Access Control ch 5 Flashcards
OTP
One time password
SAML
Security Assessment Markup Language
Oath
Your word to work within ethics
Tacacs/tacacs+/xtacacs
This is a client server oriented environment, and it operates in a manner
5 primary methods of control
MAC-mandatory access control-all access predefined
DAC-discretionary access control- incorporates some flexibility
RBAC-role based all the users role to dictate access capabilities
RBAC-rule based-limits user to preconfigured policies-Dental but those on this list/ or spec appear
ABAC-Attribute-based-considers all of the various attributes associated w the subject and object in making the access control decision. Nist 800-162
Smart cards-Difficult to counterfeit
Piv-personal identification verification card
End of chapter
Wireless threat terms
A
802.1x
Ieee standard that defines port-based security for wireless network access
AP
Access point-point at which access to a network is accomplished.often in relation to a wireless access point
Bluejacking
The sending of unsolicited messages over a Bluetooth connection
Bluesnarfing
Gaining of unauthorized access through a Bluetooth connection
Disassociation
And attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network
Dos attack de authentication attack
Evil twin
And attack in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit.
Interference
The byproduct of electrical processes. One common form of interference is radio frequency interference (RFI), which is usually projected across a radio spectrum.
IV attack
And attack that involves looking at repeated results in order to crack the WEP secret key.
Initialization vector in wired equivalent privacy RC4 encryption 24 bit
TKIP temporal key integrity protocol was employed to strengthen wep. 128 bit based on MAC address of destination device and sn of the packet. Backward compatible