Essay Week 2
I.T.T. Technical Institute
This essay is being submitted on 5/9/2013 for Earl Robinson intorduction to security class.
Essay week 2
* The remote access control policy consists of
* Group membership
* Type of connection
* Time of day
* Authentication methods
* Advanced conditions:
* Access server identity
* Access client phone number or MAC address
* Whether user account dial-in properties are ignored
* Whether unauthenticated access is allowed
After the connection is authorized, remote access policies ...view middle of the document...
Because the wan network is great for going cities to cities or state to state plus there are more security features that can be recommended.
The physical and logical access controls are as follows Authentication
Identification is usually providing a public piece of information (username, account number) and authentication is providing a private piece of information
(PIN number, passphrase, digital signature). Three important characteristics of
the mechanisms that can be used for authentication are as follows:
Subject must prove something he knows Example = password
Subject must prove something he has Example = smart card
Subject must prove something he is Example = fingerprint
If one mechanism providing one of these characteristics is used, it is referred
to as one-factor; if two mechanisms are being used, it is two-factor; and you
guessed it, an authentication process that requires all three is referred to as
three-factor. For the authentication process to be considered strong authentication,
it must be at least two-factor.
Single sign on pros and cons are Pro: users don't have to authenticate as frequently when SSO is configured.
Con: SSO can be a total nightmare to configure.