SlideShare a Scribd company logo
1 of 50
1
CompTIA Security+ Guide to Network
Security Fundamentals, Sixth Edition
Chapter 12
Access Management
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Objectives
12.1 Define access management and list the access
control models
12.2 Describe how to manage access through account
management
12.3 List the best practices for access control
12.4 Describe how to implement access control
12.5 Explain the different types of identity and access
services
© 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
3
What is Access Control?
• Access Control
• Granting or denying approval to use specific resources
• Physical access control
• Consists of fencing, hardware door locks, and mantraps to limit contact
with devices
• Technical access control
• Consists of technology restrictions that limit users on computers from
accessing data
• There are standard access control models that are used to help enforce
access control
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
4
Access Control Terminology (1 of 5)
• Identification
• Presenting credentials
• Example: delivery driver presenting employee badge
• Authentication
• Checking the credentials
• Example: examining the delivery driver’s badge
• Authorization
• Granting permission to take action
• Example: allowing delivery driver to pick up package
• Accounting
• A record that is preserved of who accessed the network, what
resources they accessed, and when they disconnected
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
5
Access Control Terminology (2 of 5)
Action Description Scenario example Computer process
Identification Review of credentials Delivery person shows
employee badge
User enters user
name
Authentication Validate credentials as
genuine
Gabe reads badge to
determine it is real
User provides
password
Authorization Permission granted for
admittance
Gabe opens door to allow
delivery person in
User authorized to log
in
Access Right given to access
specific resources
Delivery person can only
retrieve box by door
User allowed to
access only specific
data
Accounting Record of user actions Gabe signs to confirm the
package was picked up
Information recorded
in log file
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
6
Access Control Terminology (3 of 5)
• Object
• A specific resource
• Example: file or hardware device
• Subject
• A user or process functioning on behalf of a user
• Example: computer user
• Operation
• The action taken by the subject over an object
• Example: deleting a file
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
7
Access Control Terminology (4 of 5)
Role Description Duties Example
Privacy officer Manager who oversees
data privacy compliance
and manages data risk
Ensures the enterprise complies
with data privacy laws and its
own privacy policies
Decides that users can
have permission to
access SALARY.XLSX
Custodian or
steward
Individual to whom day-
to-day actions have been
assigned by the owner
Periodically reviews security
settings and maintains records of
access by end users
Sets and reviews
security settings on
SALARY.XLSX
Owner Person responsible for
the information
Determines the level of security
needed for the data and
delegates security duties as
required
Determines that the file
SALARY.XLSX
can be read only by
department managers
End user User who access
information in the course
of routine job
responsibilities
Follows organization’s security
guidelines and does not attempt
to circumvent security
Opens SALARY.XLSX
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
8
Access Control Terminology (5 of 5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
9
Access Control Models
• Access control model
• Standards that provide a predefined framework for hardware or
software developers
• Use the appropriate model to configure the necessary level of control
• Five major access control models
• Discretionary Access Control (DAC)
• Mandatory Access Control (MAC)
• Role Based Access Control (RBAC)
• Rule Based Access Control
• Attribute-Based Access Control (ABAC)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
10
Discretionary Access Control (DAC) (1 of 2)
• Least restrictive model
• Every object has an owner
• Owners have total control over their objects
• Owners can give permissions to other subjects over their objects
• Used on operating systems such as most types of UNIX and Microsoft
Windows
• Two significant weaknesses:
• Poses a risk in that it relies on decision by the end user to set the
proper level of security
• A subject’s permissions will be “inherited” by any programs that the
subject executes
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
11
Discretionary Access Control (DAC) (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
12
Mandatory Access Control (MAC) (1 of 4)
• Most restrictive access control model
• User has no freedom to set any controls or distribute access to other subjects
• Typically found in military settings
• Two elements
• Labels - Every entity is an object and is assigned a classification label that
represents the relative importance of the object
• Subjects are assigned a privilege label (clearance)
• Levels - a hierarchy based on the labels is used
• Top secret has a higher level than secret, which has a higher level than
confidential
• MAC grants permissions by matching object labels with subject labels
• Labels indicate level of privilege
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
13
Mandatory Access Control (MAC) (2 of 4)
• To determine if file may be opened:
• Object and subject labels are compared
• The subject must have equal or greater level than object to be granted access
• Two major implementations of MAC
• Lattice model and Bell-LaPadula model
• Lattice model
• Subjects and objects are assigned a “rung” on the lattice
• Multiple lattices can be placed beside each other
• Bell-LaPadula (BLP) model
• Similar to lattice model
• Subjects may not create a new object or perform specific functions on lower
level objects
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
14
Mandatory Access Control (MAC) (3 of 4)
• Microsoft Windows uses a MAC implementation called Mandatory
Integrity Control (MIC)
• A security identifier (SID) is issued to the user, group, or session
• Each time a user logs in, the SID is retrieved from the database for that
user
• SID is used to identify user with subsequent interactions with Windows
• Windows links the SID to an integrity level
• User Access Control (UAC) - a Windows feature that controls user
access to resources
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
15
Mandatory Access Control (MAC) (4 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
16
Role-Based Access Control
• Role Based Access Control (RBAC)
• Also called Non-Discretionary Access Control
• Access permissions are based on user’s job function
• RBAC assigns permissions to particular roles in an organization
• Users are assigned to those roles
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
17
Rule-Based Access Control
• Also called Rule-Based Role-Based Access Control (RB-RBAC)
• Dynamically assigns roles to subjects based on a set of rules defined
by a custodian
• Each resource object contains access properties based on the rules
• When user attempts access, system checks object’s rules to determine
access permission
• Often used for managing user access to one or more systems
• Business changes may trigger application of the rules specifying
access changes
