Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
|
|
|
- Miles Franklin
- 10 years ago
- Views:
Transcription
1 Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the authentication models Define authentication servers Describe the different extended authentication protocols Explain how a virtual private network functions Definition of Authentication Authentication can be defined in two contexts: 1) Authentication as it relates to access control 2) A member of one of the three key elements of security: Authentication Authorization Accounting Also known as Triple A (AAA) Authentication and Access Control Terminology Definitions Access Control: The process by which resources or services are granted or denied Identification: The presentation of credentials Authentication: Verification of presented credentials Authorization: Granting permission for admittance Access: The right to use specific resource(s) Authentication, Authorization, and Accounting (AAA) Authentication provides mechanism to identify the user (typically via password) prior to granting access Authorization determines if the user has the authority to carry out certain tasks (defined as process of enforcing policies) Accounting measures the resources a user consumes during each network session Authentication, Authorization, and Accounting (AAA) (cont.) AAA Information uses 1) Find evidence of problems 2) Billing (based on consumed resources) 3) Planning (current utilization vs. future capacity requirements) AAA server
2 1) Dedicated to performing AAA functions 2) Can provide significant advantages in a network Authentication Credentials Types of authentication / authentication credentials: 1) Passwords 2) One-time passwords 3) Standard biometrics 4) Behavioral biometrics 5) Cognitive biometrics One-Time Passwords Standard passwords Static for a set period of time (password reset interval) One-time passwords (OTP) 1) Dynamic generated unique passwords 2) Not reusable 3) Most common type is a time-synchronized OTP Used in conjunction with a token 4) Token and the authentication server use the same algorithm 5) Each seed for each token is unique Time-Synchronized OTP Sequence One-Time Passwords (cont.) There are several variations of OTP systems Challenge-based OTPs 1) Authentication server displays a challenge (a random number) to the user 2) User then enters the challenge number into the token 3) Token generates the password response to challenge number 4) Authentication server compares users response and grants or denies access Standard Biometrics Uses a person s unique characteristics for authentication (something the are ) 1) Examples: fingerprints, faces, hands, irises, retinas Fingerprint Scanner Types: 1) Static 2) Dynamic Disadvantages 1) Costs 2) Potential False Positives (errors) Standard Biometrics (cont.) Behavioral Biometrics
3 Authenticates by normal actions that the user performs 3 types of Behavioral Biometrics Keystroke Dynamics Voice Recognition Computer Footprinting Behavioral Biometrics Keystroke dynamics 1) Attempt to recognize a user s unique typing rhythm 2) Uses two unique typing variables: Dwell time Flight time Behavioral Biometrics (cont.) Voice recognition 1) Authenticate user based on the unique characteristics of a person s voice 2) Phonetic cadence Speaking two words together in a way that one word bleeds into the next word Becomes part of each user s speech pattern Computer footprint 1) When and from where a user normally accesses a system Cognitive Biometrics Related to the perception, thought process, and understanding of the user Considered to be much easier for the user to remember because it is based on the user s life experiences Examples: 1) Life experiences that the user remembers 2) User must identify specific faces from their life experiences Authentication Models Single and multi-factor authentication 1) One-factor authentication Using only one authentication credential 2) Two-factor authentication Enhances security, particularly if different types of authentication methods are used 3) Three-factor authentication Requires that a user present three different types of authentication credentials
4 Authentication Models (cont.) Single sign-on 1) Identity management Using a single authenticated ID to be shared across multiple networks 2) Federated Identity Management (FIM) When those networks are owned by different organizations 3) One application of FIM is called single sign-on (SSO) Using one authentication to access multiple accounts, applications, or directory services controlled by one or more groups Authentication Models (cont.) Windows Live ID 1) Introduced in 1999 as.net Passport 2) User to create a standard username and password 3) Requires web site to support Windows Live ID User will first be redirected to the nearest authentication server 4) Once authenticated, the user is given an encrypted time-limited global cookie Authentication Models (cont.) Windows CardSpace 1) Windows feature intended to provide users with control of their digital identities 2) Helps to manage privacy 3) Creates Virtual Business Card for exchange with other users 4) Types of Cards Manage cards Site Specific Personal cards General purpose information cards 5) Identities downloaded and verified by Identity Providers 6) Authentication Models (cont.) Authentication Models (cont.) OpenID 1) Decentralized open source federated identity 2) No unique software installed on client 3) A URL based identity system An OpenID identity is only a URL backed up by a username and password OpenID provides a means to prove that the user owns that specific URL Currently used by: 1) Facebook, twitter, Google Single or Multi-Factor Authentication methods Single Sign On (SSO)
5 1) Supports multiple resources, providers, directories 2) Federated Identity Management (FIM) supports multiple directory owners Windows Live provides a time-limited global cookie 1) OpenID provides decentralized open source federated identity without unique client software 2) Authentication Servers Network Authentication is perform by a dedicated AAA or authentication server Most common types of servers are: 1) RADIUS 2) Kerberos 3) TACACS+ 4) Lightweight Directory Access Protocol (LDAP) RADIUS RADIUS (Remote Authentication Dial in User Service) 1) Developed in ) Industry standard with widespread support 3) Suitable for high-volume service control applications 4) Provides centralized AAA management 802.1x port security has caused increased demand for RADIUS use RADIUS (cont.) RADIUS Client: Typically a device such as a dial-up server or wireless access point (AP) 1) Responsible for sending user credentials and connection parameters in the form of a RADIUS message to a RADIUS server 2) Sends accounting messages to RADIUS server RADIUS Server: Authenticates and authorizes the RADIUS client request 1) Sends back a RADIUS response message RADIUS (Cont.) Kerberos Kerberos 1) Authentication system developed by MIT 2) Deployed in Enterprises, requires back-end and client infrastructure support 3) Used to verify the identity of networked users 4) Provides encryption & authentication services 5) Identifies authorized subject, roles, and resources 6) Issues a ticket (software certificate) valid for a specified period of time 7) Supported by Windows W2K3 >, Mac OS X, and Linux 8) Kerberos
6 Process: 1) Users authenticates to network 2) User is provided a ticket that is issued by the Kerberos authentication server 3) The user presents this ticket to the network for each service or resource accessed 4) The service then examines the ticket to verify identity of the user (subject) 5) Validate subjects access rights to resource Terminal Access Control Access Control System (TACACS+) Terminal Access Control Access Control System (TACACS+) 1) Industry standard protocol specification 2) Forwards username and password information to a centralized server Can be either a centralized server or TACACS+ database 1) Supports Linux or UNIX password file with TACACS protocol support 2) Used by CISCO and other vender implementations for centralized network hardware authentication services Lightweight Directory Access Protocol (LDAP) Directory service 1) A database stored on the network itself that contains information about users, devices, and permissions 2) Supported in Windows Server, MAC, Linux, and Unix X.500 1) A standard for directory services 2) Created by ISO White-pages service 1) Capability to look up information by name Yellow-pages service 1) Browse and search for information by category Lightweight Directory Access Protocol (LDAP) (cont.) The information is held in a directory information base (DIB) Entries arranged in a tree structure called the directory information tree (DIT) Directory Access Protocol (DAP) 1) Protocol for a client application to access an X.500 directory 2) DAP is too large to run on a personal computer Lightweight Directory Access Protocol (LDAP) (cont.)
