Access Control

Descrição

SYO-501 CompTIA Security + (Tema 11) Mapa Mental sobre Access Control, criado por Rafael Jiménez Rey em 29-05-2018.
Rafael Jiménez Rey
Mapa Mental por Rafael Jiménez Rey, atualizado more than 1 year ago
Rafael Jiménez Rey
Criado por Rafael Jiménez Rey quase 6 anos atrás
14
0

Resumo de Recurso

Access Control
  1. Type of controls
    1. Administrative Control o Management control

      Anexos:

      1. Logical control o Tecnical Control
        1. Physical control
          1. Operational Control
          2. Classes of controls
            1. Preventive
              1. Corrective
                1. Detective
                  1. Deterrent
                    1. Compensating
                    2. False Positives/False Negatives
                      1. False Positives
                        1. False Negatives
                        2. Implicit Deny
                          1. Least Privilege
                            1. Separation of Duties
                              1. Job Rotation
                                1. Other Account Practices
                                  1. Onboarding
                                    1. Offboarding
                                      1. Recertification
                                        1. Standard naming convention
                                          1. Account maintenance
                                            1. Location-based policies
                                            2. Access Control Models
                                              1. Discretionary Access Control
                                                1. Mandatory Access Control
                                                  1. Nivel de autorización (Usuarios o grupos)
                                                    1. Top secret
                                                      1. Secret
                                                        1. Confidential
                                                          1. Restricted
                                                            1. Unclassified
                                                            2. Etiquetas (Fichero)
                                                              1. Confidential
                                                                1. Private
                                                                  1. Sensitive
                                                                    1. Public
                                                                  2. Role-Based Access Control (RBAC)
                                                                    1. Rule-Based Access Control (RBAC)
                                                                      1. Group-Based Access Control (GBAC)
                                                                        1. Attribute-Based Access Control (ABAC)
                                                                          1. User Account Types
                                                                            1. User account:
                                                                              1. Shared and generic accounts
                                                                                1. Guest accounts
                                                                                  1. Service accounts
                                                                                    1. Privileged accounts:
                                                                                    2. Using Security Groups
                                                                                      1. Rights and Privileges
                                                                                        1. Access this computer from the network
                                                                                          1. Allow log on locally
                                                                                            1. Back up files and directories
                                                                                              1. Change the system time
                                                                                                1. Take ownership of files or other objects
                                                                                                2. NTFS Permissions
                                                                                                  1. Read
                                                                                                    1. Modify
                                                                                                      1. Full Control
                                                                                                      2. Linux Permissions
                                                                                                        1. Read (R): 4
                                                                                                          1. Write (W): 2
                                                                                                            1. Execute (X): 1
                                                                                                            2. Access Control Lists (ACLs)
                                                                                                              1. Cisco Standard Access Lists
                                                                                                                1. Cisco Extended Access Lists
                                                                                                                2. Group Policies
                                                                                                                  1. Install software
                                                                                                                    1. Configure password policies
                                                                                                                      1. Configure auditing
                                                                                                                        1. Configure user rights
                                                                                                                          1. Restricted groups
                                                                                                                            1. Disable services and configure event logs
                                                                                                                              1. File system permissions
                                                                                                                                1. Software restrictions:
                                                                                                                                  1. Lock down the system by disabling features
                                                                                                                                  2. Different types of group policies
                                                                                                                                    1. 1º - Local
                                                                                                                                      1. 2º - Site:
                                                                                                                                        1. 3º - Domain
                                                                                                                                          1. 4º - Organization unit (OU)
                                                                                                                                          2. Database Security
                                                                                                                                            1. Roles
                                                                                                                                              1. Permissions
                                                                                                                                                1. Encryption
                                                                                                                                                  1. Auditing
                                                                                                                                                  2. Account Restrictions
                                                                                                                                                    1. Account Expiration
                                                                                                                                                      1. Time-of-Day Restrictions:
                                                                                                                                                        1. Account Lockout:
                                                                                                                                                          1. Account lockout threshold
                                                                                                                                                            1. Account lockout duration
                                                                                                                                                              1. Reset account lockout counter after
                                                                                                                                                              2. Account Disablement:
                                                                                                                                                                1. View Account Details:
                                                                                                                                                                2. Account Policy Enforcement
                                                                                                                                                                  1. Shared accounts
                                                                                                                                                                    1. Credential management
                                                                                                                                                                      1. Group policy
                                                                                                                                                                        1. Password complexity:
                                                                                                                                                                          1. Expiration
                                                                                                                                                                            1. Recovery
                                                                                                                                                                              1. Disablement
                                                                                                                                                                                1. Lockout
                                                                                                                                                                                  1. Password history
                                                                                                                                                                                    1. Password reuse
                                                                                                                                                                                      1. Password length
                                                                                                                                                                                        1. Generic account prohibition
                                                                                                                                                                                        2. Monitoring Account Access
                                                                                                                                                                                          1. Group-based privileges
                                                                                                                                                                                            1. User-assigned privileges
                                                                                                                                                                                              1. User access reviews
                                                                                                                                                                                                1. Continuous monitoring

                                                                                                                                                                                              Semelhante

                                                                                                                                                                                              Tema 11 Administración de usuarios y permisos en Linux
                                                                                                                                                                                              Ramon El Varilla
                                                                                                                                                                                              Repaso Tema 11
                                                                                                                                                                                              María Parra
                                                                                                                                                                                              LOS CONFLICTOS EN LA EMPRESA
                                                                                                                                                                                              sergioalban455
                                                                                                                                                                                              Inglés 1 (Examen 11-15)
                                                                                                                                                                                              Inglés oposiciones
                                                                                                                                                                                              TEMA 11
                                                                                                                                                                                              aliciafiz
                                                                                                                                                                                              7 Crisis y hundimiento del comunismo (1985-1991)
                                                                                                                                                                                              isabel99villenera
                                                                                                                                                                                              Viaje al interior de la materia
                                                                                                                                                                                              pilu_4
                                                                                                                                                                                              tecnologia tema 11
                                                                                                                                                                                              julen martinez
                                                                                                                                                                                              Revista Time
                                                                                                                                                                                              jeniffer lopez0097
                                                                                                                                                                                              LAS DESAMORTIZACIONES DE MENDIZÁBAL Y MADOZ
                                                                                                                                                                                              Ángela Nuñez Lucas
                                                                                                                                                                                              Estructura lógica
                                                                                                                                                                                              Victor Diaz