeb ServerExchange Server

T1

T3

F IGURE 3 .13Used and asset distribution—Mid-HoPharmaceuticals.

F IGURE 3 .14Domain structure.

continued

MainframeBostonPDC

ParisPDC

BDC

Oracle

Boston

ChicagoSeattle

Little Rock

Dallas

07NSD/TGch_03 10/11/00 1:04 PM Page 130

Page 37: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

CASE STUDY: MID-HO PHARMACEUTICALS

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 131

technicians can repair and replace componentsthat do not require manufacturer techs. Theyhave received training in the normal operation ofsystems implemented and can call on expertiseat corporate headquarters for assistance.

Future PlansThe company was planning migration to MicrosoftExchange, but plans have been tabled until afterWindows 2000, service pack 1, has beenreleased and until the next version of Exchangehas been released.

The company plans to move to Windows 2000within the year.

PROBLEM STATEMENTA recently discovered Web site and SQL data-base in Fort Myers have caused increased atten-tion to security. Because migration is in theplanning stages, IT management has placed anincreased emphasis on documentation of theexisting system.

Boston

GROUPSAdministrators

Backup OperatorsServer Operators

Account OperatorsPrint OperatorsDomain AdminsDomain UsersDomain Guest

GuestsDomain Database Admins

Database AdminsDomain Mail Admins

Mail Admins

Mail AdminsAdministrators

UsersDatabase Admins

GROUPSAdministrators

Backup OperatorsServer Operators

Account OperatorsPrint OperatorsDomain AdminsDomain UsersDomain Guest

GuestsDomain Database Admins

Database AdminsDomain Mail Admins

Mail Admins

Each Location Domain

Paris

F IGURE 3 .15User groups.

continues

07NSD/TGch_03 10/11/00 1:04 PM Page 131

Page 38: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

132 Par t I I ANALYZING TECHNICAL REQUIREMENTS

CASE STUDY: MID-HO PHARMACEUTICALS

ANALYS ISMid-Ho Pharmaceuticals has an interesting dis-persion of employees. Several slow links willcause problems if the company continues withplans to place databases at all locations and toreplicate content. Multiple mail servers compli-cate the traffic patterns, as mail must all travelto Boston, be converted and then travel out to allsites.

Knowing about these upgrade and deploymentplans and communication links will assist plan-ning a security design. Additional security issuesinclude access to the database, planned rolloutof the database to multiple locations, and thesecurity of the replication traffic.

Special consideration must be taken to explorethe security issues of the Web site located inFort Myers.

continued

07NSD/TGch_03 10/11/00 1:04 PM Page 132

Page 39: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 133

This chapter has moved the discussion away from business management and into the technical arrangement of the currentinfrastructure. It should be clear by now that time spent building adatabase of information on the current system is time well spent. As you learn more about Windows 2000 and its capabilities andshortcomings, you will return to these specifications again and again. Your job is not to repeat the mistakes of the past, nor is it to redo what works well. Your job is to secure the business opera-tions of the company in the best manner possible, given the status of current technology and the policy of the corporation.

CHAPTER SUMMARY

KEY TERMS• net available bandwidth

• switched virtual circuits

• permanent virtual circuits

• DSL

• virtual private network

• IPSec

• tunneling

• latency

• propagational delay

• service level agreement

• EDI

• permanent virtual circuit flapping

• cyclic redundancy check

• authentication

• authorization

• SAM

• ERD

• domain controller

• standalone server

• service account

• access control list

• Kerberos

• RADIUS

• smart cards

• BIND

• SAP

• RIP

07NSD/TGch_03 10/11/00 1:04 PM Page 133

Page 40: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

134 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A P P LY YO U R K N O W L E D G E

Exercises

3.1 Case Study: Associated WholesaleGrocers

BackgroundAssociated Wholesale Grocers (AWG) is one of thelargest supermarket cooperatives. Membership consistsof more than 350 grocery store chains, representing850 shops located in the Midwest and the southernUnited States. Among the membership are Co-op,Cash Saver, Apple Market, Country Mart, and PriceChopper. AWG also operates its own 30 Fraleys storesin Kansas.

AWG offers design and decor service, member service,real estate service, retail systems support, education andtraining, a print shop, reclamation, store engineering,and advertising assistance.

The company offers retail pricing support functions,including bulletin board hosting, price changes, unitcost changes, new items, discontinued items, exceptionreports, other information, deals and allowances, andpreferred products.

