2.4 Flashcards
Summarize authentication and authorization design concepts.
These are techniques or processes used to verify the identity of users or entities accessing a system or network. Examples include passwords, biometrics, tokens, and certificates.
Authentication methods
Are centralized databases that store and manage information about users, devices, and resources within a network. They facilitate authentication, access control, and resource management.
Directory Services
Defines policies, protocols, and practices to manage identities across systems and organizations.
Federation
Is the supplying of proof or evidence of some fact.
Attestation
Type of password algorithm that generates temporary authentication codes based on the current time and a shared secret. These codes expire after a short period, enhancing security compared to static passwords.
Time-based one-time password (TOTP)
Type of password algorithm that uses a counter value and a shared secret to generate authentication codes. Each code is valid only once, providing an additional layer of security.
HMAC-based one-time password (HOTP)
Are physical devices that carry a digital token used to identify the user.
Token key
Codes that do not change or are static in nature.
Static codes
Are messages sent from a server to a user’s device to prompt authentication or authorization actions.
Push notifications
Involves using a physical card embedded with a microprocessor and cryptographic capabilities to authenticate users.
Smart card authentication
Involves using unique physiological or behavioral characteristics, such as fingerprints, iris patterns, or voiceprints, to verify a person’s identity.
Biometrics
Measure the effectiveness of authentication systems in accurately verifying users’ identities. They include metrics such as accuracy, speed, and user acceptance.
Efficacy rates
Occurs when an authentication system incorrectly identifies an unauthorized user as an authorized one, granting access to protected resources.
False acceptance
Occurs when an authentication system incorrectly denies access to an authorized user, typically due to errors or inconsistencies in the authentication process.
False rejection
Is the point at which both acceptance and rejection error rates are equal.
Crossover error rate