2.4 Authentication & authoriaztion Flashcards

1
Q

Authentication methods: what is directory services ?

A

It is a central database used by many operating system to stores usernames, passwords, computers, printers and devices that might connected to network.
This is a large distributed DB constantly updated over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication methods: why directory services is useful in authentication ?

A

All authentication request are referenced in this directory. So once someone try to login, it check the credentials against this DB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication methods: what are the most common directory services in use?

A

Microsoft Active Directory use with the Kerberos protocol or LDAP to be able to access that DB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication methods: what is federation ?

A

When you allow someone to authenticate to your network using credential that are stored with a 3rd party.
Ex: login with google, facebook account etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication methods: how to set up federation authentication method ?

A

Need to coordinate the authentication and authorization process between your organization & the 3rd party providing the credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication methods: what is attestation ?

A

It prove the hardware that you are connecting with into the network is trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication methods: what is remote attestation ?

A

It is the automated process for attestion. It:
- provide an operational report to a verification server
- encrypt and digitally signed the TPM
- an IMEI or other unique hardware component can be included in the report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication methods: how SMS are used when you want to authenticate ?

A

A text message (login factor) can be sent to a predefined nb to confirm the authentication.
Ex: you try to login to an app and the app send you a code to enter allowing you to authenticate you on the app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication methods: what security issues exist with SMS authentication ?

A
  • Phone nb can be reassigned to a different phone
  • SMS can be intercepted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication methods: what is a push notification ?

A

Similar process to an SMS notification: authentication factor is pushed to a specialized app installed on another device (usually a phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication methods: what security issues exist with push notification ?

A
  • application cen be vulnerable
  • some push apps are not using encryption and send data in clear

However it is still more secure than SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication methods: what is a pseudo token generators?

A

A device (physical or app on the phone) that generate random nb on a periodic basis that you input while authenticate.
Ex: Sof had one when he worked at SG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication methods: what is a TOTP?

A

A technology use by pseudo token generator to generate the secret key on a timely basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication methods: what is a HOTP?

A

Similar to TOTP except that you have a time secret key and never use it again (it doesn’t change every 30 min)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication methods: what is a static codes ?

A

An authentication factor that don’t change (ex: PIN, password, passphrase, smard card that you slide in your computer to gain access like in SG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Biometrics: what biometric authentication refers to ?

A

Something you are:
- fingerprint (phone, laptop),
- retinal,
- iris,
- voice recognition,
- facial recognition,
- gait analysis (identify a person based on how they walk
- vein (vascular scaners that match the blood vessels visible from the surface of the skin)

17
Q

Biometrics: what is a false acceptance rate (FAR) ?

A

This is how often the system will approve an unauthorized user by looking at the biometrics values

18
Q

Biometrics: how to prevent false acceptance rate (FAR) ?

A

By increasing the biometric sensitivity level

19
Q

Biometrics: what is a false rejection rate (FRR) ?

A

Likelihood that an authorized user will be rejected

20
Q

Biometrics: how to prevent false rejection rate (FRR) ?

A

By decreasing the sentivity of the biometric system

21
Q

Biometrics: what is a crossover error rate (CER) ?

A

It defines the overall accuracy. This is the rate at which FAR and FRR are equal.
The biometric system should be adjust to equalize both values.

22
Q

Multi-factor authentication: what is AAA framework?

A

AAA stand for:
- Authentication: Prove who you are with password or other authentication factors (ex: biometry)
- Authorization: based on your identification and authentication, what access do you have
- Accounting: keeping track af resources used while authenticated (login time, data sent/received, logout time)

23
Q

Multi-factor authentication: what are the differences between cloud vs on-premises authentication?

A
  • Cloud: centralized platform that might include an API integration to have application access this and provide the same authentication to the centralized DB
  • On-premises: internal monitoring and management, external access must be granted and managed
24
Q

Multi-factor authentication: what are the different factors when authenticate ?

A

What you know is associated with an individual. 3 factors:
- Something you know: password, PIN, pattern
- Something you have: smart card, USB token, hardware/software tokens, phone
- Something you are: biometric authentication

25
Q

Multi-factor authentication: what are the different attributes you can add to factors when authenticate ?

A
  • Somewhere you are: provide a factor based on your location (IP address, mobile location)
  • Something you can do: a personal way of doing things (signature, writing)
  • Something you exibit: a unique trait, personal to you (gait analysis, typing analysis)
  • Someone you know: a social factor (web trust, digital signature)