AWG Retailers Connection offers member-only infor-mation over the Internet from its Web site atwww.awginc.com.

AWG has been in business for more than 70 years.

Data SystemsThe company has a modern Warehouse ManagementSystem (WMS), a material and resource managementsystem. It receives an advanced shipping notice process-ing; cross docking; directed putaway; order processing;

shipment assignment; wave management; picking,replenishment, and packing verification; and lot con-trol. The design is platform-independent and is theresult of open system design. It includes multiple com-puter databases and bar coding, radio frequencyreports, paper-based accounting, bar coding, automaticidentification, voice technology, portable RF terminalswith bar code scanners, and receiving, picking, loading,and cycle-counting modules.

Problem StatementThe company would like to move toward paperlesssystems. Paperless systems surely have their own secu-rity considerations. When all data is stored online, is itmore vulnerable to attack? How is data protected fromorigination to destruction?

Proposed SolutionTo meet this goal, AWG is working with optical imag-ing. To reduce paper flow, the company uses bar codesin warehouse receiving. Orders are filled electronically,and AWG accepts electronic data interchange (EDI).EDI is the transfer of information between companiesover a network. Many implementations concern billingor ordering in which the data exchanged is informationabout money owed or promised.

AnalysisAWG offers an opportunity to study a moderate-sizedbusiness with a wide range of equipment, infrastructure,and new technology. The company also has a pervasiveattitude of cheerful acceptance, if not evangelism towardits new systems. While plentiful information is providedhere, there is little hard detail on the location ofresources, transmission media, and similar considerations.

07NSD/TGch_03 10/11/00 1:04 PM Page 134

Page 41: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 135

A P P LY YO U R K N O W L E D G E

Estimated Time: 60 minutes

1. Visit the AWG Web site at www.awginc.com.

2. Collect the following data (Table 3.3):

TABLE 3.3

EXERCISE 3.1

State Warehouse/Data Centers Store Locations

3. Map company locations.

Use the information on the Web site to plotcompany locations on the map provided inFigure 3.16.

4. What additional information would you collectand plot on this or other maps or drawings?

3.2 Case Study: PeaceWeaver

BackgroundPeaceWeaver is an international weaving cooperativewith members in 26 countries. It is a virtual organiza-tion founded to promote weaving arts and crafts.While its original intent was to foster weaving her-itage, to keep old crafts from dying, and to rediscoverancient techniques, its scope has broadened to includemodern weaving. A large number of its members usecomputer-driven looms, and PeaceWeaver has recently

F IGURE 3 .16Location map.

07NSD/TGch_03 10/11/00 1:04 PM Page 135

Page 42: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

136 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A P P LY YO U R K N O W L E D G E

introduced its own software for these looms. Incomefrom software sales and Web-zine advertising are usedto promote research.

Information SystemsHeadquartered in New Hampshire, PeaceWeaver is cur-rently undergoing growth in all aspects. Informationsystems include the Web site, a Microsoft SQL Serverdatabase of weaving information and resource locationsthat is downloadable to members, the Web-zine SpottedRecluse, a separate development network, and a numberof PC-driven looms and loom computers. The develop-ment network consists of 15 Windows 2000Professional systems, a file server used to managesource code, a color printer, and a color plotter. Eachdevelopment station is connected to a Dolby loom (acomputer-driven weaving loom).

Current membership and locations are shown in Table 3.4.

TABLE 3.4

EXERCISE 3.2

Country Number of Users

United States 432

South America 700

Russia 100

India 345

Australia 183

Africa 234

Canada 243

All connectivity between members and between mem-bers and the organization is through the Internet.While some members may have ISDN, DSL, or betterconnectivity to local Internet service providers, itshould be assumed that most do not.

Three projects are in the planning or developmentstages:

• An Internet business-to-business project is in theworks that, when completed, will offer a single-stop source for weaving and spinning supplies.

• An online shop is proposed, where artists mayoffer weaving and spinning projects for sale.

• Expansion of the database is planned to holdspinning information and data as well as weaving.

PeaceWeaver wants to build its information system tolast into the future and has chosen Windows 2000 asthe platform of choice.

