AAA in Cyber Security Flashcards

1
Q

What are the following terms?
* Single Factor Authentication
* Two Factor Authentication
* Multi Factor Authentication
* Single Sign On

A
  • Use of a method for authentication such as Login Credentials.
  • Use of two methods for authentication such as Login Credentials, Biometrics.
  • Use of Multiple factors for authentication such as Login Credentials, biometrics, keycards, tokens.
  • Single Sign on is an authentication process that allows a user to log in once and gain access to applications and services, without the need to log in again for each one. e.g: Google Account.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s a Password Manager?

A

Is an application that helps to store different secure passwords and use them easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the difference between Discretionary Access Control, Role-Based Access Control, Mandatory Access Control (MAC)?

A
  • Discretionary Access Control is a security model where user permissions and security policies are decided by the owner of resource.
  • Role-Based Access Control is a security model where user permission are assigned based on job positions.
  • Mandatory Access Control (MAC) is a security model where user permissions are assigned and determined by a centralized administrator.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the difference between Administrative, Standard User, Guest User and Group Accounts?

A
  • Administrative Account is a user account with highest privileges and level of access and can make system-wide changes.
  • Standard User Account is an account assigned to an individual and has certain privileges and permissions assigned by an adminsitrator.
  • Guest User account is an account assigned to an individual who needs to access the system and use resources temporarily.
  • Group Accounts is an account that makes users belong to a certain group within an organisation and are pre-assigned certain permissions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the ways to achieve non-repudiation with:
* Video
* Biometrics
* Signature
* Receipt

A
  • CCTV and Security Systems.
  • Fingerprint and Retinal Scans.
  • Documents signed whether physical or digital.
  • Receipt: Transactions and banking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the difference between Plain Text and Cipher? What’s the difference between Symmetric and Asymmetric Data? What’s Public Key Infrastructure?

A
  • Plain text is data that is easily readable.
  • Cipher is encrypted data that can’t be read.
  • Symmetric Encryption is the use of the same key to encrypt and decrypt data.
  • Asymmetirc Encryption is the use of different keys for encryption or decryption of data.
  • Public Keys are Framework that manages digital keys and certificates used for secure communication and authentication over networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly