Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back to Cyberia. 2019 comp T A security plus certification preparation course. Rugal continue our discussion on margin for which in fact, is domain four, and the topic discussed will be identity and access management.
00:16
Interestingly enough, we have a brand new objective here, which is 4.4 and its simply states, given a scenario different. Eight. Common Account Management practices.
00:28
The first item on our agenda is a pre assessment quiz and acquis reads as follows. Licit set up account for her company
00:36
she want instead of account for the or co database server. Which of the following will be the best type account just signed to a database server?
00:44
Is that a user
00:46
be gifts?
00:48
Is the sea at men or D service?
00:52
In this case, if you selected, do you absolute correct? Because the service account is the most appropriate in this scenario. Serves accounts are given the least privileges the service needs needs and are used by the service without the need for human users.
01:07
Here again are the topics we can compasses again this particular brand new objective. We're going to take a look at user countless guys shared and generic accounts. Guess account service account as well as privileged accounts,
01:25
So the first item margin is taking a look at its defining exactly what in fact is a user account.
01:30
Now use account also refers to as a name account is an account of social. One individual for the purpose of assessing resource is
01:38
a shared or generic count is an account. There's typically shipped by more than one individual for the purpose of access, and resource is
01:47
you guess account is similar to a shared account, but it's typically enable on the man for occasionally or one time use.
01:55
A service account is an account that is specifically used by service instead of an individual. The word suffered it needs to access. Resource is
02:04
a private account is an account that has the highest level privileges. Then use accounts to resource is
02:13
continue our discussion. This particular brand new objective, which is 4.4. You're giving a scenario different, ate the common account manager practices. So what? We're gonna take a look at some general concepts ranging from the term called lease privileges all the way down to locate
02:28
location based policies.
02:30
When you think about at least privileges. Basically sure that uses a granite Onley privileges they need to perform their roles within an organization.
02:40
On board is the price of any new users to the Identity mansion system of your organization.
02:46
Off boredom is the removal of the EU's identity from the data management system. Once that individual has left the organization,
02:53
permissions and automating review is a process of ensuring that Onley eligible users have access to the resource is within the organization.
03:04
You just ordering usage argument and as well as review is the process of recording the actions uses performed on resource is within an organization.
03:15
Then we have what we call time of day prescriptions basis used by odors. Issued rescript uses access to resource is too specific times and day as well as the days of the week
03:25
recent. If the case is a process of renewal certification accreditation at the changes I've made to the original certification process or at the a specific time period,
03:37
then we have the standard naming convention, which is an agreed upon convention for name and resource is
03:43
account. Man management or maintenance is a method of maintaining your accounts.
03:49
Group based access control is a method to grant access to resource is based on the user's membership in a group.
03:58
Location based policies essentially are. It can be used by organization to rescript uses. Access to resource is based on the physical location or the region off the user.
04:11
We have some additional topics. We need discuss as it pertained to this brand new objective
04:16
here. Again, we're gonna take a look again at account policy enforcement, ranging from other words. Credential management all way down to out password link.
04:27
So when you think about Prudential, management
04:30
is established form of software used for issuing and managing your credentials as part of your pkr. Other words. Public key infrastructure
04:38
ah, group process is a process by which owners ace an infant. Multiple password policies for users.
04:45
Password complexity basically is a complex of password. First or Hami character types are included in the password.
04:53
Exploration basically is a maxim time or use a password remains. Ballot
04:59
recovery is a process by which users can regain access to it, an account to which they no longer have access.
05:08
Disablement. Basically what that is, the death defying is often used when you have unemployed. That leaves your organization
05:16
lockout and over this an MBA in lockup policy a policy do lock out on account after incorrect passwords in a pre defined number of times.
05:27
Password history is the list of a user's previous passwords.
05:31
Password reuse. It's a password, positive events uses from regions and passwords on that password history list.
05:39
Password Link is a number of characters in the user's password.
05:44
Let's not turn our ticket order Post Assessment Quiz, and it reads as follows. Stephan just became the new security officer for university.
05:53
He concerned that student workers who worked late on campus could try and log on with the faculties credentials.
06:00
Would your father would be the most effective in preventing This is a time of day prescription be used today?
06:06
See password link or D credential magic
06:13
if you should let a your absolute crypt because rescript in each factory accounts so that it only usual when that particular factory member is typically on campus will prevent someone from log in with that account after hours, even if he or she has the password.
06:28
This brings us to our key takeaways. From this particular video presentation,
06:32
we learned that a user can also refers to a name account is an account that's associated with one individual for the purpose of assessing. Resource is we also learned that, I guess account of similar to a shed account. But it's typically unable on the man for occasional or one time use.
06:49
We noted that privilege account is an account that has, ah, high level privilege, then use account to resource is
06:58
we also learned the past where history is a list of users. Previous passwords,
07:03
we also learned in the past would posit that Vince used for reusing passwords on that password. Let password lists as well.
07:12
In our upcoming video will be taking a look at a brand new domain, which is the main five, which is deal specifically with risk management. In fact,
07:20
we have a new objective within that particular main. You're gonna be highlight in the upcoming video, which is 5.1 what We have to explain the importance of policies, plans and procedures related to organizational security. And again, I look forward to seeing the very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor