Creado por Sangeeta K
hace más de 6 años
|
||
Confidentiality: with Steganography: The practice of hiding data within data. (Protects confidential info)
Integrity provides assurances that data has not been modified, tampered with, or corrupted.
Hashing VERIFIES integrity. If the two hashes are different, data integrity has been lost.
Third element in the CIA triad is: Availability.
Organizations implement Redundancy and Fault Tolerance to ensure high levels of availability for critical systems.
Identification occurs when a user claims an identity such as with a username or email address. Authentication occurs when the user proves the claimed identity (such as with a password) and the credentials are verified. Access Control systems authorize access to resources based on permissions granted to the proven identity.
Something you have:
-Smart Cards (have embedded certificates and Public Key Infrastructure (PKI))
CACs and PIVs (types of smart cards used by DoD and the Feds)
-Tokens or Key Fobs (e.g. token or RSA Secur ID; USB Tokens (include a USB Connector and a Smart Chip: stores a certificate similar to CAC))
AUTHENTICATION SERVICES
1. Kerberos: is a network authentication mechanism used within Windows AD domains and some Unix environments known as realms.
Requirements of Kerberos:
-Uses method of issuing tickets for authentication
* The Key Distribution Center (KDC) and Ticket Granting Tickets (TGT) package user credentials within a ticket
*Time synchronization (Kerberos requires all systems to be synchronized within 5 minutes of each other)
A Database of Subjects or Users (e.g. Active Directory (AD))