Compita + Notes
Compita + Notes
Concentrator does not have any info about username or passwords or authenticator
factors , this is stored in AAA server or central server
How can you ensure that a device or system is a one you want since the device itself
can’t type a password and it could be anywhere in the world ? the answer is down below
You have a server that provides certificates in order to give a device a specific certificate for it
and you can that CA signed the certificate of the device when you compare them
in non authorizting you will need to give access to every user one by one to the resoruces they
need or should use and this is not flexible if we have hunder of users or resources
Here we have users added to group called shipping and receiving group and once they are added
they have access to the following resources ( 3 of them )
Authorization: Pertains to the permissions and privileges granted to users or entities after they
have been authenticated. Authorization mechanisms are important to help us with protecting
sensitive data, maintain system integrity in our organizations, and create a more streamlined
user experience.
Accounting: Security measure that ensures all user activities during a
communication or transaction are properly tracked and recorded. Your
organization should use a robust accounting system so that you can
create an audit trail, maintain regulatory compliance, conduct forensic
analysis, perform resource optimization, and achieve user
accountability.
o To perform accounting, we usually use different technologies like
the following:
Syslog Servers: Used to aggregate logs from various
network devices and systems so that system
administrators can analyze them to detect patterns or
anomalies in the organization’s systems.
Network Analysis Tools: Used to capture and analyze
network traffic so that network administrators can gain
detailed insights into all the data moving within a network.
Security Information and Event Management (SIEM)
Systems: Provides us with real-time analysis of security
alerts generated by various hardware and software
infrastructure in an organization.