5 Identity and Access Flashcards

1
Q

authentication factors

A

1 know
2 have
3 be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cognitive pw

A

series of questions to restore forgotten pw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

tokens

A

synchronous dynamic token: time based, periodically regenerated. MOST RELIABLE FOR REMOTE ACCESS

asynchonous dynamic token: counter based, regeneration per use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

biometric

A

type 1: false rejection
type 2: false acceptance (WORSE!)

-> CER Crossover Error Rate indicates overall accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSO

A
LDAP
Kerberos
FidM
SESAME
KryptoKnight
OAuth, OpenID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LDAP

X500

A

Microsoft AD
TCP/UDP 389
supports TLS and connection authentication
trusts between domains possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Kerberos

A
  • provides confidentiality and integrity for authentication traffic
  • no eavesdropping, replay possible
  • uses symmetric keys only -> SCALABILITY!
    plaintext storage of all symmetric keys
  • identity of all participiants is assured
  • KDC maintains keys for all network members
  • TGS grants TGT (prooves that a subject has authenticated at KDC and is authorized to request tickets)
  • Ticket provides proof, that a subject is authorized to access an object
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Federated Identity Management

FIdM

A

multiple organizations use a SSO system together and identities are shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SESAME

A

ticket based authentication
fixed weaknesses in kerberos (no plaintext storage of sym keys, uses public key krypto, better scalability and more secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

KryptoKnight

A

ticket based, 2p2 authentication system by IBM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OAuth, OpenID

A

open authentication standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SAML

A

Security Assertion Markup Language
XML-based to exchange authorization and authentication info between federated organizations to provide SSO

assertion
protocol
binding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SPML

A

similar to SAML, is able to dislay LDAP-based info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RADIUS

A

UDP 1812/1813 or 1645/1646
encrypts pw only
provides callback security
can also be used between network access server (client) and shared authentication server (server)

accept
reject
challenge (token, caller ID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Diameter

A

TCP 3868
more flexible, scalable and secure than radius
not backward compatible, supports IP, VoIP and more
supports IPSEC and TLS
good for wireless roaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TACACS+

A

open public protocol, most used
TCP:49
encrypts entire payload, separates authentication and authorization
uses static pw, two factor auth is possible

17
Q

hybrid attack on pw

A

change dictionary words before cracking, for example o to 0.
provides fastest crack for complex passwords, like root pws

18
Q

authorization mechanisms

A

context dependent: restrict access based on context (time, location) or conditions (after payment)

content dependent: restrict access based on content (database view, own personnel info)

constrained interface: restrict what users can do or see based on privilege

19
Q

DAC

IDENTITY BASED

A

discretionary AC:
controlled by owner, permissions are maintained in ACLs
owners can easily change permissions -> flexible
used in standalone unix/windows system

20
Q

Nondiscretionary AC

A

RBAC: role based using groups based on job description (AD)

Taskbased: similar, but focuses on tasks, not on roles

21
Q

MAC

A

mandatory AC:
use of classification labels
different security domains and clearences -> focusd on confidentiality

lattice-based MAC possible (more granular)
Hierarchical | + Compartmentalized = Hybrid Environment

22
Q

APT

A

Advanced Persistent Threat

highly skilled and equiped attackers
often funded by gov, advanced knowledge

23
Q

additional access control objectives

A

reliability and utility

24
Q

microprobing

A

analysis of inner smart card circuits