ch 9 Physical Security and Authentication Flashcards
identidty
n ID card.
Authentication
required to gain access to a secure area of the building or to
gain access to secure data. A
ways to authenticate
Something the user knows: Such as a password or pin
■ Something the user has: Such as a smart card or ID card
■ Something the user does: Such as a signature or gesture
■ Something the user is: Such as a thumbprint or retina scan or other biometric
■ Somewhere the user is: Such as “at work,” “at the home office,” or “on the
road”
802.1X is
that defines port-based network access control
encapsulated within messages.
components to an 802.1X connection:
Supplicant: A software client running on a workstation. This is also known as
an authentication agent.
■ Authenticator: A wireless access point or switch.
■ Authentication server: An authentication database, most likely a RADIUS
(LDAP)
application layer
protocol used for accessing and modifying directory services data (TCP iP )
Kerberos
PROVE IDENTIY TO PPL
RAS authentication. ex CHAP
one way encryption for dial up.(Eap too )
vpn
devices not on the same private network.
point to point (1723)
security mechanisms,
and no additional software or protocols
layer 2 l2tp (1701)
more secure and used b/c inclusion of IPsec