COSSC-DSP: System Hardening Principles
Oct 13, 2017
, System Hardening
Principles
Authentication & Passwords
Auditing & Logs
Permissions
Templates & Guides
COSSC-DSP: Domain Specialization Preparation
Any unauthorized use or disclosure of this material is strictly prohibited.
, Authentication and
Passwords
COSSC-DSP: Domain Specialization Preparation
Any unauthorized use or disclosure of this material is strictly prohibited.
, AUTHENTICATION
• How to prove identity? Different factors:
– What you know
• Username, passwords, passphrase, keys
– What you are
• Biometrics: fingerprint, retina, vein patterns, voice, movement
– What you have
• Hardware token: CAC, smart card
• secure token: RSA number fob, mobile app Authy
– Where you are
• IP GEO Location: IP address, MAC address, Wireless SSIDs with RSSIs,
Bluetooth +RSSI, Cell tower +RSSI, other RF
COSSC-DSP: Domain Specialization Preparation
Any unauthorized use or disclosure of this material is strictly prohibited.
Oct 13, 2017
, System Hardening
Principles
Authentication & Passwords
Auditing & Logs
Permissions
Templates & Guides
COSSC-DSP: Domain Specialization Preparation
Any unauthorized use or disclosure of this material is strictly prohibited.
, Authentication and
Passwords
COSSC-DSP: Domain Specialization Preparation
Any unauthorized use or disclosure of this material is strictly prohibited.
, AUTHENTICATION
• How to prove identity? Different factors:
– What you know
• Username, passwords, passphrase, keys
– What you are
• Biometrics: fingerprint, retina, vein patterns, voice, movement
– What you have
• Hardware token: CAC, smart card
• secure token: RSA number fob, mobile app Authy
– Where you are
• IP GEO Location: IP address, MAC address, Wireless SSIDs with RSSIs,
Bluetooth +RSSI, Cell tower +RSSI, other RF
COSSC-DSP: Domain Specialization Preparation
Any unauthorized use or disclosure of this material is strictly prohibited.