Preview

Lab 7 & 8

Powerful Essays
Open Document
Open Document
1094 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 7 & 8
Week 4 Lab Part 1: Design a Multi-factor Authentication Process
Assessment Worksheet
Design a Multi-factor Authentication Process
Lab Assessment Questions & Answers

1. In an Internet Banking Financial Institution is Single Factor Authentication acceptable? Why or why not?

Yes it can be acceptable because you can buff up security elsewhere.

2. Explain the difference between Positive Verification and Negative Verification?

Negative verification is the opposite of positive verification. The customer must contact the bank to verify that the information is correct.

3. What vulnerabilities are introduced by implementing a Remote Access Server?

Could Allow Remote Code Execution, two heap overflow, cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user.

4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service?

Using multi-factor authentication.

5. Name at least 3 remote access protections or security controls that must be in place to provide secure remote access.

Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.

6. When dealing with RADIUS and TACACS+ for authentication methods, what protocols are used at Layer 4 for each of these techniques?

UDP for RADIUS and TCP for TACACS+

7. In TACACS+ communications, what part of the packet gets encrypted and which part is clear text?

MD5 for encryption and XOR for clear text

8. In RADIUS authentication, what is the purpose of the “Authenticator”?

To provide a modest bit of security.

9. Which of these two, RADIUS and TACACS+, combines both authentication and authorization?

RADIUS

10. Is combining authentication and authorization a less or more robust way of handling authentication?

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    3. An AUP is part of a layered approach to security, and it supports confidentiality. What else supports confidentiality?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control?…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    1. What are the three fundamental elements of an effective access control solution for information systems?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    9 True or False: Access control is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Finance Questions

    • 600 Words
    • 2 Pages

    7. For each of the seven domains of a typical IT infrastructure, what process or procedures would you perform to obtain information about security controls and safeguards?…

    • 600 Words
    • 2 Pages
    Good Essays
  • Good Essays

    a). According to the information in the case, do you think the bank satisfied the requirement to two-factor authentication?…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    [28] T. Pandey, B. Singh, ”Authentication and Billing Framework for Service Oriented Architectures in various fields”, 4th International Conference on Systems, 2009.…

    • 5601 Words
    • 23 Pages
    Good Essays
  • Satisfactory Essays

    centralized control of authentication and security policies on Windows systems and form the foundation for…

    • 305 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    We Do Have

    • 8454 Words
    • 34 Pages

    The ability to verify a user’s identity, typically referred to as authentication, has become an essential basis for trust in business relationships. Authentication establishes trust by proving the identity of a participant in any communication, or in the case of conducting electronic business, any transaction. Simply put, authentication solutions within the enterprise environment are designed to ensure that a person is who he/she claims to be. Authentication solutions are typically used as the basis for critical…

    • 8454 Words
    • 34 Pages
    Better Essays
  • Powerful Essays

    An increasing number of internet-based end-customer applications require two-factor authentication. Text message (SMS) based one-time code distribution (as second factor) is rapidly becoming the most popular choice when strong authentication is needed, for example in e-banking. Low acquisition, distribution and help-desk cost are the main drivers for these socalled mTAN1 based authentication methods. All of these properties are particularly important for applications that serve large number of users, possibly on a global scale. With multi-factor authentication, each token available for authenticating the user falls into one of the following three categories: • • • Something the user knows (e.g. a password) Something the user has (e.g. a hardware token) Something the user is (e.g. a fingerprint)…

    • 2311 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Trusted Authority (TA): TA takes the responsibility of providing authentication of the users, manage and store the keys for encrypt and decrypt the message shared amongst the VANET users. It is also responsible for registering the users and storing their information that is used later to authenticate them by verifying the stored credentials.…

    • 1582 Words
    • 7 Pages
    Good Essays
  • Better Essays

    What is authentication

    • 1235 Words
    • 5 Pages

    “An authentication server is an application that facilitates authentication of an entity that attempts to access a network. Such an entity may be a human user or another server. An authentication server can reside in a dedicated computer, an Ethernet switch, an access point or a network access server. When a potential subscriber accesses an authentication server, a username and password may be the only identifying data required. In a more sophisticated system called Kerberos, the subscriber must request and receive an encrypted security token that can be used to access a particular service. RADIUS (Remote Authentication Dial-In User Service) is a commonly used authentication method. TACACS+ (Terminal Access Controller Access Control System Plus) is similar to RADIUS but is used with Unix networks. RADIUS employs UDP (User Datagram Protocol) and TACACS+ employs TCP (Transmission Control Protocol.Some specialized authentication servers employ smart cards or biometric verification in addition to one or more of the above mentioned technologies “ (Margaret Rouse July 2007)…

    • 1235 Words
    • 5 Pages
    Better Essays