AnalysisPeaceWeaver is a small organization, but it either has oris about to have as wide a variety in need for servicesand IT function as a much larger enterprise. This is the perfect size of security design project to begin with.Although you may not at first see any real reason forconcern, the Internet exposure and the need for provid-ing access to its expanding databases for members andthe public are point to consider. The development oftwo e-commerce sites will bring additional risks.

Estimated Time: 20 minutes

1. Use the map in Figure 3.17, and plot the locations of users.

07NSD/TGch_03 10/11/00 1:04 PM Page 136

Page 43: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 137

A P P LY YO U R K N O W L E D G E

2. Use the space here to draw a network diagram ofthe Headquarters network.

3. What groups of users would you expect to find?Make a list and indicate the resources to whichthey need access in the network.

4. What do you think will be the impact of theexpected upgrades and expansions?

5. What would be the questions that would need to be asked before proceeding on this strategy?What additional questions must be asked todetermine the impact of a security design on the technical environment?

Review Questions1. The AWG case study and Web site do not list

user and resource distribution. If you were work-ing for this company and developing a securitydesign, where would you go and who would youask to find this information?

2. Examine the diagrams in Figures 3.14 and 3.15and review the case study on Mid-HoPharmaceuticals. Do the diagrams clearly modelthe information in the case study? Is informationmissing from the diagrams? Are pre-existing diagrams of networks good sources for your development work?

F IGURE 3 .17PeaceWeaver user distribution.

07NSD/TGch_03 10/11/00 1:04 PM Page 137

Page 44: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

138 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A P P LY YO U R K N O W L E D G E

3. When you are creating a network diagram, whatelements should you add first?

4. RPMB is a company that still relies on leasedlines for communication between its divisions.What type of WAN topology is this companymore likely to have?

5. John is charged with mapping Charleston LaunchMetrics, Inc. (CLM) network. CLM has officesin 128 cities nationwide and 16 foreign coun-tries. His map(s) will be part of a CLM-wide net-work redesign. A task force has been appointed togather information. It has members from eachlocation. The task force will coordinate activitiesvia email. What should John use for the scope ofhis mapping?

6. Help John by making a list of the detailed infor-mation points that should be included on hisdiagrams.

7. Why is the gathering of information on networkperformance and performance requirements ofimportance to a security design?

8. If you have no special network and systems man-agement tools, how can this task (network andsystems management) be undertaken?

9. Dragon_Tongue is a hacker who delights in gain-ing entry into business networks. It is always pos-sible that he might be able to obtain a user IDand password on your network by tricking a user,or finding where someone has written down apassword. It is also possible that he might be ableto sniff password data as it crosses your network,and perhaps determine what password was used.Is there another source of this data thatDragon_Tongue might find?

10. What is the difference between authenticationand authorization?

11. Why is it important to consider the uses thatpeople make of data when determining networkroles?

12. Do you really need to identify ownership of allresources (down to folders and files) on your net-work?

13. What are two ways that applications can acquireaccess to resources?

14. A new design for the network and the introduc-tion of a new operating system can mean changesto security settings. What are two reasons forthis?

15. How can knowledge of existing and plannedupgrades and rollouts assist you in your project?

16. Are technical support resources of interest tosecurity design? Why?

Exam Questions1. Figure 3.18 is a map of the Gergia, Smythe, and

Underwood network. Which of the followingstatements is true?

A. Gergia, Smythe, and Underwood have a cen-tral database in Mozambique that is accessedby some 10,000 users.

B. Gergia, Smythe, and Underwood’s databasecan be accessed locally by 5,000 employeesand at three distribution points by 500,2,000, and 500 users.

07NSD/TGch_03 10/11/00 1:04 PM Page 138

Page 45: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 139

A P P LY YO U R K N O W L E D G E

C. Gergia, Smythe, and Underwood’s database isaccessed locally by 1000 employees and by250, 500, and 300 users in France, Britain,and New York, respectively.

D. Gergia, Smythe, and Underwood’s database isaccessed locally by 1,000 employees.

2. Users that are not in a location with a local copyof the database can access it over a WAN connec-tion, if they have one. Far Eastern locations donot currently have connection to any other pointon the network. Which of the following is true?

