Free Essay

Is3230 Lab 5 Assessment

In:

Submitted By Dozier97
Words 468
Pages 2
Lab 5 Assessment |

1. They are a. Password b. Token c. Shared secret 2. Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process 3. Remote Access servers, Authentication servers, and Logical IDS 4. Network should be both connected and secured physically and remotely in order to avoid unauthorized access to the system. The three are the computer has authorized access. Computer settings must be in compliance with the security standards, and the user having authorization access. 5. NAC Systems implement network security policy at the network access point relatively than the client (endpoint) operating system. Reliant on the system architecture and configuration, NAC systems can deliver physical port security or logical port/access security. NAC systems necessitate authentication for both the endpoint and user before the network access point forwards traffic for that client 6. PKI refers to a framework of programs, data standards, communication protocols, policies, and cryptographic mechanisms. The PKI infrastructure delivers for the generation, production, spreading, control, accounting and obliteration of public key certificates. PKI offers a selection of facilities containing issuance of digital certificates to individual users and servers, end-user enrollment software, assimilation with certificate directories. 7. Public key or asymmetric cryptography uses a pair of simultaneously generated keys to perform encryption and decryption. The private key is used to encrypt, the public key can be used to decrypt and verify that the sender holds the private key. This process is used for authentication or digital signature, and supports non-repudiation. 8. One of the most important components of PKI is the X.509 formatted public key certificate. This certificate is a data file that binds the identity of an entity to a public key. 9. With biometric access control technology, administrators are the only users that interact with the system beyond the biometric capture device. Therefore, if the administrator unable to verify the identification then the system will authorize the access. 10. The PKI infrastructure delivers for the generation, production, distribution, control, accounting and destruction of public key certificates. PKI provides a variety of services including issuance of digital certificates to individual users and servers, end-user enrollment software, integration with certificate directories, tools for managing, renewing, and revoking certificates using Certificate Revocation Lists (CRLs), and related services and support 11. Category I, II, and III 12. False 13. False 14. True 15. The sturdiest security controls should be at the point closest to the asset. The access control perimeter is the outmost layer that the data owner and/or Security Manager be contingent on to confirm access control for the assets being endangered. Persons inside the access control perimeter are known or trusted to an assured point.

Similar Documents

Free Essay

It Computer

...test√1, Windows Security Features. Chapter 1; Chapter 2. 2, Secure Access Control. Chapter 3. Lab 1; Assignment 1. 3, Windows Encryption. Chapter 4. IS 3340 - Windows Security - ITT Tech Flint Study Resources www.coursehero.com/sitemap/schools/1177-ITT.../1724144-IS3340/ Looking for help with IS 3340 at ITT Tech Flint? Course ... IS 3340 - Windows Security - ITT Tech Flint Study Resources ...... Quality answers or your money back. IS3340 Lab Unit 5 Assignment 1 : WINDOWS SE IS3340 ... www.coursehero.com/file/8721414/IS3340-Lab-Unit-5-Assignment-1/ Jan 26, 2014 - MOST POPULAR MATERIALS FROM WINDOWS SE IS3340. 1 Page ... IS3340 Lab Unit 5 Security Assessment Potential Risk ... Access Security > Ali > Notes > IS4670_15_Syllabus.pdf ... www.studyblue.com/notes/note/n/is4670_15_syllabuspdf/.../9759518 Feb 7, 2014 - Find and study online flashcards from Access Security. ... IS3350 Security Issues in Legal Context IS3230 Access Security IS3340 Windows Security IS3440 .... Don?t assume there is only one correct answer to a question ? You've visited this page 2 times. Last visit: 5/28/14 [DOC] Assignment www.webonthecloud.com/is3340/Assignments.docx This assignment builds on the scenario of Ken 7 Windows Limited, which was ... Provide the answers to the following questions to satisfy the key points of ... IS3340 Windo ws Security STUDENT COPY: Graded Assignment Requirements. [DOC] Syllabus - ITT Tech. www.webonthecloud.com/is3340/Syllabus.docx IS3340. Windows Security...

Words: 287 - Pages: 2

Free Essay

Assessment Questions It

...Lab #3 – Assessment Worksheet Identify & Classify Data for Access Control Requirements Course Name & Number: IS3230 ______________________________________________________________ Student Name: Heather Young ______________________________________________________________________ Instructor Name: MR. Gibbs _____________________________________________________________________ Lab Due Date: Jan. 2014 _______________________________________________________________________ Overview This lab provides the student with the opportunity to develop a data classification standard with procedures and guidelines to classify data access based on the job responsibilities – not an organizational position. In this lab, students aligned a data classification standard with the job function and roles that are required to access specific data. This alignment allows access controls policy definition to be properly implemented throughout the IT infrastructure to mitigate risk from unauthorized access. Lab Assessment Questions & Answers 1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications. Top Secret- highest level of information sensitivity Secret- information that would cause serious damage, most common classification level Confidential- Is the lowest of sensitivity. This information may only be handled by personnel with a clearance, may...

Words: 993 - Pages: 4