Ch12 - Security Management - S ecur ityManagement Chapter12

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Security Management Security+ Guide to Network Security Fundamentals  Second Edition Chapter 12
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Define identity management Harden systems through privilege management Plan for change management Define digital rights management Acquire effective training and education
Background image of page 2
3 Understanding Identity Management Identity management attempts to address problems and security  vulnerabilities associated with users identifying and authenticating  themselves across multiple accounts Solution may be found in identity management A user’s single authenticated ID is shared across multiple  networks or online businesses Four key elements: Single sign-on (SSO)  Password synchronization Password resets Access management
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Understanding Identity Management  (continued)
Background image of page 4
5 Understanding Identity Management  (continued) SSO allows user to log on one time to a network or system and access  multiple applications and systems based on that single password Password synchronization also permits a user to use a single  password to log on to multiple servers Instead of keeping a repository of user credentials, password  synchronization ensures the password is the same for every  application to which a user logs on Password resets reduce costs associated with password-related help  desk calls Identity management systems let users reset their own passwords  and unlock their accounts without relying on the help desk
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Understanding Identity Management  (continued) Access management software controls who can access the network  while managing the content and business that users can perform  while online.
Background image of page 6
7 Hardening Systems Through  Privilege Management Privilege management attempts to simplify assigning and  revoking access control (privileges) to users
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Responsibility Responsibility can be centralized or decentralized Consider a chain of fast-food restaurants Each location could have complete autonomy it can decide  whom to hire, when to open, how much to pay employees,  and what brand of condiments to use This decentralized approach has several advantages,  including flexibility A national headquarters tells each restaurant exactly what to  sell, what time to close, and what uniforms to wear  (centralized approach)
Background image of page 8
9 Responsibility (continued) Responsibility for privilege management can likewise be either  centralized or decentralized
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2010 for the course NETWORK SE Security + taught by Professor None during the Three '10 term at University of Sydney.

Page1 / 33

Ch12 - Security Management - S ecur ityManagement Chapter12

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online