CompTIA Security+ Study Guide (SY0-501)

Slides:



Advertisements
Similar presentations
Access Control Chapter 3 Part 3 Pages 209 to 227.
Advertisements

Access Control Methodologies
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Cisco’s Secure Access Control Server (ACS)
Module 9: Fundamentals of Securing Network Communication.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Chapter 3: Security Basics Security+ Guide to Network Security Fundamentals Second Edition.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
By: Nikhil Bendre Gauri Jape.  What is Identity?  Digital Identity  Attributes  Role  Relationship.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Privilege Management Chapter 22.
Lesson 2-General Security Concepts
Networking Network Classification, by there: 3 Security And Communications software.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
Chapter 13: Managing Identity and Authentication.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Identity and Access Management
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Secure Single Sign-On Across Security Domains
CompTIA Network+ N Authorized Cert Guide
AuthLite 2-Factor for Windows Administration
Chapter One: Mastering the Basics of Security
Module Overview Installing and Configuring a Network Policy Server
Secure Software Confidentiality Integrity Data Security Authentication
Click to edit Master subtitle style
Module 8: Securing Network Traffic by Using IPSec and Certificates
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
Security in Networking
Cisco Real Exam Dumps IT-Dumps
CompTIA Security+ Study Guide (SY0-501)
Message Digest Cryptographic checksum One-way function Relevance
Strong Password Authentication Protocols
Managing User Security
Securing Windows 7 Lesson 10.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Authentication Chapter 2.
Attribute-Based Access Control (ABAC)
Protection Mechanisms in Security Management
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Access Control Evolution and Prospects
Presentation transcript:

CompTIA Security+ Study Guide (SY0-501) Chapter 4: Identity and Access Management

Chapter 4: Identity and Access Management Given a scenario, use appropriate software tools to assess the security posture of an organization Given a scenario, troubleshoot common security issues Given a scenario, analyze and interpret output from security technologies Compare and contrast identity and access management concepts Given a scenario, install and configure identity and access services Given a scenario, implement identity and access management control

Tools to Assess Your Network Protocol analyzers tcpdump Wireshark Network scanners Solar Winds LanHelper Wireless scanners and crackers Aircrack

Tools to Assess Your Network Continued Password crackers pwdump Ophcrack Vulnerability scanners Nessus MBSA OWASP Zap

Command-Line Tools ping netstat tracert nslookup/dig arp ipconfig/ip/ifconfig nmap netcat

Additional Tools General networking tools Honeypots Steganography tools

Troubleshooting Common Security Issues Access issues Configuration issues Digital certificate issues Personnel issues Other issues

Security Technologies Intrusion detection systems Antimalware Firewalls and related devices Other systems

Identification vs. Authentication Requires a human to intercede and verify that someone is who they say they are Authentication The user may not be who they are supposed to be, but they have indeed given the correct combination of values (such as username and password, tokens, or biometrics) and thus they are authenticated.

Authentication (single factor) and authorization Single-factor authentication (SFA) Username and password Multifactor authentication Multifactor system Two-factor authentication system

Biometrics Federations

Potential Authentication and Access Problems Transitive Access One party (A) trusts another party (B). If the second party (B) trusts another party (C), then a relationship can exist where the third party (C) is trusted by the first party (A).

LDAP PAP, SPAP, and CHAP Kerberos RADIUS

Chapter 4: Access Control, Authentication, and Authorization TACACS/TACACS+/XTACACS This is a client-server-oriented environment, and it operates in a manner similar to how RADIUS operates. OATH One-time passwords SAML Security Assessment Markup Language

Access Control Five primary methods Mandatory access control (MAC) All access predefined Discretionary access control (DAC) Incorporates some flexibility Role-based access control (RBAC) Allows the user’s role to dictate access capabilities Rule-based access control (RBAC) Limits user to preconfigured policies Attribute-based access control (ABAC) Considers all of the various attributes associated with the subject and object in making the access control decision

Smart cards Common access card (CAC) Personal identification verification card (PIV)