Access Control Overview ..211: A. Know Definitions of Access, Subject, Object ..211
Access Control Overview ..211: A. Know Definitions of Access, Subject, Object ..211
211
A. Know Definitions of Access, Subject, Object…..211
2. Security Principles…..212
A. Availability…..213
B. Integrity…..213
C. Confidentiality…..213-14
A. Directories…..221-3
C. Password Management…..227-9
1. Password Synchronization…..227-8
E. Account Management…..229-30
F. Provisioning…..230-2
G. Profile Update…..232
H. Federation…..233-4
3. Biometrics…..237-
A. Fingerprint…..240
B. Palm Scan…..240
C. Hand Geometry…..240
D. Retina Scan…..240
E. Iris Scan…..240
F. Signature Dynamics…..241
G. Keystroke Dynamics…..241
H. Voice Print…..241
I. Facial Scan…..241
J. Hand Topography…..241
4. Passwords…..242
A. Password Management…..242-4
B. Password Checkers…..244
D. Password Aging…..244
5. Cognitive Password…..245
6. One-Time Password…..245
A. The Token Device…..245
B. Synchronous…..245
C. Asynchronous…..246
7. Cryptographic Keys…..248
8. Passphrase…..248
9. Memory Cards…..248-9
B. Authorization…..252
1. Access Criteria…..253-4
2. Default to No Access…..254
3. Need to Know…..254-6
4. Single Sign-On…..256-8
5. Kerberos…..258
C. Weaknesses of Kerberos…..262-3
6. SESAME…..2634
7. Security Domains…..264-6
8. Directory Services…..267
9. Thin Clients…..267
4. Access Control Models…..268
A. Discretionary Access (DAC)…..268-9
2. Hierarchical RBAC…..273
A. Non-RBAC
B. Limited RBAC
C. Hybrid RBAC
D. Full RBAC
2. TACACS…..281-4
3. Diameter…..284-6
B. Administrative Controls…..288
1. Personnel Controls…..289
2. Supervisory Structure…..289
3. Security-Awareness Training…..289
4. Testing…..289
C. Physical Controls…..290
1. Network Segregation…..290
2. Perimeter Security…..290
3. Computer Controls…..290-1
5. Cabling…..291
6. Control Zone…..291
D. Technical Controls…..291
1. System Access…..292
2. Network Architecture…..292
3. Network Access…..292-4
5. Auditing…..294
B. Preventive: Physical…..297
C. Preventive: Technical…..297
9. Accountability…..300
A. Review of Audit information…..302
B. Keystroke Monitoring…..302-3
2. Emanation Security…..305
A. TEMPEST…..305-6
B. White Noise…..306
C. Control Zone…..306
2. Host-Based IDSs…..307-8
4. State-Base IDSs…..309
8. Rule-Based IDS…..312-13
9. IDS Sensors…..314
2. Network Sniffers…..318
B. Brute Force
1. Countermeasures…..320
C. Spoofing at Logon…..320
1. Phishing…..321
2. Identity Theft…..323