2.2 - Explain logical security concepts Flashcards
Active directory
AD Itself is a domain controller, there are two types of domains, Local accounts and Domain accounts.
It is used to manage users and groups and computer accounts in a windows domain, has different policies like security, password etc.
Users must authenticate on the network to gain access.
Where are AD Local Accounts stored?
They are stored in the Local Security Accounts database known as the Security Account Manager (SAM) HKEY_LOCAL_MACHINE
in the Windows registry
• Active Directory
Active Directory • (provides the basis of authentication for users and computers.) Centralized management
• Windows Domain Services • Limits and control access
AD- Login script
Login script • Map network drives • Update security software signatures • Update application software
AD- Domain
Active Directory • Centralized management • Windows Domain Services • Limit and control access
AD- Group Policy/Updates
• Group Policy/Updates • Define specific policies • Password complexity • Login restrictions
AD- Organizational Units
- Organizational Units
- Structure Active Directory
- Can be based on the company (locations, departments)
AD- Home Folder
• Home Folder • Assign a network share as the user’s home • \server1\users\professormesser
AD- Folder redirection
- Folder redirection • Instead of a local folder, redirect to the server • Store the Documents folder on \server1 \my documents
- Access files from anywhere
• Software tokens
A means for assisting authentication, like Single-Sign On (SSO). When used correctly AND securely, it allows the token to act as the user instead of the user authenticating multiple times.
When abused or taken advantage of, Software Tokens can be used for “replay attacks”
• MDM policies for Mobile Device Management (MDM)
- Set policies on apps, data, camera, etc. • Control the remote device
- The entire device or a “partition”
- Manage access control
- Force screen locks and PINs on these single user devices
Used to Manage company-owned and user-owned devices
• BYOD - Bring Your Own Device • Centralized management of the mobile devices • Specialized functionality
• Port security
Port security • Prevent unauthorized users from connecting to a switch interface
- Alert or disable the port • Based on the source MAC address
- Even if forwarded from elsewhere • Each port has its own configuration on the switch
- Unique rules for every port
• MAC address filtering
Media Access Control - The “hardware” address • Limit access through the physical hardware address
- Keeps the neighbors out • Additional administration with visitors
- It’s Easy to find the MAC addresses on my network through wireless LAN analysis
- MAC addresses can be spoofed • Security through obscurity
• Certificates
• IEEE 802.1X • Gain access to the network using a certificate • On-device storage or separate physical device
Certificate-based authentication • Smart card • Private key is on the card • PIV (Personal Identity Verification) card
- US Federal Government smart card • has a photo, and ID Info
- CAC (Common Access Card) • US Department of Defense smart card • has a photo, and ID Info
• Antivirus/Anti-malware
- Anti-malware software runs on the computer • Each device manages its own protection, This type of software includes: Routines and signatures to detect and block Trojans Rootkits Ransomware Spyware
- Large organizations need enterprise management • Track updates, push updates, confirm updates, manage engine updates • Mobility adds to the challenge • Updates must be completed on all devices
- This becomes a scaling issue