Non-physical measures implemented to protect digital data, restrict unauthorized access, and ensure data integrity and confidentiality
Logical Security
Security process that provides identification, authentication, and authorization mechanisms for users and computers
Identity and Access Management (IAM)
Supports the identities of various assets by defining the resources an asset has permission to access based on the function the asset fulfills | Servers, people & endpoints
Roles
authenticates or proves an identity using more them one method | Something you know, something you have, something you are, something you do, somewhere you are
Multifactor Authentication
Guesses the password by attempting to check every single word or phrase contained within a word list, called a dictionary
Dictionary Attack
Tries every possible combination until the password is figured out
Brute Force Attack
Combination of dictionary and brute force attacks
Hybrid Attack
Something you know - Knowledge - Usernames, passwords, PINs, personal question answers
Something you have - Possession - Smartcards, RSA key fobs, RFID tags
Something you are - Inherence - Fingerprints, retina scans, voice prints
Something you do - Action - How you sign your name, how you draw a pattern, how you say a catchphrase
Somewhere you are - Location - Geotagging, geofencing
The process of determining whether someone or something is who or what it claims itself to be
Authentication
A database that is used to centralize information about the clients and the objects on the network
Lightweight Directory Access Protocol (LDAP)
LDAP - Port 389
LDAP Secure - Port 636
Organizes and manages everything on the network, including clients, servers, devices, and users
Active Directory (AD)
Focused on authentication and authorization within a Windows domain environment
Kerberos
The domain controller keeps port 88 open to receive service login requests from clients when using Kerberos
In an SSO system, users can have a single strong password or utilize multi-factor authentication
An XML-based data format that is used to exchange authentication information between a client and a service | Service provider, user agent & identity provider
Security Assertion Markup Language (SAML)
Provides centralized administration of dial-up,VPN, and wireless authentication, so it can be used with both 802.1x and the Extensible Authentication Protocol (EAP)
Remote Authentication Dial-In User Service (RADISU)
RADISU Authentication messages - port 1812
RADISU Accounting messages - Port 1813
Was developed by Cisco and it can perform the role of an authenticator in an 802.1x network | Used for authentication, authorization, accounting and security features
Terminal Access Controller Access Controller System Plus (TACACS+)
TACACS+ - Support all protocols
RADIUS - Doesn’t support all protocols
Security mechanism that generates a temporary, dynamic password or token that is valid only for a short period | Time-based authentication significantly enhances security
Time-Based Authentication / (TOTP)
Using the lowest level of permissions or privileges needed in order to complete a job function or admin task
Least Privilege
An access control method where access is determined by the owner of the resource
Discretionary Access Control (DAC)
Drawbacks of DAC:
Every object in a system has to have an owner
Each owner must determine the access rights and permissions for each object