2.4 Authentication and Authorization Design Concepts Flashcards
What is the best way to mitigate risks when using directory services in an application?
Use a single database
Each user should only have 1 set of credentials
Allows network access to other third-parties such as vendors, suppliers, etc. Third parties must establish a trust relationship with your network.
Federation
Verification that hardware on your network actually belongs to you. Can be set up to send operational reports to your server and can be encrypted using the TPM.
attestation
Why are SMS authentication methods vulnerable to login attacks?
Phone numbers can be spoofed
SMS messages can be redirected
Involves receiving an authentication notification on your phone. More secure than SMS.
Psuedo-random token generator on your phone to provide MFA.
Authentication app
A secret key generator for authentication that uses a secret key plus the time of day. Timestamp is synced with an NTP server and increments every 30 seconds. Utilized by Google, Facebook, Microsoft, etc.
Time-based One-time Password algorithm (TOTP)
Authentication method that uses an encrypted key and a sequenced counter to generate a hashed one-time password.
HMAC (Keyed-Hash message authentication code)
Authentication factors that don’t change such as a PIN number.
Static code
Name the 7 most common biometric authentication factors used.
Fingerprint
Retinal
Iris
Voice
Facial
Gait
Vein Patterns
What is the crossover error rate (CER) of a biometric authentication method in regards to the sensitivity of the scan?
Where the false acceptance rate (FAR) and the False rejection rate (FRR) meet
Strikes balance between sensitivity and errors
What are the 3 A’s of the AAA framework?
Authentication - proof you are who you say you are
Authorization - your allowed access
Accounting - resource tracking
What are the 3 MFA factors?
Something you know
Something you have
Something you are
What are the 4 MFA Attributes?
Somewhere you are
Something you can do
Something you exhibit
Someone you know
Example:
Password
PIN
Pattern
something you know