7 Lightweight Directory Access Protocol (LDAP) 1) Sometimes called X.500 Lite 2) A simpler subset of DAP Primary differences 1) LDAP was designed to run over TCP/IP 2) LDAP has simpler functions 3) LDAP encodes its protocol elements in a less complex way than X.500 LDAP is an open protocol Most Common Types of Authentication Servers: 1) RADIUS: Authenticates clients, provides connection parameters, sends accounting messages 2) Kerberos: Issues ticket with specified permissions; ticket has limited lifetime; requires back-end infrastructure to implement; supported by most mainstream OS s 3) TACACS+: Leverages Linux / Unix / and network infrastructure access databases 4) Lightweight Directory Access Protocol (LDAP): Uses tree database structure; open source; provides client data lookup capabilities 5) Extended Authentication Protocols (EAP) Extensible Authentication Protocol (EAP) 6) Management protocol of IEEE 802.1x that governs the interaction between the system, authenticator, and RADIUS server 7) An envelope that can carry many different kinds of exchange data used for authentication EAP s Three protocols categories: 1) Authentication legacy protocols 2) EAP weak protocols 3) EAP strong protocols Extended Authentication Protocols Authentication Legacy Protocols No longer extensively used for authentication Three legacy protocols: 1) Password Authentication Protocol (PAP) 2) Challenge-Handshake Authentication Protocol (CHAP) 3) Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP) Instructors Note: Still covered on the Certification Test EAP Weak Protocols Still used but have security vulnerabilities EAP Weak protocols: 1) Extended Authentication Protocol MD5 (EAP-MD5)
8 Not suitable for wifi authentication Should only be used in low-risk wired environments 2) Lightweight EAP (LEAP) Used in CISCO Wifi authentication environments Subject to Dictionary attacks EAP Strong Protocols EAP Strong protocols include: 1) EAP with Transport Layer Security (EAP-TLS) Uses PKI Certificates Uses encrypted tunneling for authentication communication Resistant to dictionary attacks 2) EAP with Tunneled TLS (EAP-TTLS) and Protected EAP (PEAP) Uses Windows authentication credentials for authentication More flexible than EAP-TLS Remote Authentication and Security Important to maintain strong security for remote communications 1) Transmissions are routed through networks or devices that the organization does not manage and secure Managing remote authentication and security usually includes: 1) Using remote access services 2) Installing a virtual private network 3) Maintaining a consistent remote access policy Remote Access Services (RAS) 1) Combination of hardware and software that enables remote users access to a local internal network from an off-lan location 2) Provides remote users with the same access and functionality as local users Virtual private network (VPN) 1) One of the most common types of RAS 2) Uses an unsecured public network, (e.g. Internet), to create a tunnel 3) Connects remote client to internal network as if plugged in to the LAN directly 4) Encrypts all data that is transmitted between the remote device and the network 5) Hardware or software based Common types of VPNs 1) Remote-access VPN or virtual private dial-up network (VPDN)
9 2) Site-to-site VPN Virtual Private Networks (VPNs) (cont.) Transmissions are achieved through communicating with endpoints Endpoint 1) End of the tunnel between VPN devices VPN concentrator 1) Aggregates hundreds or thousands of multiple connections Depending upon the type of endpoint client software may be required Virtual Private Networks (VPNs) (continued) Hardware vs. Software VPN s 1) Software-based VPNs: Most flexibility in how network traffic is managed 2) Hardware-based VPNs: Generally tunnel all traffic they handle regardless of the protocol 3) Better performance than software-based solutions Virtual Private Networks (VPNs) (cont.) Advantages: 1) Cost savings 2) Scalability 3) Full protection 4) Speed 5) Transparency 6) Authentication 7) Industry standards Remote Access Policies Establishing strong remote access policies is important Remote Access Policy Recommendations: 1) Should be consistent for all users 2) Responsibility of the IT department 3) Empower a working group to create standards that all departments will agree to Summary Access control: Process by resources or services are denied or granted There are three types of authentication methods Authentication credentials can be combined to provide extended security Authentication can be provided on a network by a dedicated AAA or authentication server The management protocol of IEEE 802.1x that governs the interaction between the system, authenticator, and RADIUS server is known as the Extensible Authentication Protocol (EAP)
10 Organizations need to provide avenues for remote users to access corporate resources as if they were sitting at a desk in the office
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Authentication. Authentication in FortiOS. Single Sign-On (SSO)
Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication
Cisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Extensible Authentication Protocol (EAP) Security Issues
Sotillo ECU 1 Extensible Authentication Protocol (EAP) Security Issues Samuel Sotillo, Dept. of Technology Systems, East Carolina University Abstract This document describes the Extensible Authentication
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)
Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual
Cisco Virtual Office Flexibility and Productivity for the Remote Workforce
Cisco Virtual Office Flexibility and Productivity for the Remote Workforce Cisco Virtual Office Overview Q. What is the Cisco Virtual Office? A. The Cisco Virtual Office solution provides secure, rich
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
Network Security and AAA
ICT Technical Update Module Network Security and AAA Prof. Dr Harsha Sirisena Electrical and Computer Engineering University of Canterbury AAA Introduction Overview A network administrator may allow remote
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
Network Security 1. Module 4 Trust and Identity Technology. Ola Lundh 070 69 86596 [email protected]
Network Security 1 Module 4 Trust and Identity Technology Module 1 Trust and Identity Technology 4.1 AAA AAA Model Network Security Architecture Authentication Who are you? I am user student and my password
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
Network Security 1 Module 4 Trust and Identity Technology
Network Security 1 Module 4 Trust and Identity Technology 1 Learning Objectives 4.1 AAA 4.2 Authentication Technologies 4.3 Identity Based Networking Services (IBNS) 4.4 Network Admission Control (NAC)
Domain 6.0: Network Security
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 6.0: Network Security Chapter 6 6.1 Explain the function of hardware and software security devices Network based firewall, Host based firewall
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
The Importance of Wireless Security
The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN Daniel Schwarz Overview: 1. Introduction I. PKIX 2. Basics I. PPP II. EAP III. 802.1x IV. X.509 certificate extensions
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
Deploying iphone and ipad Virtual Private Networks
Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.
ViSolve Open Source Solutions
ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs
Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:
Configuring and Troubleshooting Routing and Remote Access 6-1 Module 6 Configuring and Troubleshooting Routing and Remote Access Contents: Lesson 1: Configuring Network Access 6-3 Lesson 2: Configuring
Securing Wireless LANs with LDAP
A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise
Michael Disabato Service Director Network & Telecom Strategies [email protected] Diana Kelley Senior Analyst Security & Risk Management Strategies [email protected] www.burtongroup.com WiFi
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly
Securing Internet Facing Applications Ten years ago protecting the corporate network meant deploying traditional firewalls and intrusion detection solutions at the perimeter of the trusted network in order
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Product Summary RADIUS Servers
Configuration Guide for Cisco Secure ACS with 802.1x Authentication for Avaya 3631 Wireless Telephone This document details how to configure the Cisco Secure ACS (Access Control Server) v3.3 with 802.1x
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
ClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS
January 2003 January WHITE 2003 PAPER WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS With the increasing deployment of 802.11 (or Wi-Fi) wireless networks in business environments, IT organizations are
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY Much attention has been focused recently on the security aspects of existing Wi-Fi (IEEE 802.11) wireless LAN systems. The rapid growth and deployment of these systems into a
802.1x in the Enterprise Network
802.1x in the Enterprise Network Harrison Forest ICTN 6823 Abstract: This paper aims to provide a general over view of 802.1x authentication and its growing importance on enterprise networks today. It
2 factor + 2. Authentication. way
2 factor + 2 way Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5
RAD-Series RADIUS Server Version 7.1
RAD-Series RADIUS Server Version 7.1 Highly Customizable RADIUS Server for Controlling Access & Security in Wireless & Wired Networks Interlink Networks RAD-Series Authentication Authorization, and Accounting
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius is... Multiple protocoles : RADIUS, EAP... An Open-Source
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Cisco Secure Access Control Server Deployment Guide
Cisco Secure Access Control Server Deployment Guide 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 58 Contents Introduction... 4 Cisco Secure ACS...
Scenario: IPsec Remote-Access VPN Configuration
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard
Allied Telesis White Paper 802.1x White Paper Executive Summary Security and flexibility are often seen as mutually exclusive requirements in a network, yet both are equally important. Security is crucial
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Secure PostgreSQL Deployments
Secure PostgreSQL Deployments pgcon.br 2009 Campinas, Brazil Magnus Hagander Redpill Linpro AB There's much to security Identify the threats Apply the correct measures Don't do things just because you
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
Chapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2006/2007 10.1 Scope of Link Layer Security Protocols
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
Modern Multi-factor and Remote Access Technologies
Modern Multi-factor and Remote Access Technologies ANDREW BRICKEY Senior IT Engineer Identity and Access Management / Core Computing Services NLIT Summit 2016 May 11, 2016 1 Agenda Problem and solution
Defender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Authentication: Password Madness
Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Sophos UTM. Remote Access via IPsec. Configuring UTM and Client
Sophos UTM Remote Access via IPsec Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Defender EAP Agent Installation and Configuration Guide
Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections
WLAN Security: Identifying Client and AP Security
WLAN Security: Identifying Client and AP Security 2010 Cisco Systems, Inc. All rights reserved. CUWN v7.0 4-1 Lesson Overview & Objectives Overview This lesson provides detailed discussions on the Cisco
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition
The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition Find out what organizations need to know to compare two-factor vendors and check
Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
AAA & Captive Portal Cloud Service TM and Virtual Appliance
AAA & Captive Portal Cloud Service TM and Virtual Appliance Administrator Manual Revision 28 August, 2013 Copyright, Cloudessa, Inc. All rights reserved To receive technical assistance with your Cloudessa
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
