Beruflich Dokumente
Kultur Dokumente
Access Control
Agenda
Aspectos generales
Tipos de control de acceso
Implementacin de control de acceso
Identificacin, autenticacin, autorizacin y auditora
Tcnicas de identificacin y autenticacin
Passwords
Sistemas Biomtricos
Tokens / Tickets / Single Sign On
Kerberos
Modelos de control de acceso
Administracin de control de acceso
Monitoreo, Auditora y Logs
Sistemas de Deteccin de Intrusos (IDS)
Mtodos de ataque
Referencias y Lecturas Complementarias
Preguntas
Access Control
Aspectos Generales
1
CISSP Security Training Access Control Systems and Methodology
Aspectos Generales
2
CISSP Security Training Access Control Systems and Methodology
CIA Triad
Confidencialidad
Integridad
3
CISSP Security Training Access Control Systems and Methodology
Disponibilidad
Access Control
Tipos de Control de
Acceso
4
CISSP Security Training Access Control Systems and Methodology
5
CISSP Security Training Access Control Systems and Methodology
6
CISSP Security Training Access Control Systems and Methodology
Access Control
Implementacin del
Control de Acceso
7
CISSP Security Training Access Control Systems and Methodology
Access Control
Identificacin, Autenticacin,
Autorizacin y Accounting
8
CISSP Security Training Access Control Systems and Methodology
Identificacin
Autenticacin
9
CISSP Security Training Access Control Systems and Methodology
Autenticacin (Cont.)
Autenticacin (Cont.)
Autorizacin
10
CISSP Security Training Access Control Systems and Methodology
Autorizacin (Cont.)
Auditora (Accounting)
11
CISSP Security Training Access Control Systems and Methodology
Access Control
Monitoreo, Auditora y
Logs
37
CISSP Security Training Access Control Systems and Methodology
Access Control
Sistemas de Deteccin
de Intrusos
38
CISSP Security Training Access Control Systems and Methodology
IDS - Limitaciones
39
CISSP Security Training Access Control Systems and Methodology
40
CISSP Security Training Access Control Systems and Methodology
41
CISSP Security Training Access Control Systems and Methodology
Tipos de IDS
42
CISSP Security Training Access Control Systems and Methodology
Honey Pots
43
CISSP Security Training Access Control Systems and Methodology
Padded Cell
Vulnerability Assessment
44
CISSP Security Training Access Control Systems and Methodology
Access Control
Amenazas - Ataques
Ataques
45
CISSP Security Training Access Control Systems and Methodology
Access Control
Referencias y Lecturas
Complementarias
Access Control
Preguntas?
46