Page 132 - CISSO_Prep_ Guide
P. 132
role in building a secure access control system and tracking the
activity that takes place on the protected entity.
Access control is about allowing the correct level of access to
authorized personnel, but not permitting unauthorized personnel
or entities to access a system or make any modifications.
Identification
Identification is the unique method of distinguishing one entity
from another. Each process, person, or entity that requests
access to a protected entity should be uniquely identified in a
way that allows the system to enforce the correct level of access
but only to authorized personnel.
Methods of Identification
There are many ways to identify an entity. These can be broken
into two primary methods - entity or user identification; and
node identification and authentication.
Node Identification and Authentication
Node identification is to identify a location or a device, but not
necessarily the user that is operating the device. This has been
used in the past on wireless devices to filter out devices that are
attempting to associate with a wireless access point by Media
Access Control (MAC) address. Only devices that had their
MAC addresses listed in the authorized devices list would be
able to log in. In the mainframe world, the operator console was
often connected to the CPU via a hardwired direct connection.
This connection was known as a trusted path, and there were