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
18
Attribute-Based Access Control (1 of 2)
• Uses more flexible polices than Rule-Based AC
• Can combine attributes
• Policies can take advantage of attributes such as:
• Object attributes
• Subject attributes
• Environment attributes
• ABAC rules can be formatted using an If-Then-Else structure
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
19
Attribute-Based Access Control (2 of 2)
Name Explanation Description
Mandatory Access Control (MAC) End user cannot set controls Most restrictive model
Discretionary Access Control (DAC) Subject has total control
over objects
Least restrictive model
Role-Based Access Control (RBAC) Assigns permissions to
particular roles in the
organization and then users
are assigned to roles
Considered a more “real-
world” approach
Rule-Based Access Control Dynamically assigns roles to
subjects based on a set of
rules defined by a custodian
Used for managing user
access to one or more
systems
Attribute-Based Access Control (ABAC) Uses policies that can
combine attributes
Most flexible model
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
20
Managing Access Through Account
Management
• Properly configuring accounts is a first step in providing strong security
• Accounts include not only user accounts but also:
• Service accounts
• Privileged accounts
• Account management includes account setup as well as account auditing
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
21
Account Setup
• When initially setting up an account, take these into consideration:
• Employee accounts
• Creating location-based policies
• Establishing standard naming conventions
• Creating time-of-day restrictions
• Enforcing least privilege
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
22
Employee Accounts (1 of 2)
• Employee Accounts are often the source of entry points by threat actors
• Employee Onboarding
• Refers to the tasks associated with hiring a new employee
• Onboarding steps:
• Scheduling
• Job duties
• Socializing
• Work space
• Training
• In addition, in a Microsoft Windows environment the steps may include:
• Provision the new computer
• Create email mailboxes and AD users
• Add user accounts to groups
• Create home folder
• Review security settings
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
23
Employee Accounts (2 of 2)
• Employee offboarding
• Actions to be taken when an employee leaves an enterprise
• Steps include:
• Back up all employee files from local computer and server
• Archive email
• Forward email to a manager or coworker
• Hide the name from the email address book
• Orphaned accounts – user accounts that remain active after an
employee has left
• Dormant account – an account that has not been accessed for a
lengthy period
• Many organizations disable accounts for a minimum of 30 days and
then purge disabled accounts twice per year
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
24
Location-Based Policies
• Geofencing relies upon location-based policies
• Or establishing the geographical boundaries of where a mobile
device can and cannot be used
• Polices are often first prescribed by generating an IP location data file
• Which is a text file containing comma separated fields in the format
IP_From, IP_To, Country_Code, Country_Name, Region, City
• This policy then becomes the basis for how authorization requests
from mobile devices are evaluated
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
25
Standard Naming Conventions
• Standard naming conventions
• “Rules” that have been established for creating account names
• Options typically include:
• First initial of first name followed by last name,
• First name with a punctuation mark followed by last name
• Last name followed by department code
• In the event two names appear to be the same
• A standard policy should be established for resolving conflicts
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
26
Time-of-Day Restrictions
• Time-of-day restrictions can be used to limit when a user can log into their account
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
27
Least Privilege
• Least privilege in access control
• Means that only the minimum amount of privileges necessary to
perform a job or function should be allocated
• Helps reduce the attack surface by eliminating unnecessary privileges
that could provide an avenue for an attacker
• Should apply both to user accounts and to processes running on the
system
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
28
Account Auditing
• Once accounts have been created, they should be periodically
maintained and audited using the following audits:
• Recertification – the process of periodically revalidating a user’s
account, access control, and membership role
• Permission auditing and review – intended to examine the permissions
that a user has been given to determine if each is still necessary
• Usage auditing and review – an audit process that looks at the
applications that the user is provided, how frequently they are used,
and how they are being used
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
29
Best Practices for Access Control
• Establishing best practices for limiting access
• Can help secure systems and data
• Examples of best practices
• Separation of duties
• Job rotation
• Mandatory vacations
• Clean desk policy
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
30
Separation of Duties
• Separation of duties
• Fraud can result from a single user being trusted with complete control
of a process
• Requires two or more people responsible for functions related to
handling money
• The system is not vulnerable to actions of a single person
• In relation to computer access control
• Requires that if the fraudulent application of a process could potentially
result in a breach of security, the process should be divided between
two or more individuals
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
31
Job Rotation
• Individuals periodically moved between job responsibilities
• Employees can rotate within their department or across departments
• Advantages of job rotation
• Limits amount of time individuals are in a position to manipulate
security configurations
• Helps expose potential avenues for fraud
• Individuals have different perspectives and may uncover
vulnerabilities
• Reduces employee “burnout”
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
32
Mandatory Vacations
• Limits fraud, because perpetrator must be present daily to hide
fraudulent actions
• Audit of employee’s activities usually scheduled during vacation
for sensitive positions
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
33
Clean Desk Policy
• Designed to ensure that all confidential or sensitive materials are
removed form a user’s workspace and secured when the items not in use
• Either in paper form or electronic
• Sample statements that might be found in a clean desk policy:
• Computer workstations must be locked when the workspace is
unoccupied and turned off at the end of the day
• Confidential or sensitive information must be removed from the desk
and locked in a drawer or safe when the desk is unoccupied or at the
end of a work day
• File cabinets must be kept closed and locked when not in use or not
attended, and keys may not be left at an unattended desk
• Laptops must be either locked with a locking cable or locked in a
drawer or filing cabinet
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
34
Implementing Access Control
