Mantraps
• All doors normally locked
• Unlocking one door prevents others from being
unlocked
Token-based
Magnetic swipe card or key fob
Tokens and cards
Guards and access lists
USB locks
• A secondary security option after disabling the
interface
in BIOS and/or operating system
• There’s always a way around security controls
Active Directory
Login script
Organizational Units
• Structure Active Directory
• Can be based on the company
(locations, departments)
Home Folder
Mobile Device Management (MDM)
• Centralized management of
the mobile devices
• Specialized functionality
• Manage access control
• Force screen locks and PINs on these single user
devices
Port security
• Prevent unauthorized users from
connecting to a switch interface
• Alert or disable the port
MAC filtering
• Media Access Control - The “hardware” address
• Easy to find MAC addresses through wireless LAN
analysis
• MAC addresses can be spoofed
• Security through obscurity
Certificate-based authentication
Host-based firewalls
Network-based firewalls
• Filters traffic by port number
• HTTP is 80, SSH is 22
• Next-generation firewalls can
identify the application
User authentication
• Identifier
• Something unique
• In Windows, every account has a Security Identifier
(SID)
Directory permissions
VPN concentrator
• Used with client software - Sometimes built into the OS
Data Loss Prevention (DLP)
• Where’s your data?
• Social Security numbers, credit card numbers,
medical records
Access Control Lists (ACLs)
Email filtering
An antivirus software is kept up to date via
Engine updates
Virus signature updates
Examples of secure network protocols used for establishing VPN connections include
IPsec
TLS