9781111640125_IM_ch10

Security+ Guide to Network Security Fundamentals

  • Notes
  • 9
  • 100% (2) 2 out of 2 people found this document helpful

This preview shows page 6 - 9 out of 9 pages.

2. Note that OAuth permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site. 3. Explain that OAuth relies on token credentials. Account Management 1. Note that managing the passwords in user accounts can be accomplished by setting restrictions regarding the creation and use of passwords.
Image of page 6

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 10-7 2. Discuss the six common domain password policy settings, which are called password setting objects. 3. Refer to Table 10-2 to discuss the password policy settings for Windows Group Policy. 4. Discuss the Account Lockout Policy, which is an Active Directory Domain Services (AD DS) security feature. 5. Refer to Table 10-3 for a list of the account lockout policy settings in Windows Active Directory. Trusted Operating Systems 1. Discuss the security issues surrounding authentication and account management can be a reflection of the security issues of the operating system itself. 2. Remind that today’s operating systems have roots dating back 20 or more years, well before security was identified as a critical process. 3. Discuss the basic flaws that operating systems can have: a. Operating systems are complex programs with millions of lines of code that make vulnerabilities extremely difficult to recognize. b. Operating systems do not isolate applications from each another, so one application that is compromised can impact the entire computer. c. Operating systems lack a facility for applications to authenticate themselves to each other. d. Operating systems cannot create a trusted path between users and applications, so a user cannot know if the application he is using is legitimate or is only one that is impersonating an application. e. Operating systems by default do not use the principle of least privilege. 4. Explain that a trusted OS can keep attackers from accessing and controlling critical parts of a computer system. 5. Note that it can also prevent administrators from inadvertently making harmful changes. 6. Explain that today, vendors developing trusted OSs are focusing on securing not only OS components but also other platform elements. Teaching Tip Explain to students that although it is convenient, single sign-on trades convenience for security. Should an implementation use stronger underlying authentication rules (longer passwords or shorter expirations), the end-user is now at the mercy of the single sign-on system because they are likely not going to know the underlying passwords.
Image of page 7
Security+ Guide to Network Security Fundamentals, Fourth Edition 10-8 Quick Quiz 2 1. True or False: Windows Live ID was originally introduced by Microsoft in 1999 as .NET Passport. Answer: True 2. ____ is a decentralized open source FIM that does not require specific software to be installed on the desktop. Answer: OpenID 3. Operating systems that have been reengineered so that they are designed to be secure from the ground up are known as ____ operating systems. Answer: trusted Class Discussion Topics 1. Discuss with students the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, have students research how certain systems integrate with the identity system at your institution.
Image of page 8

Subscribe to view the full document.

Image of page 9
You've reached the end of this preview.
  • '
  • NoProfessor
  • Identity Management, Network Security Fundamentals, OpenID, Security+ Guide

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern