14.4.1 Logical Security Measures
Learn about different reasonable, logical security measures organizations employ to protect their devices and computer networks.
Authentication Methods
Ensure that anybody trying to connect to internal networks is actually authorized to do so, and is allowed to be within the organization's premises. Ensure that all user permissions follow the principle of least privilege. On Windows, this can be enforced using an access control list (ACL). This is stored on the master file table. Users should never be allowed to make system changes, install programs, edit the Registry, or perform any other high-level operations.
Login authentication methods include:
- username / password pair
- SMS code / OTP
- authentication app like Google Authenticator or Microsoft Authenticator
- hard token
- a set of recovery keys
- USB device
- key fobs
- smart cards
Mobile Device Management
just look at the MDM page
Certificate Manager
Digital certificates are used to identify a user, computer, emails, websites, organizations, and more. There are many types of certificates and they all serve different purposes.
#XIV
#Aplus
No comments to display
No comments to display