• Technologies used to implement access control:
• Access control lists (ACLs)
• Group-based access control
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
35
Access Control Lists (ACLs) (1 of 2)
• Access management ACL
• A set of permissions attached to an object
• Specifies which subjects may access the object and what operations they
can perform
• When a subject requests to perform an operation:
• System checks ACL for an approved entry
• ACLs are usually viewed in relation to operating system files
• ACLs provide file system security for protecting files managed by the OS
• ACL have also been ported to SQL and relational database systems
• So that ACLs can provide database security
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
36
Access Control Lists (ACLs) (2 of 2)
• Each entry in the ACL table is called access control entry (ACE)
• ACE structure (Windows)
• Security identifier (SID) for the user or group account or logon session
• Access mask that specifies access rights controlled by ACE
• Flag that indicates type of ACE
• Set of flags that determine whether objects can inherit permissions
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
37
Group-Based Access Control
• Group-based access control
• Permits the configuration of multiple computers by setting a single
policy for enforcement
• One example of group-based access Control is Group Policy
• A Microsoft Windows feature that provides centralized management
and configuration of computers and remote users using Active
Directory (AD)
• Usually used in enterprise environments
• Settings stored in Group Policy Objects (GPOs)
• Local Group Policy (LGP)
• Has fewer options than a Group Policy
• Used to configure settings for systems not part of AD
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
38
Identity and Access Services
• Different services can be used to provide identity and access services:
• RADIUS
• Kerberos
• Terminal Access Control Access Control Systems
• Generic servers built on the Lightweight Directory Access Protocol
(LDAP)
• Security Assertion Markup Language
• Authentication framework protocols
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
39
RADIUS (1 of 2)
• Remote Authentication Dial In User Service
• Developed in 1992
• Became an industry standard
• Originally designed for remote dial-in access to a corporate network
• RADIUS client
• Typically a device such as a wireless AP
• Responsible for sending user credentials and connection parameters to
the RADIUS server
• RADIUS user profiles are stored in a central database that all remote servers
can share
• Advantages of a central service
• Increases security due to a single administered network point
• Easier to track usage for billing and keeping network statistics
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
40
RADIUS (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
41
Kerberos
• Authentication system developed at MIT
• Uses encryption and authentication for security
• Works like using a driver’s license to cash a check
• Kerberos ticket characteristics:
• Difficult to copy
• Contains information linking it to the user
• It lists restrictions
• Expires at some future date
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
42
Terminal Access Control Access Control
System+ (TACACS+) (1 of 2)
• Authentication service similar to RADIUS
• Commonly used on UNIX devices
• Communicates by forwarding user authentication information to a
centralized server
• The current version is TACACS+
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
43
Terminal Access Control Access Control
System+ (TACACS+) (2 of 2)
Feature RADIUS TACACS+
Transport Protocol User Datagram
Protocol (UDP)
Transmission Control
Protocol (TCP)
Authentication and
authorization
Combined Separate
Communication Unencrypted Encrypted
Interacts with
Kerberos
No Yes
Can authenticate
network devices
No Yes
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
44
Lightweight Directory Access Protocol
(LDAP) (1 of 2)
• A directory service is a database stored on a network
• Contains information about users and network devices
• Keeps track of network resources and user’s privileges to those
resources
• Grants or denies access based on its information
• Standard for directory services is known as X.500
• Purpose of the standard was to standardize how the data was stored
so that any computer system could access directories
• X.500 standard also defines a protocol for client application to access
the DAP
• LDAP
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
45
Lightweight Directory Access Protocol
(LDAP) (2 of 2)
• LDAP
• Designed to run over TCP/IP
• A simpler subset of DAP
• Encodes protocol elements in simpler way than X.500
• LDAP traffic is transmitted in cleartext
• Can be made secure by using SSL or TLS
• Known as Secure LDAP or LDAP over SSL (LDAPS)
• Weakness of LDAP
• Can be subject to LDAP injection attacks
• Similar to SQL injection attacks
• Occurs when user input is not properly filtered
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
46
Security Assertion Markup Language
(SAML) (1 of 2)
• SAML
• An Extensible Markup Language (XML) standard that allows secure
web domains to exchange user authentication and authorization data
• Allows a user’s login credentials to be stored with a single identity
provider instead of being stored on each web service provider’s server
• Used extensively for online e-commerce business-to-business (B2B)
and business-to-customer (B2C) transactions
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
47
Security Assertion Markup Language
(SAML) (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
48
Authentication Framework Protocols
• A framework for transporting authentication protocols is known as the
Extensible Authentication Protocol (EAP)
• EAP was created as a more secure alternative to:
• Challenge-Handshake Authentication Protocol (CHAP)
• The Microsoft version of CHAP (MS-CHAP)
• Password Authentication Protocol (PAP)
• EAP:
• Defines the format of the messages
• Uses four types of packets:
• Request, response, success, and failure
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
49
Chapter Summary (1 of 2)
• Access control is the process by which resources or services are denied
or granted
• Five major access control models:
• Discretionary Access Control, Mandatory Access Control, Role-Based
Access Control, Rule-Based Access Control, Attribute-Based Access
Control
• Configuring accounts with proper permissions is the first step in providing
strong security
• Location-based policies establish the geographical boundaries of where
a mobile device can and cannot be used
• Once accounts have been created, it is important that they be
periodically maintained and audited to ensure they still follow all
enterprise policies
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
50
Chapter Summary (2 of 2)
• Best practices for implementing access control
• Separation of duties, job rotation, mandatory vacations, and following
a clean desk policy
• Implementing access control methods includes using access control lists
(ACLs)
• Different services can be used to provide identity and access services
• A directory service is a database stored on the network itself that
contains information about users and network devices
• One implementation of a directory service as an authentication is the
Lightweight Directory Access Protocol (LDAP)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.

