Authentication and Authorization Flashcards

1
Q

What are some examples of Identity?

A

A name, user name, or identification number.

Anything that states who you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of Authentication?

A

A password, fingerprint, or smartcard.

Anything that allows you to prove you are who you say you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 5 authentication factors.

A
  1. Something you know
  2. Knowledge-based authentication
  3. Something you have
  4. Something that you are
  5. Somewhere you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give some examples of something you know.

A

Something you can do or someone you know.

Password, PIN, Q&A, or a pattern (on a phone or a tablet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give some examples of knowledge-based authentication (KBA).

A

Static KBA - Something you know and set up ahead of time

For example, a password, PIN, Q&A, or a pattern

Dynamic KBA - Something that you didn’t set up ahead of time

For example, last 4 of SSN or last 4 of phone number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give some examples of something you have.

A

A Yubi Key or a RFID card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give some examples of something that you are.

A

Something that you exhibit

Fingerprint, facial recognition, or retina scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give some examples of somewhere that you are.

A

A subnet or geographic location

Locations can be physical or logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Multi-factor authentication (MFA)?

A

Two or more different authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is authorization? Give some examples.

A

What you are allow to access. Permissions.

Reading or marking documents, logging onto a workstation, or printing to a printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is accounting? Give some examples.

A

Keeping a record of what has been accessed or done.

Event logs, security logs, or audit logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does IAAA stand for?

A

Identity, Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give some examples of password keys used for authentication management.

A

Yubikey (external)
Mobile Devices (external)
Biometrics (internal)
Can be external
USB thumbprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are password vaults in authentication management?

A

Where passwords are stored on the OS. Protected login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Trusted Platform Modules (TPM)?

A

An embedded crypto-microcontroller. A CPU that hold encryption information. It stores authentication artifacts (i.e. passwords, encryption keys, certificates, and platform configuration states).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Hardware Security Modules?

A

A hardware-based appliance. It manages cryptographic information (i.e. securing keys, encryption and decryption, authentication, and digital signing).