Page 60 - StudyBook.pdf
P. 60

44     Chapter 1 • General Security Concepts: Access Control, Authentication, and Auditing

             Summary of Exam Objectives


             In this chapter, you worked on concepts tested in the Security+ exam relating to
             general security concepts.These objectives include having a working knowledge of
             the concepts of AAA.These concepts are widely used to support the concept of
             CIA, by providing the methodology to protect resources and track the access given
             to them.
                 We found that as we looked at the separate components of AAA, there were a
             number of ways to accomplish the goal of controlling the security of our networks
             and systems by using the appropriate methodologies.We discovered that we have
             three distinct methods of providing access control. MACs are rules that are defined
             and hard-coded into operating systems and applications to allow or deny access to
             services or applications. In the case of DAC, the user or service that owns an
             object, such as a file, has control of who or what else has the ability to access the
             file or object, and at what level. Finally, we explored the capabilities of RBAC.This
             method, while requiring much more initial design and administrative resources to
             set up, allowed us to refine and sharpen the level of access based on job function,
             rather than the more general group concept used in the past.This method allows
             much more flexibility in definition of the access level.
                 We looked at the concept of authentication and found that there are a number
             of different methods that can be used to authenticate.We looked at the danger of
             cleartext username and password transmission on our networks, and a number of
             methods that provide for a stronger verification of the entity requesting the use of
             our systems or resources. In the realm of authentication, we also looked at the con-
             cept of realms and the way they are used by Kerberos to provide authentication
             services. Certificates, and the CA hierarchy that goes with them, can be used to
             verify the authenticity of machines, users, software, and communications.We also
             viewed the concept of using third-party authentication tools such as multi-factor
             authentication, which can be provided by the use of a PIN and identification card,
             Token technologies, and the use of biometrics and biometric devices.
                 Further exploration of the AAA components led us to discuss and work with
             the concept of auditing. It is important to define the appropriate policy that con-
             trols, monitors and evaluates the activity that is occurring in and on our systems.
             This includes monitoring the conditions of access and the authorization processes
             to ensure the appropriate levels of control are maintained throughout the system.
             We learned that it is important to maintain appropriate records, to control access to
             those records, and to analyze them appropriately to help determine the condition
             of the system.



          www.syngress.com
   55   56   57   58   59   60   61   62   63   64   65