A. Users at all 16 locations have adequate con-nectivity to corporate headquarters.

B. Users in France, Britain, and the UnitedStates have adequate connectivity to corporateheadquarters.

C. Users in France, Britain, and Germany have adequate connectivity to corporate headquarters.

D. You should ask questions about the dataneeds of users in all locations.

3. Sally is presenting her security design to manage-ment for Mid-Ho Pharmaceuticals. She hasincluded the use of IPSec for securing communi-cations between branches of the company. ITquestions her about the added bandwidth

F IGURE 3 .18Gergia, Smythe, and Underwood network map.

Boston300

Brazil

Egypt

9 FarEastern

Locations

Germany

T1

T1

56

256

56

56

56

56

T1

New Yorkcorp. hdqtrs

1000

Database Britain500

Database

France250

Database

Replication

Replication

07NSD/TGch_03 10/11/00 1:04 PM Page 139

Page 46: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

140 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A P P LY YO U R K N O W L E D G E

requirements of IPSec, and she answers thatwhile there may be some additional requirements,she feels that the connections between sites willbe adequate. When asked reasons why IPSecshould be used, she replies that it will encrypt thedata traveling from branch to branch. That startsa discussion about how much extra CPU process-ing will be involved and how that will either slowthings down or cause the company to purchasenewer machines.

The use of IPSec in her design is turned down.What could Sally have done differently? Checkthe two best answers:

A. She should have done a better job explainingthe benefits of IPSec.

B. She should have presented data that showsthat the 56Kbps lines are underutilized now,in addition to industry guidelines on howmuch IPSec will add to the overhead.

C. Because a 56Kbps line will never be adequatefor IPSec, Sally should have proposed thereplacement of these slow lines with fasterconnections.

D. Sally should have been prepared to answer thequestions on CPU by explaining the capabil-ity to offload processing onto special networkinterface cards. Replacing whole computerswould not be necessary; just supplying differ-ent NICs.

4. You are on the Windows 2000 evaluation teamfor The Chicago Sheet Metal Company. Thecompany has just made a major upgrade to ATMand wants to know whether Windows 2000

supports ATM, particularly if you can still doL2TP tunneling on the company’s ATM net-work. You answer as follows:

A. Windows 2000 does not currently supportATM, but it will with the first service pack.

B. Windows 2000 provides support for ATM,including an updated ATM miniport drivers,limited support for ATM adapter hardware,ARP/MARS services, and support fortunneling.

C. Windows 2000 has support for ATM butcannot participate in a mixed IP and ATMenvironment.

D. Windows 2000 supports Layer 2 TunnelingProtocol (L2TP). L2TP is designed to runover IP networks.

E. Currently, this implementation of L2TP doesnot support native tunneling over X.25,Frame Relay, or ATM networks.

5. Peter Craven saved his company some money. Heinstalled cable modems in three PCs in the mainoffice. All employees can use the PCs when theyneed to access the Internet. What are the securityissues here?

A. Users might be able to access each other’semail.

B. Users might be able to see the files that thelast user was looking at.

C. The PCs and modems create a back door intothe network.

D. Users may leave sensitive documents in thePC area.

07NSD/TGch_03 10/11/00 1:04 PM Page 140

Page 47: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 141

A P P LY YO U R K N O W L E D G E

6. Which of the following show good matches oftechnology to required performance? Mark allthat apply.

A. Leased lines and business-to-businesse-commerce

B. DSL and Web browsing

C. DSL and business-to-business e-commerce

D. Email and POTS

7. George is charged with monitoring network performance and stability. At 3:45, he noticesthat utilization is over 80% on backbone circuits,that frame loss is 1–2 percent, and that therehave been a number of help desk calls.

A. George should immediately begin checkingfor problems on his network; these readingsindicate severe issues.

B. George should continue monitoring. Hedoesn’t have enough historical information to make a judgment.

C. George should not be concerned. These readings are normal.

D. George needs to check other elements beforedetermining whether there is a real problemto deal with.

8. George is watching as the network has been log-ging data over time. Utilization is staying about69%, frame loss is 4%, latency has increased20%, applications are timing out, and there isdata loss during peak periods.

