Access Control ch 5 Flashcards
OTP
One time password
SAML
Security Assessment Markup Language
Oath
Your word to work within ethics
Tacacs/tacacs+/xtacacs
This is a client server oriented environment, and it operates in a manner
5 primary methods of control
MAC-mandatory access control-all access predefined
DAC-discretionary access control- incorporates some flexibility
RBAC-role based all the users role to dictate access capabilities
RBAC-rule based-limits user to preconfigured policies-Dental but those on this list/ or spec appear
ABAC-Attribute-based-considers all of the various attributes associated w the subject and object in making the access control decision. Nist 800-162
Smart cards-Difficult to counterfeit
Piv-personal identification verification card
End of chapter
Wireless threat terms
A
802.1x
Ieee standard that defines port-based security for wireless network access
AP
Access point-point at which access to a network is accomplished.often in relation to a wireless access point
Bluejacking
The sending of unsolicited messages over a Bluetooth connection
Bluesnarfing
Gaining of unauthorized access through a Bluetooth connection
Disassociation
And attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network
Dos attack de authentication attack
Evil twin
And attack in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit.
Interference
The byproduct of electrical processes. One common form of interference is radio frequency interference (RFI), which is usually projected across a radio spectrum.
IV attack
And attack that involves looking at repeated results in order to crack the WEP secret key.
Initialization vector in wired equivalent privacy RC4 encryption 24 bit
TKIP temporal key integrity protocol was employed to strengthen wep. 128 bit based on MAC address of destination device and sn of the packet. Backward compatible
Jamming
Purposely obstructing or interfering w a signal
RFID
Radio frequency identification a technology that incorporates the use of electromagnetic coupling in the radio frequency portion of the spectrum to identify items uniquely(object, animal, person, credit cards)
NFC
Technology that enables communications between devices when they’re “touched” together. Often used to verify that the device is present.
Replay attack
And attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection
Rogue access point
Unauthorized
SSID
Service set identifier is used by the access point of a wireless LAN to identify itself and is intended to be unique for a particular area/entity on a network
Wi-FI
A wireless network operating 2.4 ghz or 5ghz range
WPS
authenticition
WEP
802.11b wireless
Wap
Rf clients