Page 133 - CISSO_Prep_ Guide
P. 133

certain operations and administrative functions that could only
            be executed if the operator was physically sitting at that console.
            Many other systems and network devices have a similar
            connection through an administrative port that would restrict
            any changes to the configuration of the device unless the
            administrator was connected directly to the administrator port.
            This would prohibit any changes from the network and make it
            much more difficult for an attacker to manipulate the device
            configurations.

            Another method of node authentication is through an IP address.
            Some systems will restrict a person from logging in unless they
            are on a recognized IP address. Some applications are also set to
            restrict operations to a certain CPU (central processing unit)
            serial number. This prevents a purchaser of an expensive
            software solution from running the software on unauthorized
            systems. However, this can be a problem with disaster recovery
            plans since the software will not operate at an alternate location
            unless the supplier/vendor or the software permits it.



            User Authentication
            The most commonly recognized form of identification is to
            identify individual users or processes that are requesting access
            to a system or other entity. User identification should be the
            creation of a unique value for each user - shared identities
            remove the ability to track the activity on the system to anyone
            user. This is especially a concern when administrators share
            identities and use those shared identities to perform high-level
            administrative functions.
   128   129   130   131   132   133   134   135   136   137   138