A. George should immediately begin checkingfor problems on his network; these readingsindicate severe issues.

B. George should continue monitoring. Hedoesn’t have enough historical information to make a judgment.

C. George should not be concerned. These readings are normal.

D. George needs to check other elements beforedetermining whether there is a real problemto deal with.

9. The following techniques can be used for authen-tication in Windows 2000 networks:

A. Kerberos, RADIUS, LM, NTLM, PKI, L2TP

B. Kerberos LM, NTLM, RIS, PKI

C. RADIUS, LM, L2TP, PKI, NTLM, NTLMv2

D. Kerberos, PKI, RADIUS

10. If you have a strong password policy, which ofthe following is true?

A. Applications will not be capable of imple-menting their own security mechanisms.

B. Applications may implement security mecha-nisms that may weaken the security in yournetwork.

C. Kerberos is so secure that it will be impossiblefor anyone to crack passwords in yourWindows 2000 network.

D. You will still have the same problems you hadin Windows NT because Windows 2000must be backward-compatible.

11. Even though you have set up an intrusion-detec-tion systems to monitor activity, and even thoughit can tell if someone is trying to guess passwordsor run a password-cracking program against your

07NSD/TGch_03 10/11/00 1:04 PM Page 141

Page 48: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

142 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A P P LY YO U R K N O W L E D G E

security database, there are other ways that youruser passwords can be compromised. Check allthat apply.

A. Users might pick easy-to-guess passwords.

B. Users might write down their passwords and tape the note to the underside of theirkeyboards.

C. A copy of the NT SAM might be found inthe repair directory, and then be copied andfed into a password-cracking program.

D. The security algorithm for NTLM is so weakthat anyone can figure out how to decode thepassword.

E. A copy of the SAM might be found on abackup tape and fed into a password-crackingprogram.

F. A copy of the SAM might be found on aWindows 98 boot disk and fed into apassword-cracking program.

12. Peter will be defining user roles on the Mid-Honetwork. He wants to know what users do so thathe can determine which security groups he needs tocreate, as well as possible membership in OUs. Agood resource Peter can use to determine the rolesof users on the network is which of the following?

A. Examine user and groups lists on the OS

B. Examine the way people use the systems andapplications that exist on the network.

C. Make a list from the list of approved usersand groups for the network, available fromMicrosoft

D. A and B

E. B and C

F. A, B, and C

13. Peter and James share a computer. An applicationrunning on Windows NT runs perfectly whenJames, who is an administrator, runs it. WhenPeter, who is not an administrator, attempts torun the program, it crashes. The most likelyproblem is:

A. The program is not designed to run onWindows NT. Access to registry keys that theuser does not have access to is needed.

B. Peter has too many other programs running.

C. Peter doesn’t have enough disk space.

D. The amount of RAM Peter has is restrictedby systems policy, and he doesn’t have enoughto run the program.

14. At Cannon, Inc., it is a fireable offense to have aconnection to the Internet or a data connectionsto the outside world other than through the des-ignated proxy server. Nevertheless, staff membersoccasionally create another connection. CannonIT periodically does a sweep of the entire systemlooking for possible violations. To discover poten-tial connections with remote sites, the Internet,or other companies, IT looks for which of thefollowing? (Check all that apply).

A. Multihomed machines

B. People whose spouses work for other companies

C. Machines running Web servers

D. Modems

E. Undocumented routers, switches, or addi-tional unexplained hardware

F. Disgruntled employees

G. All the people who did not get significantraises last year

07NSD/TGch_03 10/11/00 1:04 PM Page 142

Page 49: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 143

A P P LY YO U R K N O W L E D G E

15. You have learned that a planned rollout of thecompany’s new payroll system is scheduled for sixmonths from now. Which of the following is notimportant to ask?

A. What parts of the program, if any will beplaced on Windows 2000 machines?

B. How will the rollout be impacted by themove to Windows 2000? Does it happenbefore or after the beginning or end of thateffort?

C. If part of the program will run on Windows2000 machines, was it created with theWindows 2000 applications certificationstructure in mind? Is it certified?

D. Whose pet project is this?

E. Are the programmers MCSEs?

16. Network and systems managers at Algonquinhave trained with multiple systems and compo-nents. They are not crosstrained with each other’sjobs. There have been problems in IT manage-ment for a long time over who had the mostauthority. A lot of constant bickering and trick-playing takes place. Everyone knew that some-thing was going to happen, and either one groupor the other would not be around for long.During the Windows 2000 rollout, 75% of thenetwork management staff quits. Your securitydesign and its implementation will not suffer ifyou do which of the following?

A. Were aware of this possibility and made lots of contacts and friends in the systemsmanagement area

B. Made solid contacts and relationships in bothareas

C. Were aware of this potential conflict andavoided forging relationships with either area

D. Were aware of this potential and made solidcontacts and relationships in both areas butdid not champion one over the other.

