01 - Flash Cards
Information
- Organization’s information is a term that refers to all the information pertaining to the organization.
System
- In this context, systems refer to IT systems used to provide services.
Devices
- Broad term that may refer to computing systems, servers, laptops, smartphones and external devices such as printers.
Subject
- Active entities such as users that access passive object to gain information from or about an object.
Object
- Passive entities such as files and databases that provide subject with information.
CIA Triad
- Confidentiality
- Integrity
- Availability
Confidentiality
- Is a concept that encompasses a set of measures used to protect the secrecy of data, resources, and objects.
Integrity
- Ability to protect reliability and correctness of data/information.
Availability
- Refers to uninterrupted access to objects to all authorized subjects.
Types of Access Control
- Preventive Access Control
- Detective Access Control
- Corrective Access Control
- Deterrent Access Control
- Directive Access Control
- Compensating Access Control
- Administrative Access Control
- Logical/Technical Control
- Physical Control
Preventive Access Control
- Type of control that attempts to prevent incidents before they occur – for example firewall or a guard.
Detective Access Control
- Type of control that identifies security violations after they have occurred –for example motion detectors.
Corrective Access Control
- Type of controls that change the environment after an incident has occured in order to to return it to normal – for example antivirus programs.
Deterrent Access Control
- Type of a control that attempts to discourage specific action from happening- for example security cameras or a security policy.
Directive Access Control
- Type of administrative control that provide guidelines – for example monitoring and supervision.
Compensating Access Control
- Type of a control that provides an alternative when it is not possible to use a primary control.
Administrative Access Control
- Type of controls that are stated in organization’s security policy – for example background checks and training efforts.
Logical/Technical Control
- Hardware and software mechanisms used to manage access and to provide protection for systems.
Physical Control
- Type of control one can physically touch – for example fences and guards.
Identification
- Term that refers to a subject claiming an identity.
Authentication
- Term that refers to verifying subject’s identity by comparing it against a database such as user accounts.
Authorization
- Term that refers to granting access to specific resources based on a proven identity.
Accountability
- Term that refers to subjects responsibility for their actions once an audit is under way.
Authentication Factors Types
- Type 1
- Type 2
- Type 3
Authentication Type 1
- Something you know – for example a pin or a password.
Authentication Type 2
- Something you have – for example a token or a smart card.
Authentication Type 3
- Something you are or you do – for example fingertips or keystrokes.
Context- Aware Authentication
- Context-aware authentication is the use of situational information (such as identity, location, time, type of device) to improve information security.
Passwords
- Most common authentication technique that belong to Type 1 authentication.
Strong Password Policy Settings
- Maximum age
- Password lengths
- Password complexity
Password History
- Password history remembers a certain number of passwords and prevents a user from reusing previous passwords.
Password Phrase
- Passphrase is a string of characters that has a unique meaning to a user – for example “I am awesome.”
Cognitive Passwords
- Series of questions about the facts that only a subject would know.
Smartcards
- Cards that have an embedded circuit chip and contain information about an authorized user.
- This information is used for identification and authentication.
Tokens
- Password generating device that users carry with them.
Token Types
- Synchronous Dynamic
- Asynchronous Dynamic
HOTP
- HMAC includes a hash function used by HMAC-based One Time Password in order to create onetime passwords..
TOTP
- Time-based One-Time Password uses a timestamp and it is valid for a certain time like 30 seconds. The password expires if the user does not use it within the frame.
Biometrics
- Face scans
- Retina scans
- Iris scans
- Palm scans
- Hand geometry
- Heart/pulse patterns
- Voice pattern recognition
- Signature dynamics
- Keystroke patterns
Biometric Factor Error Ratings
- False Rejection Rate - valid subject is not authenticated
- False Acceptance Rate - invalid subject is authenticated
Multifactor Authentication
- Authentication method that uses 2 or more factors to provide authentication.
Device Authentication
- Fingerprinting, 802.1x, user logs…
Service Authentication
- Usually refers to username and password.
Identity Management Implementation
- Centralized access control
- Decentralized access control
Single Sign-On
- Centralized access control method that allows a user to be authenticated once and be able to use multiple resource without authenticating again.
LDAP
- Lightweight Directory Access Protocol is a directory for network services and assets.
Kerberos
- It is a computer network authentication protocol developed by MIT that offers sign on solution for users and provides protection for logon credentials.
Kerberos elements
- Key Distribution Center
- Kerberos Authentication Server
- Ticket Granting Ticket
- Ticket
Hypertext Markup Language (HTML)
- It is a major markup language used to display web pages on the internet.
Extensible Markup Language (XML)
- It is a language commonly used by data-exchange services to send information between otherwise incompatible systems.
Service Provisioning Markup Language
- XML-based language that facilitates the exchange of provisioning information among applications and organizations, corporations, or agencies.
Extensible Access Control Markup Language
- It is an open standard XML-based language designed to express security policies and access rights to information for web services, digital rights management, and enterprise security applications.
OAuth 2.0
- It is an open standard used for access delegation.
OpenID
- It is an open standard and decentralized authentication protocol maintained by the OpenID Foundation.
OpenID Connect
- It simple identity layer on top of the OAuth 2.0 protocol autorization framework.
Scripted Access
- Logon script meant to establish communication links by providing automated process to transmit credentials at the start of a logon session.
Credential Management System
- Storage space for users to keep their credentials when SSO is not available.
AAA Protocols
- Authentication, Authorization and Accounting – term used to refer to a family of protocols that mediate network access such as RADIUS and Diameter
RADIUS
- Remote Authentication Dial-In User Service is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the requested system or service.
Diameter
- Enhanced version of RADIUS that supports a wide range of protocols including traditional IP, Mobile IP, Voice over IP.
TACACS+
- Terminal Access Controller Access-Control System refers to a family of related protocols handling remote authentication and related services for networked.
Identity and access provisioning lifecycle
- It is a concept that refers to creation, management, and deletion of accounts.
Provisioning
- In the context of setting a new account, provisioning refers to assigning appropriate privileges with an account.
Account Review
- Review process should be done regularly to ensure that security policies are being followed.
Account Revocation
- It is key to revoke accounts for terminated employees due to a risk of a sabotage.
- Many systems set expiration dates for specific accounts.