Page 63 - StudyBook.pdf
P. 63

General Security Concepts: Access Control, Authentication, and Auditing • Chapter 1  47

                       Remove unnecessary protocols from network communication systems and
                         devices that operate in your system. Evaluate the need for each protocol,
                         and unbind or remove as appropriate in your environment.

                       Remove unnecessary or unused programs from workstations and servers to
                         limit potential problems that may be introduced through their
                         vulnerabilities.

                 Exam Objectives
                 Frequently Asked Questions



                 The following Frequently Asked Questions, answered by the authors of this
                 book, are designed to both measure your understanding of the Exam Objectives
                 presented in this chapter, and to assist you with real-life implementation of
                 these concepts.


                 Q: What is the difference between access controls and authentication? They seem
                    to be the same.
                 A: Access controls set the condition for opening the resource.This could be the
                    time of day, where the connection originates, or any number of conditions.
                    Authentication verifies that the entity requesting the access is verifiable and
                    who the entity is claiming to be.


                 Q: My users are using Win9.x workstations. I can’t find where to set DAC settings
                    on these machines.
                 A: Win9.x machines do not have the ability to have DAC settings configured for
                    access to items on the local machine.Win9.x users logged into a domain may
                    set DAC settings on files they own stored on remote NTFS-formatted drives.

                 Q: The idea of RBACs seems very complicated.Wouldn’t it be easier just to use
                    groups?

                 A: Easier, yes. More secure, NO! RBACs allow much finer control over which
                    users get access.This is backwards from the conventional teaching that had us
                    use the groups to ease administrative effort.


                 Q: You discussed the necessity to disable or remove services. I work with Windows
                    2003 servers, and would like some guidelines to follow.



                                                                              www.syngress.com
   58   59   60   61   62   63   64   65   66   67   68