2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet548/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   544   545   546   547   548   549   550   551   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Somewhere You Are
The somewhere-you-are factor identifies a subject’s location based on 
a specific computer, a geographic location identified by an Internet Protocol (IP) address, 
or a phone number identified by caller ID. Controlling access by physical location forces a 
subject to be present in a specific location. Geolocation technologies can identify a user’s 
location based on the IP address and are used by some authentication systems.
Somewhere You Aren’t
Many IAM systems use geolocation technologies to identify suspicious activity. For 
example, imagine that a user typically logs on with an IP address in Virginia Beach. If the 
IAM detects a user trying to log on from a location in India, it can block the access even if 
the user has the correct username and password. This isn’t 100 percent reliable, though. 
A dedicated overseas attacker can use online virtual private network (VPN) services to 
change the IP address used to connect with an online server.
Context-Aware Authentication
Many mobile device management (MDM) systems use 
context-aware authentication
to identify mobile device users. It can identify multiple ele-
ments such as the location of the user, the time of day, and the mobile device. Geolocation 
technologies can identify a specific location, such as an organization’s building. A geofence 
is a virtual fence identifying the location of the building and can identify when a user is 
in the building. Organizations frequently allow users to access a network with a mobile 
device, and MDF systems can detect details on the device when a user attempts to log on. 
If the user meets all the requirements (location, time, and type of device in this example), it 
allows the user to log on using the other methods such as with a username and password.
Many mobile devices support the use of gestures or finger swipes on a touchscreen. As 
an example, Microsoft Windows 10 supports picture passwords allowing users to authen-
ticate by moving their finger across the screen using a picture of their choice. Similarly, 
Android devices support Android Lock allowing users to swipe the screen connecting dots 
on a grid. Note that these methods are different from behavioral biometrics explained fur-
ther in the “Biometrics” section later in this chapter. Behavioral biometrics examples such 
as signatures and keystroke dynamics are unique to individuals and provide a level of iden-
tification, but swiping a touch screen can be repeated by anyone who knows the pattern. 
Some people consider this as a Type 1 factor of authentication (something you know), even 
though a finger swipe is something you do.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   544   545   546   547   548   549   550   551   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish