AAA SECURITY
BY SHIKHAR BERIWAL
WHAT IS AAA?(NOT THE ROADSIDE SAFTY)
Authentication, authorisation and accounting (AAA) refers to a common
security framework for mediating network and application access. AAA
intelligently controls access to computer resources by enforcing strict access
and auditing policies. ... Historically AAA security has set the benchmark.
AUTHENTICATION BEST PRACTICES
• Passwords. One of the most widespread and well-known methods of
authentication are passwords.
• Two-Factor Authentication.
• Captcha Test.
• Biometric Authentication
MULTIFACTOR AUTHENTICATION
Multi-factor authentication is an electronic authentication method in which a
computer user is granted access to a website or application only after
successfully presenting two or more pieces of evidence to an authentication
mechanism: knowledge, possession, and inherence
LDAP, RADIUS & KRBEROS
• LDAP stands for Lightweight Directory Access Protocol. As the name suggests, it is a
lightweight client-server protocol for accessing directory services, specifically X. 500-
based directory services. LDAP runs over TCP/IP or other connection oriented
transfer services
• Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and
software that enables remote access servers to communicate with a central server to
authenticate dial-in users and authorize their access to the requested system or service
• Kerberos is a computer-network authentication protocol that works on the basis of
tickets to allow nodes communicating over a non-secure network to prove their
identity to one another in a secure manner
LDAP, RADIUS & KERBEROS
AUTHORIZATION & ACCESS CONTROL
• Authorization is the function of specifying access rights/privileges to
resources, which is related to general information security and computer
security, and to access control in particular
• Access control is the selective restriction of access to a place or other
resource while access management describes the process.
ACCOUNTING
• Accountants, both in practice and in industry, must therefore understand how
to identify and respond to cyber security risks, rather than ignore the issue in
the belief that cyber security is the domain of their IT departments or that
their organisation's software will prevent any breaches.
• Accounting examples: track usage and access
CONGRATULATIONS! YOU HAVE PASSED
WEEK 3