redo 12 Flashcards
A scalable authentication architecture can be developed using
RADIUS
Radius stands for
Remote Authentication Dial-in User Service
Under _____________________, Authentication, Authorization, and Accounting are performed by a separate server
RADIUS
Terminal Access Controller Access Control System Plus (TACACS+)is a similar protocol to RADIUS but designed to be more
flexible and reliable
Where RADIUS is often used to authenticate connections by wireless and VPN users, TACACS+ is often used in authenticating administrative access to
routers and switches.
Most resources in a computer or network environment are protected from unauthorized use by an
Access Control List (ACL)
ACL is basically a list of subjects and the privileges they have on the
object
The following policies enforce the use of ACLs and ensure that they are effective
requireing passwords // change default admin user // change default user paswords // disable guest account // restricting user permissions
On a standalone workstation, password and account policies can be configured via the
Local Security Policy snap-in (secpol.msc) or the Group Policy snap-in (gpedit.msc)
The simple means of doing this is to pressWindows + L
to lock the pc
there are no restrictions on viewing the document.
unclassified
viewing is restricted to the owner organization or to third-parties under a Non-disclosure Agreement (NDA).
classfied
the information is highly sensitive, for viewing only by approved persons within the organization
confidential
the information is too valuable to permit any risk of its capture. Viewing is severely restricted.
secret
this is the highest level of classification.
top secret