Page 692 - StudyBook.pdf
P. 692

676    Chapter 12 • Operational and Organizational Security: Policies and Disaster Recovery

                 While each of these policies address individual topics, together they enhance
             the security of an organization as a whole.

             Restricted Access Policies

             Access can be controlled in a variety of ways.When determining access levels for
             employees, it is important that each user only receive the minimum access required
             to do their job.Anything more is a security risk.
                 Determining what level of security a user needs to perform their job usually
             requires some investigation.All users of a network may have their own personal
             directories for storing files, but may need additional access to databases, programs,
             and files stored on various servers.To determine how much access a user or group
             needs, the user’s duties should be discussed with management. Understanding the
             job a user performs enables the administrator to determine what resources the user
             will require access to.
                 The Internet is another area where restricted access may be necessary. Many
             sites have areas that contain information that is limited to a selected group of users.
             Corporate Web sites may have sections for employees, where they are required to
             enter a username and password to view information on pensions, employee dis-
             counts, and other confidential or restricted information.Another common require-
             ment for restricted access on Web sites involves “members only” access, where
             customers pay for access to information, files, or other data that isn’t available to the
             public at large. Generally, individual usernames and passwords are all that’s required
             to prevent unauthorized users from accessing these sections.
                 More elaborate security is needed if the data being accessed is sensitive enough,
             or users need to access resources on an internal network from the Internet or using
             dial-up connections.Virtual Private Networks (VPNs) may be used in a company,
             allowing authorized users to connect over the Internet to access files, programs, and
             other network resources. Using tunneling protocols like Point-to-Point Tunneling
             Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP), remote clients can
             access resources over an encrypted connection.Two factor authentications, using a
             username and password combined with a PIN number or some other identifier
             may also be used to authenticate users. For example, RSA Security provides an
             authentication method called SecurID, where users have a token (a piece of hard-
             ware with a digital display) that generates a different numeric code every sixty sec-
             onds or so.This code is different for each token, and corresponds to a number
             generated on a server.When a user logs in over a VPN or remote connection, he or
             she must enter a username, PIN number, and the number provided by the token.




          www.syngress.com
   687   688   689   690   691   692   693   694   695   696   697