3.8 - 3.9 Flashcards

1
Q

Password keys and vaults

A

Hardware based authentication, prevents unauthorized access, doesn’t replace ither factors

Password manager in one central location, secure storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trusted platform module

A

Tpm specification for cryptographic functions, with cryptographic processor and persistent memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hsm and kba

A

Hardware security module centralize all encryption keys and can offload cpu overhead from other devices

Knowledge based authentication uses personal knowledge as authentication can be static or dynamic something configured previously or questions are using identity verification service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pap and chap

A

Password authentication protocol check to see if credentials are valid is very old and sends through network in clear

Challenge handshake authentication protocol add encryption with three way handshake and uses challenge message and evaluates both challenge and password

Ms-chap Microsoft for point to point protocol pptp but can possible bruteforce, and use instead l2tp, ipsec or 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access services

A

Radius remote authentication dial in user service is a centralized authentication for users routers switches firewalls server authentication remote vpn access and 802.1x network access

Tacacs terminal access controller dialup time, so now used extended then tacacs+

Sso with kerberos use one time then trusted by system so it remembers

Radius, tacacs+ or kerberos? Depends what ur connected to, vpn concentrator may need radius, cisco may use tacacs and Microsoft may use kerberos

Network assess control 802.1x port based network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Federated identities

A

Federation all devices have same login creds

Security assertion markup language saml
Open standard for authentication and authorization to access third party resources. Not to be used with mobile apps

Oauth determines what resources will be used by third parties uses openid connect and oauth determines what resources to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access control

A

Mandatory access Control mac separate security levels and objects get a sec label and ppl assigned to those levels can access like secret, top secret etc

Discretionary access control dac ob ject is created and that object is tasked to a
Group or person like a spreadsheet

Role based access control rbac role of employee is assigned rights based on role

Attribute based access control abac different parameters is checked from a user trying to access like time, ip, actions and relation of user to data

Rule based access control generic term, sys admin. Sets rules associated with object like time of day or if using specific type of browser

File system security store and secure access and see the user rights and group rights from group policy

Conditional access new employee or partner and change rules
Based on conditional access

Privileged access management pam from admins to give access to admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Certificates

A

Web server ssl certs domain validation dv, extended validation cert ev with additional checks than dv, subject alternate name san add many diff dns names, wildcard domain *= www ftp ssl ect

Code signing certs received and install and validate from manufacture distributer if fails we can stop or cont

Root certs for starting pki need root certificate authority (ca)

Self signed certs to build our own certs and distribute to all devices internally

Machine and computer certs to all devices needing trust to see if devices contain certs or not to be trusted or not among large set of devices in org

Email certs encrypted from send and receive and used for digital signatures

User certs for every user can be used in id cards and use for additional authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cert formats

A

X.509 standards for structure of certs so can read all formats like

Der format or distinguished encoded rules

Pem privacy enhanced email so der in email form

Pkcs#12 to send many certs efficiently compatible with key pairs

Cer format used in windows

Pkc#7 .p7b file transfer over email but not for private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cert concepts

A

Online and offline ca
Ocsp online cert status protocol stapling check revocation status of certs

Pinning tls/ssl checking for someone in the middle to see if anything changed before or after transfer or network connection

Pki trust relationships single, hierarchical, mesh, web of trust, mutual authentication

Key escrow hand over keys to third party and access if validated by third party

Certificate chaining chain of trust starts with ssl cert and ends with root ca

How well did you know this?
1
Not at all
2
3
4
5
Perfectly