Answers to Exercises3.1 The solution to item 2 (refer to Table 3.3) in

Exercise 3.1 is presented in Table 3.5.

TABLE 3.5

SOLUT ION TO TABLE 3.3 IN EXERCISE 3.1

State Warehouse/Data Centers Store Locations

Kansas Kansas City, Fort Scott X

Missouri Springfield X

Oklahoma Oklahoma City X

Arkansas X

Iowa X

Nebraska X

Texas X

Illinois X

Tennessee X

Kentucky X

The solution to item 3 in Exercise 3.1 is presented in Figure 3.19.

3.2 The solution to item 1 in Exercise 3.2 is presented in Figure 3.20.

3.2 The solution to item 2 in Exercise 3.2 is presented in Figure 3.21.

07NSD/TGch_03 10/11/00 1:04 PM Page 143

Page 50: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

144 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A P P LY YO U R K N O W L E D G E

Groups of users (item 3) are these:

Developers

Administrators

Users (local)

Anonymous Internet users

Members

Your response to item 4 should look somethinglike the following:

The impact of upgrades and expansion will meanan increased need for security and changes in personnel. In the past, the company has beenfocused on information for free, but now they aremoving into a sales-oriented function. New hires

Distribution Centers1. Kansas City2. Fort Scott3. Oklahoma City4. Springfield, MO

12 4

3

243

432

700

234

100

345

183

F IGURE 3 .19AWG network map.(Solution to item 3 in Exercise 3.1)

F IGURE 3 .20PeaceWeaver user distribution answer.(Solution to item 1 in Exercise 3.2)

07NSD/TGch_03 10/11/00 1:04 PM Page 144

Page 51: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 145

A P P LY YO U R K N O W L E D G E

likely will be experienced business-to-businesspeople rather than designers and weavers. Becausecredit card transactions and products will beinvolved, the company will be looking at choicesin new protocols, increased efforts in securingdata in the database, and protecting the Web site.The internal design network is separate from thedatabase and Web site, so security efforts maychange little.

In responding to item 5, you might ask the follow-ing questions:

What is the estimated increase in traffic to the site?

How will the ordering of materials be handled? Willthis be a portal to existing online merchants? Willproducts actually be bought and sold? How willtransfer of funds happen? Should financial data andtransactions be handled in-house or be outsourced?What additional hardware and software will need tobe purchased? Will member receive discounts?

F IGURE 3 .21PeaceWeaver LAN.(Solution to item 2 in Exercise 3.2)

Database

DCDHCP

File ServerDC

Web Server

Internet

Loom

Loom Loom

Developers Network

07NSD/TGch_03 10/11/00 1:04 PM Page 145

Page 52: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

146 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A P P LY YO U R K N O W L E D G E

Answers to Review Questions1. You would ask IT management, management

staff of the resource owners, and database man-agers. You also would consult network maps.

2. One diagram does not have the Fort Myers sitelisted. If that was the only diagram you used, andif you didn’t use other resources, you could havemissed that. From the case study, someone did—or if that person knew there was a site, they mayhave considered it unimportant, until they dis-covered the Web site there. So, of course, you willwant to check many resources to make sure thatyour diagrams are up to date.

3. You should add locations of sites, servers, andconnectivity between sites.

4. Leased lines were more commonly arranged in astar topology.

5. While it might seem as if John should assumeresponsibility for mapping the entire interna-tional network, he may want to clarify his role.The scope of the design will determine the scopeof the map. Here the text does talk about a net-work-wide redesign, but it also mentions mem-bers from each location working on the project.The map(s) will encompass the entire network,but it looks like they are still in the planningstage; John may be coordinating activities or sim-ply merging together work done elsewhere.

6. Information points should include connectivitytransmission types, bandwidth, number of usersat sites, resources, and who needs access fromwhere.

7. Many security practices can change processingand communication times. The impact on per-formance can be significant. You need to knowwhether there is adequate bandwidth and pro-cessing power to add these features, or whetheradditional network infrastructure is needed.Minimally, you need to know the current perfor-mance requirements and whether they are beingmet.

8. Windows NT provides systems managementtools. Server Manager, User Manager, SystemsPolicy Editor, and Performance Manager may beadequate for smaller networks. Windows 2000has a more extensive array of tools. Many stan-dardized tools, Active Directory Users andComputers, Active Directory Sites and Services,Computer Management, Local Security Policy, aswell as numerous snap-ins for The MicrosoftManagement Console provide a large number oftools that can be used for this process.