More Related Content

What's hot

Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top ThreatsTiago de Almeida
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksDr. Ahmed Al Zaidy
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Information security
Information security Information security
Information security razendar79
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyArti Ambokar
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IDr. Ahmed Al Zaidy
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 

What's hot (20)

Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top Threats
 
Physical security
Physical securityPhysical security
Physical security
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 
User authentication
User authenticationUser authentication
User authentication
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Information security
Information security Information security
Information security
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Application Security
Application SecurityApplication Security
Application Security
 
Information security
Information securityInformation security
Information security
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 

Similar to Chapter 12 Access Management

Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business ContinuityDr. Ahmed Al Zaidy
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityDr. Ahmed Al Zaidy
 
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxAliffDarfriz
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokiamfrancis
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyDr. Ahmed Al Zaidy
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Mona Rajput
 
CC 3-3 Logical access controls.pdf
CC 3-3 Logical access controls.pdfCC 3-3 Logical access controls.pdf
CC 3-3 Logical access controls.pdfWaleed Elnaggar
 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control FundamentalsSetiya Nugroho
 
9781337102087 ppt ch10
9781337102087 ppt ch109781337102087 ppt ch10
9781337102087 ppt ch10Terry Yoast
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTuan Phan
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideCourtney Llamas
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsFredBrandonAuthorMCP
 

Similar to Chapter 12 Access Management (20)

Whitman_Ch06.pptx
Whitman_Ch06.pptxWhitman_Ch06.pptx
Whitman_Ch06.pptx
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business Continuity
 
