0% found this document useful (0 votes)
343 views9 pages

Understanding AAA Security Framework

This document provides an overview of authentication, authorization, and accounting (AAA) security. It discusses common authentication methods like passwords and multi-factor authentication. It also describes protocols used for authentication like LDAP, RADIUS, and Kerberos. Additionally, it covers authorization and access control to resources as well as accounting to track usage and access. AAA security sets the benchmark for controlling access to computer resources through strict policies and auditing.

Uploaded by

api-520249211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
343 views9 pages

Understanding AAA Security Framework

This document provides an overview of authentication, authorization, and accounting (AAA) security. It discusses common authentication methods like passwords and multi-factor authentication. It also describes protocols used for authentication like LDAP, RADIUS, and Kerberos. Additionally, it covers authorization and access control to resources as well as accounting to track usage and access. AAA security sets the benchmark for controlling access to computer resources through strict policies and auditing.

Uploaded by

api-520249211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

AAA SECURITY

BY SHIKHAR BERIWAL
WHAT IS AAA?(NOT THE ROADSIDE SAFTY)

Authentication, authorisation and accounting (AAA) refers to a common


security framework for mediating network and application access. AAA
intelligently controls access to computer resources by enforcing strict access
and auditing policies. ... Historically AAA security has set the benchmark.
AUTHENTICATION BEST PRACTICES

• Passwords. One of the most widespread and well-known methods of


authentication are passwords.
• Two-Factor Authentication.
• Captcha Test.
• Biometric Authentication
MULTIFACTOR AUTHENTICATION

Multi-factor authentication is an electronic authentication method in which a


computer user is granted access to a website or application only after
successfully presenting two or more pieces of evidence to an authentication
mechanism: knowledge, possession, and inherence
LDAP, RADIUS & KRBEROS

• LDAP stands for Lightweight Directory Access Protocol. As the name suggests, it is a
lightweight client-server protocol for accessing directory services, specifically X. 500-
based directory services. LDAP runs over TCP/IP or other connection oriented
transfer services
• Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and
software that enables remote access servers to communicate with a central server to
authenticate dial-in users and authorize their access to the requested system or service
• Kerberos is a computer-network authentication protocol that works on the basis of
tickets to allow nodes communicating over a non-secure network to prove their
identity to one another in a secure manner
LDAP, RADIUS & KERBEROS
AUTHORIZATION & ACCESS CONTROL

• Authorization is the function of specifying access rights/privileges to


resources, which is related to general information security and computer
security, and to access control in particular
• Access control is the selective restriction of access to a place or other
resource while access management describes the process.
ACCOUNTING

• Accountants, both in practice and in industry, must therefore understand how


to identify and respond to cyber security risks, rather than ignore the issue in
the belief that cyber security is the domain of their IT departments or that
their organisation's software will prevent any breaches.
• Accounting examples: track usage and access
CONGRATULATIONS! YOU HAVE PASSED
WEEK 3

You might also like