9. Backup copies still pose a security threat, as doemergency repair disks (Windows NT ERDscontain a copy of the registry, but Windows 2000disks do not) and the Repair folder. All containcopies of the SAM. Backup copies contain sensi-tive data of other types as well. The issue is thatthey provide points of access, some of which donot require login. Copies of the SAM can be sub-jected to brute force attack. Although Windows2000 domains store domain user account infor-mation in the Active Directory, not in the SAM,every Windows 2000 Professional and standaloneserver still must have a SAM for the storage oflocal accounts.

07NSD/TGch_03 10/11/00 1:04 PM Page 146

Page 53: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 147

A P P LY YO U R K N O W L E D G E

10. Authentication is the process of proving that youare who you say you are. This may give you theability to logon, but it does not automaticallygive you the ability to perform tasks or manipu-late data. Authorization is a set of permission todo things, such as use a printer, read a file, andcreate a backup.

11. You can create groups or use built-in groups thathave appropriate access to resources, or rights todo tasks. You can then place people in thosegroups and give them only the access they need.It is also easier to manage access to resources andtask permissions by a few groups than by thou-sands of users.

12. Yes. Fortunately, you can usually groups files andthe need to control them under folders, givingyourself less to manage.

13. Applications can acquire access to resourcesbecause they are acting under the context of theuser account running them. Their privileges withthe resource are governed by the rights of theuser. Applications can also gain access becausethey or some part of their processes is runningunder the context of a service account.

14. Two things may cause changes to current securitysettings. First, the new operating system has thepotential for greater control over resources andactions. It possible to tighten security, or thedesired security level can be set. Second, the closestudying of resources and access opportunitiescan mean a change to policy.

15. Knowledge of existing and planned rolloutsenables you to factor in the possible changes tothe resources you have been studying. It allowspossible changes to the schedule of these activitiesor to the implementation of your security design.

16. Technical support services are critical to thesmooth rollout of any change in IT. Security isno exception. Treat support services as a resourcethat must be protected and utilized to promotesecurity. Planning must also ensure their access toresources in the new design that they need.

Answers to Exam Questions1. C. The only locations that have a local copy of

the database are New York, France, and Britain.To determine the answer, all you must do is addthe numbers at each site. (See the questionsscenario.)

2. D. Three factors determine whether there is ade-quate connectivity between sites: line speed,available bandwidth, and usage patterns. Linespeed and available bandwidth are documentablefacts. Usage patterns can be recorded, but toreally determine whether there are adequateresources, you must examine the needs of theusers in each site. There may be little need foraccess to the database, or the needs may be occa-sional. In this case, even the slowest of line speedsmay be perfectly adequate. On the other hand,users may require instant access to information.Consider the value of immediate access to currentstock market information, or the capability toconsult with a medical expert when a life is atstake. (See the section “Assess AvailableConnectivity.”)

3. B, D. Sally’s presentation lacks the facts that willanswer management’s concerns. It’s not enoughto present new technology as an answer to a secu-rity concern. Sally should have been prepared todocument her answers to questions about line

07NSD/TGch_03 10/11/00 1:04 PM Page 147

Page 54: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

148 Par t I I ANALYZING TECHNICAL REQUIREMENTS

A P P LY YO U R K N O W L E D G E

speed, bandwidth, and processing power. The realissue for management here was not whetherIPSec was a good fit technically, but how much itwould cost them to add more bandwidth and topossible upgrade systems. Sally should have antic-ipated these types of questions and been preparedto answer them—or, better still, presented theanswers before the questions were asked. (See thesection “Assess Net Available Bandwidth.”)

4. E. Windows 2000 does support ATM. The prob-lem here is L2TP. In its current implementation,you must tunnel it over IP. (See the section“Assess Available Connectivity.”)

5. C. The use of modems alone does not allow anyuser to instantly compromise security. Cablemodems do have some interesting security issuesof their own, but the real issue here has to dowith the addition of modems. Placing a firewalland locking down access to networks is a goodstep, but it is ruined if you turn around and opennew doors that can be used to access your net-work. (See the section “External Access.”)

6. B, D. Leased lines are expensive but can providea secure mechanism for two or more businessesto share confidential information. In some cir-cumstances, this would provide the ideal way forthe businesses to trade goods. If many businessesbecame involved, cost alone would get prohibi-tive. DSL is especially well suited for Web brows-ing because users will have high-speeddownloads. This is not particularly well suited forbusiness-to-business e-commerce, however,because the speed varies in both directions. Emailover public telephone lines may be okay forhome users. (See the section “Assess AvailableConnectivity.”)

7. B. These numbers should make you take noticeand begin to watch for a pattern, but occasionalpeaks in network activity are going to happen.They become significant only if they are sus-tained over time. (See the section “AssessAvailable Bandwidth.”)

8. A. It looks like this information has beenobtained over time. The 20% increase in latencywould be enough of a warning sign. The otherissues tell you that it’s time to investigate. (Seethe section “Assess Available Bandwidth.”)

9. D. L2TP is a tunneling protocol, not an authen-tication mechanism. Remote Installation Service(RIS), is a method for the rapid deployment andinstallation of operating systems. Answer D doesnot list all the authentication mechanisms, but itis the only list where all elements are correct. (Seethe section “Analyze Data and Systems AccessMethod.”)

10. B. Applications will always be capable of addingtheir own layer of security. The question iswhether this is a good idea. If security is strong inthe operating system, it would be a good idea ifapplications use this security layer. Security is dif-ficult to perfect, and it is easy to destroy. Forexample, if an application requires its own pass-words and then allows them to be sent in cleartext across the network, then the application hasbecome a security risk. (See the section “AnalyzeData and Systems Access Method.”)

11. A, B, C, E. Users will usually do things to helpthem remember passwords—they may write themdown or make they easy to guess. The WindowsNT SAM may be found on a carelessly storedERD or backup tape, and then be used to obtainpasswords. Anyone can download a password-

07NSD/TGch_03 10/11/00 1:04 PM Page 148

Page 55: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

Chapter 3 ANALYZING TECHNICAL ENVIRONMENTS 149

A P P LY YO U R K N O W L E D G E

cracking program from the Internet. A Windows98 boot disk will not have a copy of the SAM.Reverse-engineering any protocol to write yourown password-cracking utility, or to quicklydetermine passwords, is not an option for mostpeople. (See the section “Backups and OtherData Stores.”)

12. D. Peter can use information on the currentoperating system to begin his study, but he alsoshould spend some time investigating how thingsreally are used. The current system may not cor-rectly model the best use of the system. (See thesection “Analyze Network Roles andResponsibilities.”)

13. A. The fact than an administrator can run theprogram while a user cannot is a dead giveawaythat there is a file system or registry permissionissue. This means that the program did not suc-cessfully follow guidelines for running onWindows NT. The same problems can occurwith Windows 20000. (See the section “ResourceOwnership.”)

14. A, C, D, E, F. Just because someone’s spouseworks for another company is not reason to sus-pect foul play; you would have to suspect most ofyour workforce. Likewise, did anyone ever thinkthat a raise was significant? However, the hard-ware and software mentioned in the other choicescan be sources of security breeches in your net-work. (See the section “Analyze Data and SystemsAccess Method.”)

15. E. The MCSE certification does not tell you any-thing about the programming ability of the per-son who has it. (See the section “Identify Existingand Planned Upgrades and Rollouts.”)

16. B. In any company, there are politics. Althoughyou may be astute in figuring out which way thewind is blowing, it is possible that you will bewrong. It is far better to understand the politicsand still make sure that you are in the best possi-ble position, no matter what happens. (See thesection “Domain Structure.”)

07NSD/TGch_03 10/11/00 1:04 PM Page 149

Page 56: OBJECTIVESptgmedia.pearsoncmg.com/images/073570984X/sample... · CHAPTER 3 Analyzing Technical Environments This chapter covers the following Microsoft-specified objectives for the

150 Par t I I ANALYZING TECHNICAL REQUIREMENTS

1. Technet Article: “Planning YourImplementation of MS Exchange Server.”

2. Technet Article: “Designing the ActiveDirectory Structure.”

3. Marcus, J. Scott. Designing Wide AreaNetworks and Internetworks, A Practical Guide.Addison-Wesley, 1999.

4. www.networkmagazine.com

Suggested Readings and Resources

07NSD/TGch_03 10/11/00 1:04 PM Page 150