Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managing User Security

Similar presentations


Presentation on theme: "Managing User Security"— Presentation transcript:

1

2 Managing User Security
Chapter 3 Managing User Security

3 Certification Objectives
CompTIA Security+ 1.2 Compare and contrast types of attacks. 2.3 Given a scenario, troubleshoot common security issues. 2.6 Given a scenario, implement secure protocols. 3.9 Explain the importance of physical security controls. 4.1 Compare and contrast identity and access management concepts. 4.2 Given a scenario, install and configure identity and access services. 4.3 Given a scenario, implement identity and access management controls. 4.4 Given a scenario, differentiate common account management practices.

4 Certification Objectives (continued)
Microsoft MTA Security Fundamentals 2.1 Understand user authentication. 2.2 Understand permissions. 2.3 Understand password policies. 4.1 Understand client protection.

5 Authentication and Control
Section 3.1 Authentication and Control

6 Key Terms Active Directory attack surface authentication
behavioral biometrics biometrics crossover error rate (CER) Discretionary Access Control (DAC) dongle false acceptance rate (FAR) false rejection rate (FRR) federated identity management (FID) hardening job rotation Kerberos

7 Key Terms Key Distribution Center (KDC) LDAPS
Lightweight Directory Access Protocol (LDAP) Mandatory Access Control (MAC) mandatory vacations multifactor authentication one-time password (OTP) permission policy right Role-Based Access Control (RBAC) rule-based access control secondary logon

8 Key Terms Security Accounts Manager (SAM)
Security Assertion Markup Language (SAML) Shibboleth single sign-on (SSO) transitive trust user account control (UAC)

9 Learning Goals Explain the process of authentication.
Discuss the use of access levels. Describe nontechnical approaches to user security. Compare authentication on a local computer to authentication on a network computer.

10 User Authentication Authentication: process of validating a user
Passwords Most common authentication method One of the least-secure methods Weak passwords; shoulder surfing Reuse of passwords on multiple sites Poor password policies Password-cracking tools

11 User Authentication (continued)
Multifactor Authentication When different forms of authentication are combined What you know Passwords Asking a security question

12 User Authentication (continued)
What you have User must possess a device that contains security information Common access cards (CACs) Tokens Not used to replace passwords

13 User Authentication (continued)
What you have One-time password (OTP): password that is valid for only one login or transaction, and it is often valid for only a short period Dongle: physical token inserted into a computer’s USB port

14 User Authentication (continued)
What you are Refers to a biological feature of the user Biometrics: measurement and analysis of a biological feature Fingerprints, retina or iris scans, facial recognition, voice analysis, palm prints

15 User Authentication (continued)
What you do Behavioral biometrics: authentication method identifying measurable patterns in human activities Keystroke dynamics: measures patterns of rhythm and timing that is generated when a person is using the keyboard on a system Wi-Fi triangulation, GPS, IP address resolution

16 User Authentication (continued)
Security Error Rates Concerning Biometric Authentication Potential risks with biometric authentication False acceptance rate (FAR) When the biometric credentials are authorized on invalid characteristics Determined by the ration of the number of false acceptances divided by the number of identification attempts

17 User Authentication (continued)
Security Error Rates Concerning Biometric Authentication False rejection rate (FRR) Denying an authorized biometric credential Determined by the number of false rejections divided by the number of identification attempts Crossover error rate (CER): potion where FAR and FRR are equal

18 User Authentication (continued)
Goodheart-Willcox Publisher

19 Access Levels Mandatory Access Control (MAC)
Security strategy that sets a strict level of access to resources Based on criteria set by the network administrator Used most often with military or supporting organizations Discretionary Access Control (DAC): user can be granted additional rights to data beyond what is allowed by assigned access level

20 Access Levels (continued)
Goodheart-Willcox Publisher

21 Access Levels (continued)
Role-Based Access Control (RBAC): rights are assigned to a role instead of manually to each individual user Rule-based access control: rules are established for various situations, such as allowing users to log in to a network only during specific times

22 Security Options Related to Existing Employees
Businesses can underestimate threats from existing employees Mandatory vacations: users are forced to take vacations where they are not on the premises or using the systems Access to system and premises are removed Allows for a system check by business

23 Security Options Related to Existing Employees (continued)
Job rotation: Users cycle through different roles New user can verify settings, data, and other aspects of the position

24 User Access to Resources
Least privilege: employees have only the privileges needed to perform their job responsibilities Local Computer Access Right: ability to perform a type of action on the computer Permission: deals with the specific abilities within a right or with files and folders

25 User Access to Resources (continued)
Workstation on a Network Active Directory: database of network resources and includes objects such as user and group accounts, computers, servers, and printers Directories are based on LDAP standard Lightweight Directory Access Protocol (LDAP): provides standards and ensures that directories or directory services are constructed and used in the same manner

26 User Access to Resources (continued)
LDAPS: secure form of LDAP, where LDAP is used with SSL to send directory communications encrypted Goodheart-Willcox Publisher; server: Sashkin/Shutterstock.com; laptop: Vtls/Shutterstock.com; tablet: Alexey Boldin/Shutterstock.com; computer: Elnur/Shutterstock.com

27 User Access to Resources (continued)
Tree approach: directories are constructed in a hierarchical manner Organizational units: objects that further organize a database Leaf objects: objects that represent resources, such as users or printers

28 User Access to Resources (continued)
Goodheart-Willcox Publisher; printer: R-O-M-A/Shutterstock.com; computers: Elnur/Shutterstock.com; servers: Sashkin/Shutterstock.com; vector art: Rawpixel.com /Shutterstock.com

29 User Access to Resources (continued)
Kerberos: standard authentication protocol on all versions of Microsoft Server when using the Active Directory Key Distribution Center (KDC): service running on a server that has a copy of the Active Directory to manage the main functions of Authentication Service (AS) exchange and Ticket Granting Service (TGS) exchange

30 User Access to Resources (continued)
Goodheart-Willcox Publisher; guard: IconBunny/Shutterstock.com; user: gst/Shutterstock.com; server: VectorShow/Shutterstock.com

31 User Access to Resources (continued)
Additional Access Levels Single sign-on (SSO): authentication service that allows a user to use one login and password combination to access a set of services Shibboleth: open-source standard that offers single sign-on capabilities Security Assertion Markup Language (SAML): open standard used by parties that allows the exchange of authentication and authorization information

32 User Access to Resources (continued)
Federated identity management (FID) Allows semi-independent systems to work together Goal is to allow users of one system to access resources form another system Transitive trust: occurs when the trust relationship is considered two-way

33 User Access to Resources (continued)
Standalone Computer When a computer is not connected to a network Logon accounts must be stored on that machine Security Account Manager (SAM): local, nonhierarchical database of users and groups on a Windows system Hash: computer value that uniquely identifies data

34 User Access to Resources (continued)
Secondary Logon: allows a user to be logged in as a standard user, but run specific programs as an administrator Password-Protected Screen Savers Simple and effective way to limit access to a local computer Password can also be required when a computer “sleeps”

35 User Access to Resources (continued)
User Rights Policy: set of rules that can automatically control access to resources Local policy: policy management on the local computer Group policies: policies that are configured on the server Locked down: ensures systems are protected from unwanted access Hardening: refers to the process of reducing or eliminating vulnerabilities on a system

36 User Access to Resources (continued)
Attack surface: many areas that could give a hacker access to a system Password policy: provides rules that must be followed when a password is created or changed

37 User Access to Resources (continued)

38 User Access to Resources (continued)

39 User Access to Resources (continued)
User Account Control (UAC) Technology used to govern security by limiting what a standard user is able to do on a system Helps prevent unknown or potentially dangerous settings begin made without the knowledge of the user

40 Section 3.1 Review What is the vulnerability that allows a person to see what a user is entering, such as a password? Shoulder surfing Directories should be based on which protocol to allow use with multiple systems? Lightweight directory access protocol (LDAP) A security technique that requires the user not to be using the computer system is known as what strategy? Mandatory vacation

41 Section 3.1 Review What allows you to log in one time and access multiple services without having to reenter login credentials? Single sign-on (SSO) What system configuration should you set to require administrative credentials for installing software? User account control (UAC)

42 Access to Files and Folders
Section 3.2 Access to Files and Folders

43 Key Terms explicit permissions implicit permissions
inherited permissions New Technology File System (NTFS) permissions share permissions

44 Learning Goals Explain how to set permissions on a shared folder.
Differentiate between share and NTFS permissions.

45 Share Permissions Share permissions: allow user to share folders
Remote connection allows access to files in a shared folder Have no effect on user access when logging in directly at machine Discretionary access control: person who owns the files has the ability to give others permissions to access them

46 Share Permissions (continued)
Sharing a Folder in Windows Sharing must be enabled in the Control Panel User who owns folder has full-control permissions Three permissions: read, change, full control

47 Share Permissions (continued)

48 Share Permissions (continued)
Security Considerations of Sharing Folders Shared folder presents an access point for a hacker or employee Can be used to exploit other system vulnerabilities or provide access to confidential data Shares can be created and hidden

49 NTFS Permissions New Technology File System (NTFS) permissions: allow rights to be set for users on the local machine Secures local access Provides more options for permissions

50 NTFS Permissions (continued)

51 NTFS Permissions (continued)
Receiving Permissions Explicit permissions: those a user is given at a specific location Inherited permissions: those a user receives by default at a lower level Implicit permissions: those a user receives through another object, such as a group

52 NTFS Permissions (continued)
Hierarchy of permission order Explicit deny Explicit allow Inherited deny Inherited allow

53 NTFS Permissions (continued)

54 NTFS Permissions (continued)
Combining NTFS and Share Permissions In many cases, when a folder is shared, permissions are not flexible or granular enough. NTFS permissions are also given to the share. When two permissions combine, more restrictive permission takes precedence

55 NTFS Permissions (continued)
Security Considerations of NTFS Permissions NTFS permissions offer ability to assign very specific permissions to users or groups. A user having permissions for many areas can cause a security risk. Administrators should verify effective permissions.

56 Section 3.2 Review What are the permission options for shared folders?
Read, change, and full control Which NTFS permission allows the ability to rename a file? Modify How can a shared folder be set to hidden? Put a dollar sign ($) at the end of the share name.

57 Section 3.2 Review Permissions received from a higher folder are called what type of permissions? Inherited The net result of all permission assignments results in what a user can do. This is called what type of permission? Effective


Download ppt "Managing User Security"

Similar presentations


Ads by Google