Presentation is loading. Please wait.

Presentation is loading. Please wait.

Domain 6 – Security Assessment and Testing

Similar presentations


Presentation on theme: "Domain 6 – Security Assessment and Testing"— Presentation transcript:

1 Domain 6 – Security Assessment and Testing
Assessment and test strategies – what kind of testing, test cases help security Security process data (management and operational controls) Security control testing Security architectures vulnerabilites

2 Assessment and Test strategies
Pen Test War dialing – bank of medems Sniffing – monitoring network traffic Eavesdropping – listening Dumpster diving – sifting through discarded documents, etc. Social engineering – Human manipulation

3 Security process data Employment policies and practices – termination process and background checks Roles and responsibilities – management sets the standard and verbalizes the policy Security awareness training – prevents social engineering

4 Control Models - MAC Mandatory set of rules Rule based Access control
Data owners have less freedom than DAC Access Granted on rules or security labels More secure (government) Every resource has a label, every user has a clearance Embodies the concept of need to know

5 Control Models - DAC Indentity based Access Control
Owner specifies access levels Unix and Windows Most common access control

6 Control Models – Non Discretionary
Role based access control Access based on job description Good for high staff turnover Lattice Based ACL Access based on job role and the task

7 Control Types – Centralized and De-centralized
All objects controlled at a central point Very strict access control Ease of administration Types: RADIUS – Serves dial in users, incorporates authentication server and dynamic password TACACS – static password TACACS+ - supports token authentication Decentralized Remote authentication Decistion is closer to the objects More administration overhead Different user rights around the network Hybrid model A mixture of centralized and decentralized

8 Single Sign On - Kerberos
Symmetric key cryptography Components KDC – holds the cryptographic keys Tickets TGS Process Subject requests access to an object Request goes via the KDC – includes a session key derived from user PW KDC generates a ticket for the subject and the object Subject validates the ticket came from the KDC Subject sends ticket to object Object validates the ticket Object grants access to the subject – kerberized session is established


Download ppt "Domain 6 – Security Assessment and Testing"

Similar presentations


Ads by Google