Understand User Authentication LESSON 2.1A Security Fundamentals.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
.  Define authentication  Authentication credentials  Authentication models  Authentication servers  Extended authentication protocols  Virtual.
Remote Networking Architectures
Understanding Active Directory
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Authentication, Authorization and Accounting
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Chapter 10: Authentication Guide to Computer Network Security.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Operating System Security Fundamentals Dr. Gabriel.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Module 3 Planning for Active Directory®
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Authentication, Authorization and Accounting Lesson 2.
Basharat Institute of Higher Education
Secure Connected Infrastructure
Module 9: Configuring Network Access
Chapter One: Mastering the Basics of Security
Network Infrastructure
Module Overview Installing and Configuring a Network Policy Server
Challenge/Response Authentication
SECURITY in IT ~Shikhar Agarwal.
Radius, LDAP, Radius used in Authenticating Users
Module 8: Securing Network Traffic by Using IPSec and Certificates
Virtual Private Networks (VPN)
Server-to-Client Remote Access and DirectAccess
PPPoE Internet Point to Point Protocol over Ethernet
Goals Introduce the Windows Server 2003 family of operating systems
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Strong Password Authentication Protocols
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Securing Windows 7 Lesson 10.
Module 8: Securing Network Traffic by Using IPSec and Certificates
COEN 351 Authentication.
Protection Mechanisms in Security Management
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Introduction to Networking Security
Presentation transcript:

Understand User Authentication LESSON 2.1A Security Fundamentals

LESSON 2.1A Lesson Overview In this lesson you will learn about the principles of authentication methods. 1. What the user knows 2. What the user has 3. What the user is

Security Fundamentals LESSON 2.1A Authentication Methods  Passwords  User IDs  Biometrics o Facial scanners o Iris scanners o Voice recognition o Fingerprint readers o Hand scanners o Signature scan

Security Fundamentals LESSON 2.1A Authentication Methods (continued) Two-factor authentication o Smart cards o USB tokens o Digital certificates

Security Fundamentals LESSON 2.1A Active Directory Domain Services (AD DS)  Formerly known as Active Directory ® Directory Services  Central location for configuration information, authentication requests, and information about all of the objects that are stored within your forest  Used to efficiently manage users, computers, groups, printers, applications, and other directory-enabled objects from one secure, centralized location

Security Fundamentals LESSON 2.1A Kerberos  A network authentication protocol  Designed to provide strong authentication for client/server applications by using secret-key cryptography Massachusetts Institute of Technology Massachusetts Institute of Technology  A free implementation of this protocol is available from the Massachusetts Institute of Technology Massachusetts Institute of Technology  Available in many commercial products as well

Security Fundamentals LESSON 2.1A Lightweight Directory Access Protocol (LDAP)  A directory service protocol that runs on a layer above the TCP/IP stack  Provides a mechanism used to connect to, search, and modify Internet directories  The LDAP directory service is based on a client-server model  The function of LDAP is to enable access to an existing directory

Security Fundamentals LESSON 2.1A Remote Authentication Dial-In User Service (RADIUS)  A widely deployed protocol enabling centralized authentication, authorization, and accounting for network access  Originally developed for dial-up remote access  Now supported by virtual private network (VPN) servers, wireless access points, authenticating Ethernet switches, digital subscriber line (DSL) access, and other network access types The general structure of a RADIUS packet:

Security Fundamentals LESSON 2.1A TACACS Authentication Scheme  Uses a secret key to encrypt the authentication request  This key must be identically configured in both the Forefront UAG and the TACACS authentication server

Security Fundamentals LESSON 2.1A Practice Summarize the key points in a brief discussion of each of the following concepts: 1. Strong passwords 2. Single sign-on 3. Dumpster diving 4. Spoofing 5. Social engineering 6. Phishing 7. Pharming