Access Control Lab #7

Submitted by: Submitted by

Views: 136

Words: 314

Pages: 2

Category: Science and Technology

Date Submitted: 05/10/2014 01:27 PM

Report This Essay

Andrew Timmons

Access Control Lab #7

1) Single Factor Authentication is not acceptable for online Internet Banking. Financial institutions offering Internet-based products and services to their customers should use effective methods to authenticate the identity of customers using those products and services. The authentication techniques employed by the financial institution should be appropriate to the risks associated with those products and services. Account fraud and identity theft are frequently the result of single-factor authentication exploitation.

2) In short, verification is about ensuring that an implementation matches its specification, and we have to ensure that when we meet the conditions for the specified requirements, that an actual act of verification has taken place.

3) Insecure remote access continues to be the most frequent attack method used by intruders to gain access to a merchant's point-of-sale (POS) environment. There are a variety of remote access solutions available, ranging from command-line based (SSH, Telnet) to visually driven packages (pcAnywhere, VNC, MS Remote Desktop).

4) Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.

5)UDP for RADIUS and TCP for TACACS+

6) MD5 for encryption and XOR for clear text.

7) To provide a modest bit of security.

8) RADIUS

9)Authentication and authorization must work in tandem to provide effective security. Without authentication, there would be no way to determine if individuals are who they claim to be. Without some sort of authorization in place, it may not matter who they claim to be — as with no authorization in place, essentially anyone could access anything simply by telling the truth about who they are.

10) True

11) Radius. First, Radius is a standard, Second, Radius combines authentication and authorization, and third, it encrypts the information transmitted.

12)...