Datasheet
1054
Methods of Securing Transmissions
Figure 1-8:
Using
permissions
to authorize
which
users are
allowed to
access the
resource.
In Figure 1-8, you can see that the Administrators and Jill have access to
the resource. No one else is authorized to access the resource. You find
out how to set permissions in the next chapter, but for now, make sure you
understand the difference between authentication and authorization.
Rights
In the Windows world, there is a difference between permissions and rights.
As you can read in earlier sections, permission is your level of access to a
resource. Comparatively, a right is your privilege to perform an OS task. For
example, you can be assigned the right to change the time on the computer.
Other examples of rights are the right to do backups or the right to log on to
the system.
To learn more about how to set permissions and rights, check out Book IX,
Chapter 2.
Methods of Securing Transmissions
After you authenticate users and authorize them to access certain parts of
the network, you should then consider methods of securing information
while it travels along the network cable.
Most network communication is sent along the network wire in cleartext,
meaning that anyone connected to your network can read the information.
But if the information is traveling across the Internet, anyone can view that
information if it is passed in cleartext.
49_487389-bk09ch01.indd 105449_487389-bk09ch01.indd 1054 9/10/09 11:03 PM9/10/09 11:03 PM