Page 275 - CISSO_Prep_ Guide
P. 275

•  Physical: CCTV.
                   •  Corrective: remedy & restore controls
                          •  Administrative: termination.
                          •  Technical: unplug, isolate, and
                              terminate the connection.
                          •  Physical: fire extinguisher.
                   •  Compensating: alternative controls
                          •  Administrative: supervision, job
                              rotation.
                          •  Technical: logging, keystroke
                              monitoring.
                          •  Physical: layered defense.
                          •  Note: compensating is an alternative
                              when a primary is unavailable.  For
                              example, to have a procedure to
                              check ID when a badge reader is
                              malfunctioning.  All of the
                              compensating controls also belong in
                              other categories.
                   •  Recovery: restore to normal
                          •  Administrative: DR plan.
                          •  Technical: tape backups.
                          •  Physical: reconstruction, rebuild.

               Types of Authentication
               •  Asynchronous token device:
                       •  Time is not an issue with asynchronous
                          token devices.  These steps can take
                          moments or minutes/hours/days, etc.
                   1.  Request sent to authentication server along
                       with user ID.
   270   271   272   273   274   275   276   277   278   279   280