Remote-access Guide

network security controls for it remote access ieee

by Terrence Johnston II Published 2 years ago Updated 2 years ago
image

What are network security controls?

These security controls are either technical or administrative safeguards implemented to minimize the security risk. To reduce the risk of a network being compromised, an adequate network security requires implementing a proper combination of network security controls.

What are the best practices for network security?

Fortunately, that is not the case. Previous chapters have presented several strategies for addressing security concerns, such as encryption for confidentiality and integrity, reference monitors for access control, and overlapping controls for defense in depth. These strategies are also useful in protecting networks.

What is the DoD’s policy on wireless security?

A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family) 2 as wired networks. The directive requires that an active screening capability for wireless devices be implemented on every DoD network. In July 2016, the Office of the Director of National Intelligence issued guidance requiring WIDS capabilities for continuous monitoring.

Where is the greatest exposure to a user from a firewall?

Thus, the greatest exposure for a user is between the user's workstation or client and the perimeter of the host network or server. A firewall is an access control device that sits between two networks or two network segments. It filters all traffic between the protected or "inside" network and a less trustworthy or "outside" network or segment.

image

What is network security?

Network Security Controls are used to ensure the confidentiality, integrity, and availability of the network services. These security controls are either technical or administrative safeguards implemented to minimize the security risk. To reduce the risk of a network being compromised, an adequate network security requires implementing ...

What is access control?

In general, access control provides essential services like authorization, identification, authentication, access permissions and accountability. 1) Authorization determines the action a user can perform. 2) Identification and authentication identify and permit only authorized users to access the systems.

What is the most common technique used in authenticating the users in the network and applications?

Identification: Identification deals with confirming the identity of a user, process, or device accessing the network. User identification is the most common technique used in authenticating the users in the network and applications. Users have a unique User ID, which helps in identifying them.

What is authorization in network?

Authorization: Authorization refers to the process of providing permission to access the resources or perform an action on the network. Network administrators can decide the access permissions of users on a multi-user system. They even decide the user privileges. The mechanism of authorization can allow the network administrator to create access permissions for users as well as verify the access permissions created for each user.

What is mandatory access control?

The mandatory access controls determine the usage and access policies of the users. Users can access a resource only if that particular user has the access rights to that resource. MAC finds its application in the data marked as highly confidential. The network administrators impose MAC, depending on the operating system and security kernel. It does not permit the end user to decide who can access the information, and does not permit the user to pass privileges to other users as the access could then be circumvented.

What is discretionary access?

Discretionary access controls determine the access controls taken by any possessor of an object in order to decide the access controls of the subjects on those objects. The other name for DAC is a need-to-know access model. It permits the user, who is granted access to information, to decide how to protect the information and the level of sharing desired. Access to files is restricted to users and groups based upon their identity and the groups to which the users belong.

What are the two types of access controls?

There are two types of access controls: physical and logical. The physical access controls the access to buildings, physical IT assets, etc. The logical access controls the access to networks and data. In general, access control provides essential services like authorization, identification, authentication, access permissions and accountability.

Why is encryption important in network applications?

Because networks often involve even greater risks, they often secure data with encryption, perhaps in combination with other controls. In network applications, encryption can be applied either between two hosts (called link encryption) or between two applications (called end-to-end encryption). We consider each below.

Where does encryption occur in a link?

In link encryption, data are encrypted just before the system places them on the physical communications link. In this case, encryption occurs at layer 1 or 2 in the OSI model. (A similar situation occurs with TCP/IP protocols.) Similarly, decryption occurs just as the communication arrives at and enters the receiving computer. A model of link encryption is shown in Figure 7-21.

Why is encryption important?

Because networks often involve even greater risks, they often secure data with encryption, perhaps in combination with other controls.

What is end to end encryption?

As its name implies, end-to-end encryption provides security from one end of a transmission to the other. The encryption can be applied by a hardware device between the user and the host. Alternatively, the encryption can be done by software running on the host computer.

How many pairs of keys are needed for encryption?

With a public key system, only one pair of keys is needed per recipient. As shown in Table 7-5, link encryption is faster, easier for the user, and uses fewer keys. End-to-end encryption is more flexible, can be used selectively, is done at the user level, and can be integrated with the application.

How many keys are needed for IKE?

Because this is a public key method, only two keys are needed for each pair of communicating parties. IKE has submodes for authentication (initiation) and for establishing new keys in an existing security association.

What is the greatest exposure for a user?

Thus, the greatest exposure for a user is between the user's workstation or client and the perimeter of the host network or server.

Logical Access Controls

Logical ACs are the primary means of managing and protecting resources to reduce risks to a level acceptable to an organization. They are tools used for identification, authentication, authorization, and accountability. They are software components that enforce AC measures for systems, programs, processes, and information.

General Points of Entry

General points of entry to either front-end or back-end systems relate to an organization’s networking or telecommunications infrastructure in controlling access into their information resources (e.g., applications, databases, facilities, networks).

Logical Access Control Software

IT has made it possible for computer systems to store and contain large quantities of sensitive data, increase the capability of sharing resources from one system to another, and permit many users to access the system through internet/intranet technologies.

IDENTIFICATION AND AUTHENTICATION

IA is the process of proving one’s identity. It is the process by which the system obtains from a user his/her claimed identity and the credentials needed to authenticate this identity, and validates both pieces of information.

LOG-ON IDS AND PASSWORDS

A password should be easy for the user to remember but difficult for a perpetrator to guess.

Token Devices, One-Time Passwords

A two-factor authentication technique, such as a microprocessor-controlled smart card, generates one-time passwords that are good for only one log-on session. Users enter this password along with a password they have memorized to gain access to the system.

Biometrics

Biometric ACs are the best means of authenticating a user’s identity based on a unique, measurable attribute or trait for verifying the identity of a human being. This control restricts computer access, based on a physical (something you are) or behavioral (something you do) characteristic of the user.

image

These Network Security Controls Include

Access Control

  • Access control is a method for reducing the risk of data from being affected and to save the organization’s crucial data by providing limited access of computer resources to users. The mechanism grants access to system resources to read, write, or execute to the user based on the access permissions and their associated roles. The crucial aspect of ...
See more on info-savvy.com

Access Control Terminology

  • The following terminologies are used to define access control on specific resources: 1) Subject: A subject may be defined as a user or a process, which attempts to access the objects. Further, subjects are those entities that perform certain actions on the system. 2) Object: An object is an explicit resource on which access restriction is imposed. The Access controls implemented on th…
See more on info-savvy.com

Access Control Principles

  • Access control principles deal with restricting or allowing the access controls to users or processes. The principle includes the server receiving a request from the user and authenticating the user with the help of an Access Control Instruction (ACO. The server can either allow or deny the user to perform any actions like read, write, access files, etc. Access controls enable users t…
See more on info-savvy.com

Types of Access Control

  • Types of access control between how a subject can access an object. The policy for determining the mechanism uses access control technologies and security.
See more on info-savvy.com

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9