Page 62 - StudyBook.pdf
P. 62

46     Chapter 1 • General Security Concepts: Access Control, Authentication, and Auditing

             Authentication


                   Kerberos is a multi-platform authentication method that requires tickets
                      (tokens) and a KDC. It exists as a realm in most platforms, and is utilized
                      in the domain environment in Windows Active Directory structures.
                   CHAP can utilize a shared secret, and uses a one-way hash to protect the
                      secret.

                   Certificates require a CA, which is used to create the digital certificates
                      used for digital signatures, mutual identification, and verification.

                   Username/password is the most basic security usage, and is available in
                      most platforms.
                   Tokens are hardware and software devices for random generation of
                      passcodes to further secure the authentication process.
                   Multi-factor authentication is the use of more than one type of
                      authentication concurrently to strengthen the authentication process, such
                      as requiring a card and PIN together.
                   Mutual authentication consists of using various methods to verify both
                      parties to the transaction to the other.

                   Biometrics is used with devices that have the ability to authenticate
                      something you already have, such as a fingerprint or retinal image.


             Auditing


                   An auditing policy must be established and evaluated to determine what
                      resources or accesses need to be tracked.
                   Usually retained in log files, which may be used to track paths and
                      violations. Good logging may be used for prosecution, if necessary.
                   Important that someone is responsible for viewing and analyzing regularly.


             Removing Non-essential Services


                   Remove unused and unneeded components from servers, network
                      components, and workstations, including functions such as DNS and
                      DHCP.




          www.syngress.com
   57   58   59   60   61   62   63   64   65   66   67