2 cissp ® Official Study Guide Eighth Edition


Compensating Access Control



Download 19,3 Mb.
Pdf ko'rish
bet543/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   539   540   541   542   543   544   545   546   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Compensating Access Control
A
compensating access control
provides an alternative 
when it isn’t possible to use a primary control, or when necessary to increase the effective-
ness of a primary control. As an example, a security policy might dictate the use of smart-
cards by all employees, but it might take a long time for new employees to get a smartcard. 
The organization could issue hardware tokens to employees as a compensating control. 
These tokens provide stronger authentication than just a username and password. 
Access controls are also categorized by how they are implemented. Controls can be 
implemented administratively, logically/technically, or physically. Any of the access control 
types mentioned previously can include any of these implementation types. 
Administrative Access Controls
Administrative access controls
are the policies and pro-
cedures defi ned by an organization’s security policy and other regulations or requirements. 


584
Chapter 13 

Managing Identity and Authentication
They are sometimes referred to as management controls. These controls focus on personnel 
and business practices. Examples of administrative access controls include policies, proce-
dures, hiring practices, background checks, classifying and labeling data, security aware-
ness and training efforts, reports and reviews, personnel controls, and testing. 
Logical/Technical Controls
Logical access controls
(also known as
technical access 
controls
) are the hardware or software mechanisms used to manage access and to provide 
protection for resources and systems. As the name implies, they use technology. Examples 
of logical or technical access controls include authentication methods (such as passwords, 
smartcards, and biometrics), encryption, constrained interfaces, access control lists, proto-
cols, fi rewalls, routers, intrusion detection systems, and clipping levels. 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   539   540   541   542   543   544   545   546   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish