Authentication & Acess Control Flashcards
What are the differences between identification and authentication?
When an entity identifies itself, it declares its identity
In Authentication, otherwise, the entity provides a proof that verifies its identity
What are the factors of authentication?
Something that the entity knows
Something that the entity has
Something that the entity is
What are some of the examples of the to know factor of authentication?
Password, Bing, secret handshake
What are some examples of the to have factor of authentication
Door key, smart card, token
What are some examples of the to be factor of authentication
Face, voice, fingerprints
What are the advantages and disadvantages of the to know factor?
Advantages: Low-cost, easy off deployment, low technical barrier
Disadvantages: Secrets can be stolen or snooped, guest, cracked
Based on the to know factor, how do we get to meaningful counter measures against possible attacks?
First, we need to estimate the most likely attack in this scenario. Accordingly choose the counter measures that are worth asking user to adhere to, relating also the cost of implementing it.
What are the advantages and disadvantages of the to have factor?
Advantages, human factor, relatively low cost, good level of security
Disadvantages, hard to deploy, can be lost or stolen
What are the advantages and disadvantages of the to be factor?
Advantages; high-level of security, requires no extra hardware to carry around
Disadvantages: hard to deploy, probabilistic matching, invasive measurement, can be cloned, privacy sensory, users with disabilities
What is the access control? Who does it and what are the requirements for it?
Access access control is a binary decision to allow or deny
The one that implement it is the reference monitor which enforces access control policies. The requirements for the reference monitor are: tamper proof, cannot be bypassed, small enough to be verified/tested
The reference monitor does therefore the authentication (verifies the identity of the user making the request) and the authorization (decision whether axis is granted or denied)
Requests to reference monitor come directly from the user or a user identity
True or false
False
Request to reference monitor do not come directly from user or a user identity, but from a process
How is called the active entity making a request within the system?
It is called the subject
What is the difference between a user and a subject?
A user is a person, whether a subject is a process running under a given user identity
What are the acces control models?
Discretionary access control (DAC)
Mandatory access control (MAC)
Role-based access control (RBAC)
Describe how a DAC works
Resource owner discretionarily decides its access privileges
Off the shelf OSs implement DAC