Whitman_Ch05.pptx
Whitman_Ch05.pptxWhitman_Ch05.pptx
Whitman_Ch05.pptx
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
 
9780840024220 ppt ch05
9780840024220 ppt ch059780840024220 ppt ch05
9780840024220 ppt ch05
 
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptx
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
 
4_5949547032388570388.ppt
4_5949547032388570388.ppt4_5949547032388570388.ppt
4_5949547032388570388.ppt
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
 
Whitman_Ch12.pptx
Whitman_Ch12.pptxWhitman_Ch12.pptx
Whitman_Ch12.pptx
 
Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptx
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
 
CC 3-3 Logical access controls.pdf
CC 3-3 Logical access controls.pdfCC 3-3 Logical access controls.pdf
CC 3-3 Logical access controls.pdf
 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
 
9781337102087 ppt ch10
9781337102087 ppt ch109781337102087 ppt ch10
9781337102087 ppt ch10
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security Authorization
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners Guide
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 

More from Dr. Ahmed Al Zaidy

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingDr. Ahmed Al Zaidy
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web formsDr. Ahmed Al Zaidy
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsDr. Ahmed Al Zaidy
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesDr. Ahmed Al Zaidy
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsDr. Ahmed Al Zaidy
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptDr. Ahmed Al Zaidy
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaDr. Ahmed Al Zaidy
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web formDr. Ahmed Al Zaidy
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsDr. Ahmed Al Zaidy
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webDr. Ahmed Al Zaidy
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSDr. Ahmed Al Zaidy
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutDr. Ahmed Al Zaidy
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSDr. Ahmed Al Zaidy
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Dr. Ahmed Al Zaidy
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2Dr. Ahmed Al Zaidy
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Dr. Ahmed Al Zaidy
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityDr. Ahmed Al Zaidy
 
Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksChapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksDr. Ahmed Al Zaidy
 

More from Dr. Ahmed Al Zaidy (20)

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksChapter 5 Networking and Server Attacks
Chapter 5 Networking and Server Attacks
 

