Authorization Essay
Authorization Essay

Authorization Essay

Available Only on StudyHippo
  • Pages: 4 (902 words)
  • Published: October 29, 2017
  • Type: Tests
View Entire Sample
Text preview

1. The three primary classes used for individual identification are: a) something you know (e.g. a password), b) something you have (e.g. a certification with associated private key or smart card), and c) something you are (a biometric).

2. Authorization, which occurs after identification and authentication, determines whether an entity is allowed to access a specific asset and dictates the actions they can perform on the system.

3. Three examples of Network Architecture Controls that enforce data access policies at the LAN-to-WAN Domain level include: a) Firewalls - control traffic between trusted and untrusted networks to safeguard network boundaries, b) Access control lists (ACLs) - impose limitations on inbound/outbound connections as well as connections between LAN segments within the site/enclave, c) Logical IDS - network and workstation mechanisms monitoring network traffic to promptly alert for network-based attacks.

4. When physical

...

ly connecting a computer to a network port... (the remainder of the sentence is missing in the original text). What security measures need manual implementation or machine-controlled methods for access control at the Network Port and Data Switch level? Please provide three examples.
a) The measure of Physical Security aims to detect and discourage unauthorized individuals from gaining access.b) Logical Network Port Security is achieved by configuring the web switch to only accept connections from specific MAC addresses. This means that only devices with authorized MAC addresses can access certain network ports.

c) Port Authentication Using 802.1X is a standard for authenticating users or devices on wired or wireless networks. It handles user/device authentication and manages encryption keys.

5. A Network Access Control (NAC) System is a solution for securing both wired and Wi-Fi connections, by identifying potential computer issues before allowin

View entire sample
Join StudyHippo to see entire essay

access to the network. NAC uses protocols to establish and enforce access policies for network nodes during initial connection attempts.

b) One advantage of NAC is its ability to control network access while maintaining security. Depending on a computer's credentials and installed software, a NAC system can grant full access, deny any access, or allow partial access.

The purpose of Public Key Infrastructure (PKI) is to enable secure and private exchange of information and money over an insecure public network like the Internet. This involves using a pair of cryptographic keys – one public key and one private key – obtained from and shared through a trusted authority.

For instance, in large organizations aiming to ensure proper certification distribution across multiple sites, they can collaborate with globally trusted roots such as Cybertrust to deploy their own Certification Authority (CA) on their premises.The text discusses the establishment of a subordinate CA under the Cybertrust root CA. This allows an organization to operate their own local CA using their own equipment. PKI offers security services such as authentication, verification through digital signatures, data integrity through digital signatures, and confidentiality through encryption. The X.509 standard is crucial in PKI as it defines formats for managing public keys within the system including public key certificates, certificate revocation lists, attribute certificates, and certification path validation algorithm.

When discussing biometric access controls, there is a distinction between identification and verification. Identification involves determining an individual's identity by comparing their biometric traits to a database. Verification confirms an individual's claimed identity by comparing their biometric traits to their previously enrolled template.

During the designation procedure, users do not disclose their identity and biometrics are used in a

one-to-many approach. In the confirmation procedure, users declare their identity either by entering a logon name or presenting an identification card before biometrics are used in a one-to-one approach.

To implement Separation of Duties in managing a large organization's PKI Infrastructure, controls must be established to regulate administrative access to a CA while ensuring proper management protocols are followed.Different roles are assigned for different processes, including the CA or PKI Administrator who manages the CA itself, the Certificate Manager who issues and revokes certificates, the Registration Agent who enrolls users for certificates using smart cards, the Key Recovery Manager who retrieves private keys if key archival is used, the EFS Recovery Agent created to retrieve data encrypted with EFS, and the Backup Operator responsible for backing up and restoring data in case of failure. The hearer's responsibility includes examining audit logs to ensure policy compliance. There are three classes of exposure severity codes: CAT I refers to any exposure that immediately results in loss of Confidentiality, Availability, or Integrity; CAT II refers to exposures with potential loss of Confidentiality, Availability, or Integrity; and CAT III encompasses exposures that degrade measures protecting against loss of Confidentiality, Availability, or Integrity.

True or False: Using 802.11i configured with AES encryption and 802.1X authentication services with EAP provides the best solution for high-security WLAN environments.
Answer: True

True or False: Writing down a password and storing it near the computer for easy access is a recommended practice.
Answer: False

True or False: From a security perspective, biometric authentication is best utilized as part of two-factor or three-factor authentication.True Why is performing an asset evaluation or alignment to a data classification standard the initial stage in

designing appropriate security controls from an access control security standpoint? It is essential to have knowledge of the sensitivity, value, and criticality of the data in order to accurately determine who or what ought to be granted access. The categorization of information aids in deciding the suitable fundamental security measures required for safeguarding that particular information.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New