0% found this document useful (0 votes)
56 views

CMP 312 - 3

Information security controls are designed to protect data, software, hardware, and networks. They aim to prevent accidental hazards, deter intentional acts, detect problems early, enhance recovery from damage, and correct issues. Physical controls prevent unauthorized access to facilities, while access controls restrict access to information resources and involve authentication to confirm identity and authorization to determine access privileges. Effective authentication utilizes multiple factors such as something the user knows (e.g. passwords), has (e.g. smart cards), or is (e.g. biometrics like fingerprints).

Uploaded by

vyktoria
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

CMP 312 - 3

Information security controls are designed to protect data, software, hardware, and networks. They aim to prevent accidental hazards, deter intentional acts, detect problems early, enhance recovery from damage, and correct issues. Physical controls prevent unauthorized access to facilities, while access controls restrict access to information resources and involve authentication to confirm identity and authorization to determine access privileges. Effective authentication utilizes multiple factors such as something the user knows (e.g. passwords), has (e.g. smart cards), or is (e.g. biometrics like fingerprints).

Uploaded by

vyktoria
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Information Security Controls

The purpose of security controls or defence mechanisms (also called countermeasures)

is to safeguard assets, optimize the use of the organization’s resources, and prevent or

detect errors or fraud. These controls are designed to protect all of the components of

a system, including data, software, hardware, and networks. Controls are intended to

prevent accidental hazards, deter intentional acts, detect problems as early as possible,

enhance damage recovery, and correct problems.

Physical Controls

Physical controls prevent unauthorized individuals from gaining access to a

company’s facilities. Common physical controls include walls, doors, fencing, gates,

locks, badges, guards, and alarm systems.

Access Controls

Access controls restrict unauthorized individuals from using information resources.

Access controls can be physical controls or logical controls. Both types restrict

unauthorized individuals from using information resources. Logical controls are

implemented by software. For example, access control programs limit users to

acceptable login times and acceptable login locations. These controls can limit the

number of unsuccessful login attempts and they require everyone to log off their

computers when they leave for the day. In addition, computers are set to

automatically log the user off after a certain period of disuse. Note that logical

controls can be used for other purposes (such as checking calculations), not just for

purposes of controlling access.

Access controls involve two major functions: authentication and authorization.

Authentication confirms the identity of the person requiring access. After the person

is authenticated (identified), the next step is authorization. Authorization determines

which actions, rights, or privileges the person has, based on their verified identity.

Good control systems limit authorization to tasks needed to accomplish a person’s job.

Let’s examine these functions more closely.


Authentication

To authenticate (identify) authorized personnel, an organization can

use one or more of the following types of methods: something the user is, something

the user has, something the user does, or something the user knows.

• Something the user is

Something the user is, also known as biometrics, is an authentication method that

examines a person’s innate physical characteristics. Biometric technologies can be

divided into two categories: active and passive. Active methods of biometric

authentication require the user to physically participate in the verification process by

taking an action like speaking, placing a finger or eye in proximity to a scanner, and

other actions. This method requires enrolment into the biometric system. Examples of

active biometrics include voice recognition, facial recognition, fingerprint scanning,

retinal scanning, and iris scanning.

Passive methods of biometric authentication are capable of identifying a person without

their active participation. Examples of passive biometrics include voice recognition

and behavioural identification. For example, when a customer calls a bank, instead of

asking for account numbers or passwords, the bank’s agent only asks, “What can I do

for you today?” In the background, the system “listens” to the customer and compares

their voice to the voiceprint on file. Additionally, a mobile banking application can

track user behaviour such as typing cadence, swiping patterns, and even geographic

location to provide continuous authentication.

• Something the user has

Something the user has is an authentication mechanism that includes regular

identification (ID) cards, smart ID cards, and tokens. Regular ID cards, or dumb cards,

typically have the person’s picture and often their signature. Smart ID cards have an

embedded chip that stores pertinent information about the user. (Smart ID cards used

for identification differ from smart cards used in electronic commerce. Both types of

cards have embedded chips, but they are used for different purposes.) Tokens have
embedded chips and a digital display that presents a login number that the employees

use to access the organization’s network. The number changes with each login.

• Something the user knows

Something the user knows is an authentication mechanism that includes passwords and

passphrases. Passwords present a huge information security problem in all

organizations. Most of us have to remember numerous passwords for different online

services, and we typically must choose complicated strings of characters to make them

harder to guess. Passwords must effectively manage the tradeoff between

convenience and security. For example, if passwords are 50 characters in length and

include special symbols, they might keep your computer and its files safe, but they

would be impossible to remember.

We have all bought into the idea that a password is sufficient to protect our data, as

long as it is sufficiently elaborate. In reality, however, passwords by themselves can

no longer protect us, regardless of how unique or complex we make them. In fact,

security experts refer to passwords and PINs as a “double fail.” First, they are easily

stolen or hacked and easily forgotten. Second, they provide very poor security and a

terrible customer experience at the same time. Attackers employ a number of

strategies to obtain our passwords, no matter how strong they are. They can guess

them, steal them (with phishing or spear phishing attacks), crack them using brute

force computation, or obtain them online. (Brute force password cracking means that

a computer system tries all possible combinations of characters until a password is

discovered.)

To identify authorized users more efficiently and effectively, organizations are

implementing more than one type of authentication, a strategy known as multifactor

authentication. This system is particularly important when users log in from remote

locations. Single-factor authentication, which is notoriously weak, commonly consists

simply of a password. Two-factor authentication consists of a password plus one type


of biometric identification, such as a fingerprint. Three-factor authentication is any

combination of three authentication methods.

You might also like