3.7 Flashcards
Identity
Each person needs some form of identification so that they can prove who they are; this could be a username, smart card, or some sort of biometric control. It needs to be unique to the person using that form of identity.
Identity provider
An identity provider (IdP) is an entity that can validate that the credentials that are presented. The identification could be a certificate, token, or details such as a username or password. IdP is used by cloud providers who use federation services to validate the identity of a user. An example of this is that they would use SAML to pass credentials to the IdP to validate their identity.
Attributes
This is a unique variable that the user has in their account details, for example, an employee ID.
Certificates
This is a digital certificate where two keys are generated, a public key and a private key. The private key is used for identity.
Tokens
This is a digital token that can either be a SAML token used for federation services or a token used by Open Authentication (OAuth).
SSH keys
These are typically used by an administrator for secure authentication to a remote Linux server, instead of using username and password. First, a key pair (private and public key) is generated. The public key is stored on the server, with the private key remaining on the administrator’s desktop.
Smart Cards
A credit card token with a certificate embedded on a chip; it is used in conjunction with a pin.
User Account
A user account, also known as a standard user account, has no real access. They cannot install software – they give users limited access to the computer systems. There are two types of user accounts – those that are local to the machine, and those that access a domain. A domain is another name for a large group ofusers.
Shared and generic accounts/credentials
Shared Account: When a group of people performs the same duties, such as members of customer services, they can use a shared account. If you need to set up monitoring or auditing to individual employees, you must eliminate the practice of using shared accounts.
Generic accounts are default administrative accounts created by manufacturers for devices ranging from baby alarms to smart ovens and smart TVs. They all have default usernames and passwords. We should rename the default account name and change the password.
Guest Accounts
A guest account is a legacy account that was designed to give limited access to a single computer without the need to create a user account. It is normally disabled as it is no longer useful, and some administrators see it as a security risk.
Service Accounts
When software is installed on a computer or server, it needs higher levels of privilege to run the software, but at the same time, we need a lower-level administrative account, and the service account fits the bill. An example of this is an account to run an anti-virus application.
TIP
A service account is a type of administrator account used to run an application.
Account Policies
An account policy can act to ensure that the necessary steps are taken to enact a secure password solution, both by users and by the password infrastructure system.
Password Complexity
Complex passwords (sometimes known as strong passwords) are formatted by choosing three of the following four groups:
a. Lowercase: For example, a, b, and c
b. Uppercase: For example, A, B, and C
c. Numbers: For example, 1, 2, and 3
d. Special Characters Not Used in Programming: For example, $ and @
If I choose the password P@$$w0rd, then it contains characters from all four groups, but it would be cracked very quickly as most password crackers replace the letter o with a zero and replace an a with the @ sign.
Password History
This prevents someone from just reusing the same password. The maximum number that can be remembered is 24 passwords, as set in the screenshot. This would then mean that, when I set my first password, it would then need another 24 passwords before I could use it again.
Password reuse
Password reuse is a term used in the exam that means the same as password history. They both prevent someone from reusing the same password. Password history would be used for a Windows operating system and password reuse for any other products. An example of this could be a smartphone or an emailapplication.