Professional Documents
Culture Documents
Identity Theft
Supervisory Structure
Phishing
Administrative
Spoofing at logon
Wardialing
Threats
Security-Awareness Training
Testing
Network Segregation
Perimeter Security
Dictionary Attack
Computer Controls
Physical
Pattern Matching
Requires continual update
System Access
Signature Based
Technical or Logical
Anomaly Based
Network Access
Encryption and Protocols
Auditing
Network Architecture
Controls
Rule Based
Host-Based - HIDS
Acceptance
Retina Scans
Iris Scans
Biometrics
Access Controls
Static
Mike Smith
Facial Scans
Passwords
26/04/10 - Rev.27
Palm Scans
Dynamic
Static Password
Hand Geometry
Signature Dynamics
Tokens
Smartcards
Keyboard Dynamics
Hand Topology
Dynamic Password
Synchronous
Asynchronous
Side-channel attacks
System-level events
Application-level events
Accountability
User-level events
Kerberos
SSO
Centralized
Weaknesses
Access Control
Needham-Schroeder Protocol
Supports MD5 and CRC32 Hashing