{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Ch12 - Security Management - S ecur ityManagement Chapter12...

Info icon This preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Security Management Security+ Guide to Network Security Fundamentals  Second Edition Chapter 12
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 Objectives Define identity management Harden systems through privilege management Plan for change management Define digital rights management Acquire effective training and education
Image of page 2
3 Understanding Identity Management Identity management attempts to address problems and security  vulnerabilities associated with users identifying and authenticating  themselves across multiple accounts Solution may be found in identity management A user’s single authenticated ID is shared across multiple  networks or online businesses Four key elements: Single sign-on (SSO)  Password synchronization Password resets Access management
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
4 Understanding Identity Management  (continued)
Image of page 4
5 Understanding Identity Management  (continued) SSO allows user to log on one time to a network or system and access  multiple applications and systems based on that single password Password synchronization also permits a user to use a single  password to log on to multiple servers Instead of keeping a repository of user credentials, password  synchronization ensures the password is the same for every  application to which a user logs on Password resets reduce costs associated with password-related help  desk calls Identity management systems let users reset their own passwords  and unlock their accounts without relying on the help desk
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
6 Understanding Identity Management  (continued) Access management software controls who can access the network  while managing the content and business that users can perform  while online.
Image of page 6
7 Hardening Systems Through  Privilege Management Privilege management attempts to simplify assigning and  revoking access control (privileges) to users
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
8 Responsibility Responsibility can be centralized or decentralized Consider a chain of fast-food restaurants Each location could have complete autonomy it can decide  whom to hire, when to open, how much to pay employees,  and what brand of condiments to use This decentralized approach has several advantages,  including flexibility A national headquarters tells each restaurant exactly what to  sell, what time to close, and what uniforms to wear  (centralized approach)
Image of page 8
9 Responsibility (continued) Responsibility for privilege management can likewise be either  centralized or decentralized
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern