Hardening Authentication Update
On many networks, in order for users to be granted
access to network resources, a user must prove that he or she is an authorized user. This is the process of user authentication. A user can be authenticated by what...
03 November 2016 4 page(s) pdf
Secure Access to Infrastructure Devices
Secure access enables an administrator to maintain positive control of user accessing network infrastructure. There are multiple secure access devices and techniques that are scalable and can be used to keep your networks secure depending on which method fits the...
22 June 2016 2 page(s) pdf
This document contains information on how to harden authentication processes by limiting remote access, augmenting authentication measures, educating users, hardening the authentication servers, and establishing robust authentication policy.
01 September 2012 2 page(s) pdf
Privileged Access Management
Privileged Access Management (PAM) solutions protect and track the use of sensitive or critical capabilities such as administrative or service accounts. PAM solutions provide a centralized management interface for authentication and access control throughout the network. This unification provides simplified...
25 April 2017 2 page(s) pdf
The least privilege principle is the practice of restricting capabilities to only those who require them. On information systems, these capabilities may include: The ability to access or log into machines or services; The ability to access resources such as...
10 April 2017 2 page(s) pdf
Network Mitigations Package-Infrastructure (NMP-I)
The security community continues to address emerging network threats. The new security model now consists of prevention, detection, containment, and response to mitigate threats. The Network Mitigations Package-Infrastructure (NMP-I) focuses on layering information system network defenses enabling communications while controlling...
23 June 2016 2 page(s) pdf
Spotting the Adversary with Windows Event Log Monitoring (version 2)
This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event...
07 August 2015 54 page(s) pdf
Mitigations for Key Reinstallation Attacks Against Wi-Fi Protected Access II (WPA2)
On October 16, 2017, a vulnerability in the Wi-Fi Protected Access II (WPA2) mechanism used for authentication and session key agreement was released. The vulnerability affects the following WPA2 handshakes: the Four-way, Group Key, Fast BSS Transition (FT), Peerkey, TDLS,...
18 October 2017 2 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-9 of 9 results returned for: "keywords:"Authentication""