2.4 Authentication and Authorization Design Flashcards

1
Q

common data repository for maintaining information about network users and resources as part of their Identity Security strategy.
• Keep all of an organization’s usernames and passwords
in a single database
– Also contains computers, printers, and other devices
• Large distributed database
– Constantly replicated
• All authentication requests reference this directory
– Each user only needs one set of credentials
– One username and password for all services
• Access via Kerberos or LDAP

A

Directory services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

different computing entities adhering to a certain standard of operations in a collective manner to facilitate communication. It also describes operations between two distinct formally disconnected telecommunication networks with distinct internal structures.
• Provide network access to others
– Not just employees - Partners, suppliers, customers, etc.
– Provides SSO and more
• Third-parties can establish a [this] network
– Authenticate and authorize between the
two organizations
– Login with your Facebook credentials
• The third-parties must establish a trust relationship
– And the degree of the trust

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a mechanism for software to prove its identity. The goal of attestation is to prove to a remote party that your operating system and application software are intact and trustworthy. The verifier trusts that [this] data is accurate because it is signed by a TPM whose key is certified by the CA.
• Prove the hardware is really yours
– A system you can trust
• Easy when it’s just your computer
– More difficult when there are 1,000
• Remote attestation
– Device provides an operational report to a
verification server
– Encrypted and digitally signed with the TPM
– An IMEI or other unique hardware component can be
included in the report

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
the most basic communications technology for mobile data transfer and is characterized by the exchange of short alphanumeric text messages between digital line and mobile devices. [this] messaging's key influential factor is affordability.
• Text messaging
– Includes more than text these days
• Login factor can be sent via SMS to a predefined
phone number
– Provide username and password
– Phone receives an SMS
– Input the SMS code into the login form
• Security issues exist
– Phone number can be reassigned to a
different phone
– SMS messages can be intercepted
A

Short message service (SMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the delivery of information from a software application to a computing device without a specific request from the client.
• Similar process to an SMS notification
– Authentication factor is pushed to a specialized app
– Usually on a mobile device
• Security challenges
– Applications can be vulnerable
– Some push apps send in the clear
• Still more secure than SMS
– Multiple factors are better than one factor

A

Push notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

generate a one-time code that you use to confirm that it’s you logging in to a website or service; they provide the second part of what’s called two-factor authentication (2FA).
• Pseudo-random token generators
– A useful authentication factor
• Carry around a physical hardware token generator
– Where are my keys again?
• Use software-based token generator on your phone
– Powerful and convenient

A

Authentication apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
• [this] algorithm
– Use a secret key and the time of day
– No incremental counter
• Secret key is configured ahead of time
– Timestamps are synchronized via NTP
• Timestamp usually increments every 30 seconds
– Put in your username, password, and [this] code
• One of the more common OTP methods
– Used by Google, Facebook, Microsoft, etc.

A

Time-based One-Time Password algorithm (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a one-time password algorithm that uses hash-based message authentication codes (HMAC). Its a freely available open standard. It was developed by the Initiative for Open Authentication (OATH)
• One-time passwords
– Use them once, and never again
– Once a session, once each authentication attempt
• [This]
– Keyed-hash message authentication code (HMAC)
– The keys are based on a secret key and a counter
• Token*-based authentication - a device that employs an encrypted key for which the encryption algorithm—the method of generating an encrypted password—is known to a network’s authentication server.
– The hash is different every time
• Hardware and software tokens available
– You’ll need additional technology to make this work

A

HMAC-based One-Time Password algorithm (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
• A voice call provides the token
– The computer is talking to you
– “Your code is 1-6-2-5-1-7.”
• Similar disadvantages to SMS
– [this] can be intercepted or forwarded
– Phone number can be added to another phone
A

Phone call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a method of computer program debugging that is done by examining the code without executing the program. The process provides an understanding of the code structure and can help ensure that the code adheres to industry standards.
• Authentication factors that don’t change
– You just have to remember
• Personal Identification Number (PIN)
– Your secret numbers
• Can also be alphanumeric
– A password or passphrase

