Page 132 - CISSO_Prep_ Guide
P. 132

role in building a secure access control system and tracking the
            activity that takes place on the protected entity.
            Access control is about allowing the correct level of access to
            authorized personnel, but not permitting unauthorized personnel
            or entities to access a system or make any modifications.



            Identification
            Identification is the unique method of distinguishing one entity
            from another. Each process, person, or entity that requests
            access to a protected entity should be uniquely identified in a
            way that allows the system to enforce the correct level of access
            but only to authorized personnel.



            Methods of Identification
            There are many ways to identify an entity. These can be broken
            into two primary methods - entity or user identification; and
            node identification and authentication.


            Node Identification and Authentication

            Node identification is to identify a location or a device, but not
            necessarily the user that is operating the device. This has been
            used in the past on wireless devices to filter out devices that are
            attempting to associate with a wireless access point by Media
            Access Control (MAC) address. Only devices that had their
            MAC addresses listed in the authorized devices list would be
            able to log in. In the mainframe world, the operator console was
            often connected to the CPU via a hardwired direct connection.
            This connection was known as a trusted path, and there were
   127   128   129   130   131   132   133   134   135   136   137