Chapter 4 Physical and Logical Security
Chapter 4 Physical and Logical Security
Chapter 4
1. Identification
The action or process of identifying someone.
2. Authentication
The act of confirming the truth of an attribute of a
single piece of data claimed true by a user.
Checking the user’s credentials to be sure that they
are authentic and not fabricated
Cont’d……..
4
3. Authorization
Process of granting or denying a user to access a
secure system.
4. Access
Being able to get to (usually having permission to
use) particular data on a computer.
Users are granted access
to only certain services or applications in order to
perform their duties
Cont’d……….
5
Cont’d………..
6
– Passwords
– Biometric identification
– Compatibility tests
Physical VS Logical
14
Group policies,
Passwords
Cont’d……….
18
Group Policies
A Microsoft Windows feature that provides centralized
management and configuration of computers and
remote users.
Group Policy is usually used in enterprise
environments to restrict user actions that may pose a
security risk.
Group Policy settings are stored in Group Policy
Objects (GPOs)
Cont’d………..
20
Account restrictions
Time of day restrictions
Passwords
The most common logical access control
Sometimes referred to as a logical token
A password should never be written down
The End!
Thank you!