A

Static codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a physical electronic authorization device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip.
• Integrated circuit card - Contact or contactless
• Common on credit cards - Also used for access control
• Must have physical card to provide digital access
– A digital certificate
• Multiple factors
– Use the card with a PIN or fingerprint

A

Smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
biological measurements — or physical characteristics — that can be used to identify individuals. 
• Fingerprint scanner
– Phones, laptops, door access
• Retinal scanner
– Unique capillary structure in
the back of the eye
• Iris scanner
– Texture, color
• Voice recognition
– Talk for access
• Facial recognition
– Shape of the face and features
• Gait analysis - to assess and treat individuals with conditions affecting their ability to walk. It is also commonly used in sports biomechanics to help athletes run more efficiently and to identify posture-related or movement-related problems in people with injuries.
– Identify a person based on
how they walk
– Many unique measurements
• Veins
– Vascular scanners
– Match the blood vessels visible
from the surface of the skin
A

Biometric factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• False acceptance rate (FAR)*
– Likelihood that an unauthorized user will be accepted
– Not sensitive enough
• False rejection rate (FRR)*
– Likelihood that an authorized user will be rejected
– Too sensitive
• Crossover error rate (CER)*
– Defines the overall accuracy of a biometric system
– The rate at which FAR and FRR are equal
– Adjust sensitivity to equalize both values

A

Biometric acceptance rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
• Identification
– This is who you claim to be
– Usually your username
• Authentication
– Prove you are who you say you are
– Password and other authentication factors
• Authorization
– Based on your identification and authentication,
what access do you have?
• Accounting
– Resources used: Login time, data sent
and received, logout time
A

AAA framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

• Cloud-based security
– Third-party can manage the platform
– Centralized platform
– Automation options with API integration
– May include additional options (for a cost)
• On-premises authentication system
– Internal monitoring and management
– Need internal expertise
– External access must be granted and managed

A

Cloud vs. on-premises authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
an authentication system that requires more than one distinct authentication factor for successful authentication. Multi-factor authentication can be performed using a multi-factor authenticator or by a combination of authenticators that provide different factors.
• Factors
– Something you know
– Something you have
– Something you are
• Attributes
– Somewhere you are
– Something you can do
– Something you exhibit
– Someone you know
A

Multi-factor authentication

17
Q
a MFA factor:
• Password
– Secret word/phrase, string of characters
– Very common authentication factor
• PIN
– Personal identification number
– Not typically contained anywhere on a
smart card or ATM card
• Pattern
– Complete a series of patterns
– Only you know the right format
A

Something you know

18
Q
a MFA factor:
• Smart card
– Integrates with devices
– May require a PIN
• USB token - Certificate is on the USB device
• Hardware or software tokens
– Generates pseudo-random authentication codes
• Your phone -SMS a code to your phone
A

Something you have

19
Q
a MFA factor:
• Biometric authentication
– Fingerprint, iris scan, voice print
• Usually stores a mathematical representation
of your biometric
– Your actual fingerprint isn’t usually saved
• Difficult to change
– You can change your password
– You can’t change your fingerprint
• Used in very specific situations
– Not foolproo
A

Something you are

20
Q

a MFA attribute:
• Provide a factor based on your location
– The transaction only completes if you are in a
particular geography
• IP address
– Not perfect, but can help provide more info
– Works with IPv4, not so much with IPv6
• Mobile device location services
– Geolocation to a very specific area
– Must be in a location that can receive GPS
information or near an identified mobile
or 802.11 network
– Still not a perfect identifier of location

A

Somewhere you are

21
Q
a MFA attribute:
• A personal way of doing things
– You’re special
• Handwriting analysis
– Signature comparison
– Writing technique
• Very similar to biometrics
– Close to something you are
A

Something you can do

22
Q
a MFA attribute:
• Something you exhibit
– A unique trait, personal to you
– Gait analysis - the way you walk
– Typing analysis - the way you hit the
enter key too hard
• Someone you know
– A social factor
– It’s not what you know…
– Web of trust
– Digital signature
A

Other attributes