Recently uploaded

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 

Chapter 12 Access Management

  • 1. 1 CompTIA Security+ Guide to Network Security Fundamentals, Sixth Edition Chapter 12 Access Management © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 2. Objectives 12.1 Define access management and list the access control models 12.2 Describe how to manage access through account management 12.3 List the best practices for access control 12.4 Describe how to implement access control 12.5 Explain the different types of identity and access services © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 3. 3 What is Access Control? • Access Control • Granting or denying approval to use specific resources • Physical access control • Consists of fencing, hardware door locks, and mantraps to limit contact with devices • Technical access control • Consists of technology restrictions that limit users on computers from accessing data • There are standard access control models that are used to help enforce access control © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 4. 4 Access Control Terminology (1 of 5) • Identification • Presenting credentials • Example: delivery driver presenting employee badge • Authentication • Checking the credentials • Example: examining the delivery driver’s badge • Authorization • Granting permission to take action • Example: allowing delivery driver to pick up package • Accounting • A record that is preserved of who accessed the network, what resources they accessed, and when they disconnected © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 5. 5 Access Control Terminology (2 of 5) Action Description Scenario example Computer process Identification Review of credentials Delivery person shows employee badge User enters user name Authentication Validate credentials as genuine Gabe reads badge to determine it is real User provides password Authorization Permission granted for admittance Gabe opens door to allow delivery person in User authorized to log in Access Right given to access specific resources Delivery person can only retrieve box by door User allowed to access only specific data Accounting Record of user actions Gabe signs to confirm the package was picked up Information recorded in log file © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 6. 6 Access Control Terminology (3 of 5) • Object • A specific resource • Example: file or hardware device • Subject • A user or process functioning on behalf of a user • Example: computer user • Operation • The action taken by the subject over an object • Example: deleting a file © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 7. 7 Access Control Terminology (4 of 5) Role Description Duties Example Privacy officer Manager who oversees data privacy compliance and manages data risk Ensures the enterprise complies with data privacy laws and its own privacy policies Decides that users can have permission to access SALARY.XLSX Custodian or steward Individual to whom day- to-day actions have been assigned by the owner Periodically reviews security settings and maintains records of access by end users Sets and reviews security settings on SALARY.XLSX Owner Person responsible for the information Determines the level of security needed for the data and delegates security duties as required Determines that the file SALARY.XLSX can be read only by department managers End user User who access information in the course of routine job responsibilities Follows organization’s security guidelines and does not attempt to circumvent security Opens SALARY.XLSX © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 8. 8 Access Control Terminology (5 of 5) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 9. 9 Access Control Models • Access control model • Standards that provide a predefined framework for hardware or software developers • Use the appropriate model to configure the necessary level of control • Five major access control models • Discretionary Access Control (DAC) • Mandatory Access Control (MAC) • Role Based Access Control (RBAC) • Rule Based Access Control • Attribute-Based Access Control (ABAC) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 10. 10 Discretionary Access Control (DAC) (1 of 2) • Least restrictive model • Every object has an owner • Owners have total control over their objects • Owners can give permissions to other subjects over their objects • Used on operating systems such as most types of UNIX and Microsoft Windows • Two significant weaknesses: • Poses a risk in that it relies on decision by the end user to set the proper level of security • A subject’s permissions will be “inherited” by any programs that the subject executes © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 11. 11 Discretionary Access Control (DAC) (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 12. 12 Mandatory Access Control (MAC) (1 of 4) • Most restrictive access control model • User has no freedom to set any controls or distribute access to other subjects • Typically found in military settings • Two elements • Labels - Every entity is an object and is assigned a classification label that represents the relative importance of the object • Subjects are assigned a privilege label (clearance) • Levels - a hierarchy based on the labels is used • Top secret has a higher level than secret, which has a higher level than confidential • MAC grants permissions by matching object labels with subject labels • Labels indicate level of privilege © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 13. 13 Mandatory Access Control (MAC) (2 of 4) • To determine if file may be opened: • Object and subject labels are compared • The subject must have equal or greater level than object to be granted access • Two major implementations of MAC • Lattice model and Bell-LaPadula model • Lattice model • Subjects and objects are assigned a “rung” on the lattice • Multiple lattices can be placed beside each other • Bell-LaPadula (BLP) model • Similar to lattice model • Subjects may not create a new object or perform specific functions on lower level objects © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 14. 14 Mandatory Access Control (MAC) (3 of 4) • Microsoft Windows uses a MAC implementation called Mandatory Integrity Control (MIC) • A security identifier (SID) is issued to the user, group, or session • Each time a user logs in, the SID is retrieved from the database for that user • SID is used to identify user with subsequent interactions with Windows • Windows links the SID to an integrity level • User Access Control (UAC) - a Windows feature that controls user access to resources © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 15. 15 Mandatory Access Control (MAC) (4 of 4) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 16. 16 Role-Based Access Control • Role Based Access Control (RBAC) • Also called Non-Discretionary Access Control • Access permissions are based on user’s job function • RBAC assigns permissions to particular roles in an organization • Users are assigned to those roles © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 17. 17 Rule-Based Access Control • Also called Rule-Based Role-Based Access Control (RB-RBAC) • Dynamically assigns roles to subjects based on a set of rules defined by a custodian • Each resource object contains access properties based on the rules • When user attempts access, system checks object’s rules to determine access permission • Often used for managing user access to one or more systems • Business changes may trigger application of the rules specifying access changes © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 18. 18 Attribute-Based Access Control (1 of 2) • Uses more flexible polices than Rule-Based AC • Can combine attributes • Policies can take advantage of attributes such as: • Object attributes • Subject attributes • Environment attributes • ABAC rules can be formatted using an If-Then-Else structure © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 19. 19 Attribute-Based Access Control (2 of 2) Name Explanation Description Mandatory Access Control (MAC) End user cannot set controls Most restrictive model Discretionary Access Control (DAC) Subject has total control over objects Least restrictive model Role-Based Access Control (RBAC) Assigns permissions to particular roles in the organization and then users are assigned to roles Considered a more “real- world” approach Rule-Based Access Control Dynamically assigns roles to subjects based on a set of rules defined by a custodian Used for managing user access to one or more systems Attribute-Based Access Control (ABAC) Uses policies that can combine attributes Most flexible model © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 20. 20 Managing Access Through Account Management • Properly configuring accounts is a first step in providing strong security • Accounts include not only user accounts but also: • Service accounts • Privileged accounts • Account management includes account setup as well as account auditing © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 21. 21 Account Setup • When initially setting up an account, take these into consideration: • Employee accounts • Creating location-based policies • Establishing standard naming conventions • Creating time-of-day restrictions • Enforcing least privilege © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 22. 22 Employee Accounts (1 of 2) • Employee Accounts are often the source of entry points by threat actors • Employee Onboarding • Refers to the tasks associated with hiring a new employee • Onboarding steps: • Scheduling • Job duties • Socializing • Work space • Training • In addition, in a Microsoft Windows environment the steps may include: • Provision the new computer • Create email mailboxes and AD users • Add user accounts to groups • Create home folder • Review security settings © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 23. 23 Employee Accounts (2 of 2) • Employee offboarding • Actions to be taken when an employee leaves an enterprise • Steps include: • Back up all employee files from local computer and server • Archive email • Forward email to a manager or coworker • Hide the name from the email address book • Orphaned accounts – user accounts that remain active after an employee has left • Dormant account – an account that has not been accessed for a lengthy period • Many organizations disable accounts for a minimum of 30 days and then purge disabled accounts twice per year © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 24. 24 Location-Based Policies • Geofencing relies upon location-based policies • Or establishing the geographical boundaries of where a mobile device can and cannot be used • Polices are often first prescribed by generating an IP location data file • Which is a text file containing comma separated fields in the format IP_From, IP_To, Country_Code, Country_Name, Region, City • This policy then becomes the basis for how authorization requests from mobile devices are evaluated © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 25. 25 Standard Naming Conventions • Standard naming conventions • “Rules” that have been established for creating account names • Options typically include: • First initial of first name followed by last name, • First name with a punctuation mark followed by last name • Last name followed by department code • In the event two names appear to be the same • A standard policy should be established for resolving conflicts © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 26. 26 Time-of-Day Restrictions • Time-of-day restrictions can be used to limit when a user can log into their account © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 27. 27 Least Privilege • Least privilege in access control • Means that only the minimum amount of privileges necessary to perform a job or function should be allocated • Helps reduce the attack surface by eliminating unnecessary privileges that could provide an avenue for an attacker • Should apply both to user accounts and to processes running on the system © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 28. 28 Account Auditing • Once accounts have been created, they should be periodically maintained and audited using the following audits: • Recertification – the process of periodically revalidating a user’s account, access control, and membership role • Permission auditing and review – intended to examine the permissions that a user has been given to determine if each is still necessary • Usage auditing and review – an audit process that looks at the applications that the user is provided, how frequently they are used, and how they are being used © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 29. 29 Best Practices for Access Control • Establishing best practices for limiting access • Can help secure systems and data • Examples of best practices • Separation of duties • Job rotation • Mandatory vacations • Clean desk policy © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 30. 30 Separation of Duties • Separation of duties • Fraud can result from a single user being trusted with complete control of a process • Requires two or more people responsible for functions related to handling money • The system is not vulnerable to actions of a single person • In relation to computer access control • Requires that if the fraudulent application of a process could potentially result in a breach of security, the process should be divided between two or more individuals © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 31. 31 Job Rotation • Individuals periodically moved between job responsibilities • Employees can rotate within their department or across departments • Advantages of job rotation • Limits amount of time individuals are in a position to manipulate security configurations • Helps expose potential avenues for fraud • Individuals have different perspectives and may uncover vulnerabilities • Reduces employee “burnout” © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 32. 32 Mandatory Vacations • Limits fraud, because perpetrator must be present daily to hide fraudulent actions • Audit of employee’s activities usually scheduled during vacation for sensitive positions © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 33. 33 Clean Desk Policy • Designed to ensure that all confidential or sensitive materials are removed form a user’s workspace and secured when the items not in use • Either in paper form or electronic • Sample statements that might be found in a clean desk policy: • Computer workstations must be locked when the workspace is unoccupied and turned off at the end of the day • Confidential or sensitive information must be removed from the desk and locked in a drawer or safe when the desk is unoccupied or at the end of a work day • File cabinets must be kept closed and locked when not in use or not attended, and keys may not be left at an unattended desk • Laptops must be either locked with a locking cable or locked in a drawer or filing cabinet © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 34. 34 Implementing Access Control • Technologies used to implement access control: • Access control lists (ACLs) • Group-based access control © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 35. 35 Access Control Lists (ACLs) (1 of 2) • Access management ACL • A set of permissions attached to an object • Specifies which subjects may access the object and what operations they can perform • When a subject requests to perform an operation: • System checks ACL for an approved entry • ACLs are usually viewed in relation to operating system files • ACLs provide file system security for protecting files managed by the OS • ACL have also been ported to SQL and relational database systems • So that ACLs can provide database security © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 36. 36 Access Control Lists (ACLs) (2 of 2) • Each entry in the ACL table is called access control entry (ACE) • ACE structure (Windows) • Security identifier (SID) for the user or group account or logon session • Access mask that specifies access rights controlled by ACE • Flag that indicates type of ACE • Set of flags that determine whether objects can inherit permissions © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 37. 37 Group-Based Access Control • Group-based access control • Permits the configuration of multiple computers by setting a single policy for enforcement • One example of group-based access Control is Group Policy • A Microsoft Windows feature that provides centralized management and configuration of computers and remote users using Active Directory (AD) • Usually used in enterprise environments • Settings stored in Group Policy Objects (GPOs) • Local Group Policy (LGP) • Has fewer options than a Group Policy • Used to configure settings for systems not part of AD © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 38. 38 Identity and Access Services • Different services can be used to provide identity and access services: • RADIUS • Kerberos • Terminal Access Control Access Control Systems • Generic servers built on the Lightweight Directory Access Protocol (LDAP) • Security Assertion Markup Language • Authentication framework protocols © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 39. 39 RADIUS (1 of 2) • Remote Authentication Dial In User Service • Developed in 1992 • Became an industry standard • Originally designed for remote dial-in access to a corporate network • RADIUS client • Typically a device such as a wireless AP • Responsible for sending user credentials and connection parameters to the RADIUS server • RADIUS user profiles are stored in a central database that all remote servers can share • Advantages of a central service • Increases security due to a single administered network point • Easier to track usage for billing and keeping network statistics © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 40. 40 RADIUS (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 41. 41 Kerberos • Authentication system developed at MIT • Uses encryption and authentication for security • Works like using a driver’s license to cash a check • Kerberos ticket characteristics: • Difficult to copy • Contains information linking it to the user • It lists restrictions • Expires at some future date © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 42. 42 Terminal Access Control Access Control System+ (TACACS+) (1 of 2) • Authentication service similar to RADIUS • Commonly used on UNIX devices • Communicates by forwarding user authentication information to a centralized server • The current version is TACACS+ © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 43. 43 Terminal Access Control Access Control System+ (TACACS+) (2 of 2) Feature RADIUS TACACS+ Transport Protocol User Datagram Protocol (UDP) Transmission Control Protocol (TCP) Authentication and authorization Combined Separate Communication Unencrypted Encrypted Interacts with Kerberos No Yes Can authenticate network devices No Yes © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 44. 44 Lightweight Directory Access Protocol (LDAP) (1 of 2) • A directory service is a database stored on a network • Contains information about users and network devices • Keeps track of network resources and user’s privileges to those resources • Grants or denies access based on its information • Standard for directory services is known as X.500 • Purpose of the standard was to standardize how the data was stored so that any computer system could access directories • X.500 standard also defines a protocol for client application to access the DAP • LDAP © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 45. 45 Lightweight Directory Access Protocol (LDAP) (2 of 2) • LDAP • Designed to run over TCP/IP • A simpler subset of DAP • Encodes protocol elements in simpler way than X.500 • LDAP traffic is transmitted in cleartext • Can be made secure by using SSL or TLS • Known as Secure LDAP or LDAP over SSL (LDAPS) • Weakness of LDAP • Can be subject to LDAP injection attacks • Similar to SQL injection attacks • Occurs when user input is not properly filtered © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 46. 46 Security Assertion Markup Language (SAML) (1 of 2) • SAML • An Extensible Markup Language (XML) standard that allows secure web domains to exchange user authentication and authorization data • Allows a user’s login credentials to be stored with a single identity provider instead of being stored on each web service provider’s server • Used extensively for online e-commerce business-to-business (B2B) and business-to-customer (B2C) transactions © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 47. 47 Security Assertion Markup Language (SAML) (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 48. 48 Authentication Framework Protocols • A framework for transporting authentication protocols is known as the Extensible Authentication Protocol (EAP) • EAP was created as a more secure alternative to: • Challenge-Handshake Authentication Protocol (CHAP) • The Microsoft version of CHAP (MS-CHAP) • Password Authentication Protocol (PAP) • EAP: • Defines the format of the messages • Uses four types of packets: • Request, response, success, and failure © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 49. 49 Chapter Summary (1 of 2) • Access control is the process by which resources or services are denied or granted • Five major access control models: • Discretionary Access Control, Mandatory Access Control, Role-Based Access Control, Rule-Based Access Control, Attribute-Based Access Control • Configuring accounts with proper permissions is the first step in providing strong security • Location-based policies establish the geographical boundaries of where a mobile device can and cannot be used • Once accounts have been created, it is important that they be periodically maintained and audited to ensure they still follow all enterprise policies © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 50. 50 Chapter Summary (2 of 2) • Best practices for implementing access control • Separation of duties, job rotation, mandatory vacations, and following a clean desk policy • Implementing access control methods includes using access control lists (ACLs) • Different services can be used to provide identity and access services • A directory service is a database stored on the network itself that contains information about users and network devices • One implementation of a directory service as an authentication is the Lightweight Directory Access Protocol (LDAP) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.