Ch 6 - Security Technology-Firewalls and VPNs Flashcards
Story Time
Beg. Chapter
Kelvin Urich - scheduled to present a plan to Charlie Moody and the IT planning staff in 2 weeks on the Internet connection architecture
W/O this they cannot start costing the project or planning for deployment
Laverne Nguyen (architecture team) - No consensus on 2 design alternatives presented by the consultant:
- Screened subnet with bastion hosts
- Screened subnet with proxy servers
Miller Harrison (contractor brought in to help with the project) - seems to be in disagreement and pouting.
Ends with Kelvin calling for a meeting the next day with the consultant to make the decision
Learning Objectives
- Recognize the important role of access control in computerized information systems, and identify and discuss commonly used authentication factors
- Describe firewall technology and the various approaches to its implementation
- Identify the various approaches to control remote and dial-up access by means of the authentication and authorization of users
- Discuss content filtering technology
- Describe the technology that enables the use of VPNs (virtual private networks).
Access Control
is the method by which systems determine whether and how to admit a user into a trusted area of the organization.
Restricted areas could be: computer room
How is access control achieved? via a combination of policies, programs, and technologies
ACs can be: mandatory, non-discretionary or discretionary
Mandatory access controls (MACs)
use data classification schemes, giving users and data owners limited controls over access to information resources.
How does a data classification scheme work?
Information is rated by sensitivity and each user is assigned the level of information that they may access
Lattice-based access control
a form of access control where users are assigned a matrix of authorizations for particular areas of access.
It relies on:
Access Control List (ACL) - column of attributes of a particular object (i.e. printer)
Capabilities Table - a row of attributes associated with a particular subject
Nondiscretionary Controls
strictly enforced version of MACs that are managed by a central authority in the organization.
Can be role-based controls or task-based controls
Discretionary access controls (DACs)
implemented at the discretion or option of the data user.
Authentication
process of validating a supplicant’s purported identity
3 Widely used authentication mechanisms/factors:
- Something the supplicant knows
- Something a supplicant has
- Something a supplicant is
Something a supplicant knows?
- password
- passphrase
Something a supplicant has?
- dumb cards - atm
- smart cards
- synchronous tokens
- asynchronous tokens
Something a supplicant is or can produce
- Fingerprints, palm prints, hand topography
- iris scans, voice patterns
- signatures
biometrics
authorization
the matching of an authenticated entity to a list of information assets and corresponding access levels
accountability or auditability
ensures all actions on a system authorized or otherwise can be attributed to an authenticated identity
Firewalls
prevents specific types of information from moving between the outside world, known as the untrusted network, and the inside world, known as the trusted network.
Firewalls can be categorized by:
processing mode,
development,
or structure