Authentication and Authorization Flashcards
What are some examples of Identity?
A name, user name, or identification number.
Anything that states who you are.
What are some examples of Authentication?
A password, fingerprint, or smartcard.
Anything that allows you to prove you are who you say you are.
Name 5 authentication factors.
- Something you know
- Knowledge-based authentication
- Something you have
- Something that you are
- Somewhere you are
Give some examples of something you know.
Something you can do or someone you know.
Password, PIN, Q&A, or a pattern (on a phone or a tablet)
Give some examples of knowledge-based authentication (KBA).
Static KBA - Something you know and set up ahead of time
For example, a password, PIN, Q&A, or a pattern
Dynamic KBA - Something that you didn’t set up ahead of time
For example, last 4 of SSN or last 4 of phone number
Give some examples of something you have.
A Yubi Key or a RFID card
Give some examples of something that you are.
Something that you exhibit
Fingerprint, facial recognition, or retina scanner
Give some examples of somewhere that you are.
A subnet or geographic location
Locations can be physical or logical
What is Multi-factor authentication (MFA)?
Two or more different authentication methods.
What is authorization? Give some examples.
What you are allow to access. Permissions.
Reading or marking documents, logging onto a workstation, or printing to a printer.
What is accounting? Give some examples.
Keeping a record of what has been accessed or done.
Event logs, security logs, or audit logs
What does IAAA stand for?
Identity, Authentication, Authorization, and Accounting
Give some examples of password keys used for authentication management.
Yubikey (external)
Mobile Devices (external)
Biometrics (internal)
Can be external
USB thumbprint
What are password vaults in authentication management?
Where passwords are stored on the OS. Protected login credentials.
What is a Trusted Platform Modules (TPM)?
An embedded crypto-microcontroller. A CPU that hold encryption information. It stores authentication artifacts (i.e. passwords, encryption keys, certificates, and platform configuration states).