Ch3 Identity and Access Management Flashcards
Authentication is
proving you have rights to a system
Authorization is
proving which rights you have to a system
the main 3 Authentication factors are _____ another two are ___
something you know, something you have, something about you; something you do and somewhere you are
combining different types of authorization is called ____ authorization
multifactor
_______ is a system where a central authority decides that since you are trusted on one system, you can be trusted on another
Federated Trust
______ are things you can do that have been assigned to you
Permissions
_____ are things that everyone on a system can do
rights and privileges
the idea that just because you need access to data doesn’t mean you need to be able to delete it is an example of _____
least privilege
having one person in charge of recording earnings and a different person in charge of payroll is an example of ____
separation of duties
_____ access control might use a label, such as “top secret”
mandatory
in ____ access control the owner of the data decides who has access to what
discretionary
_____ access control defines access according to rules for groups of people
role-based (RBAC)
____ means assuming you are not permitted to do something unless you are listed
implicit deny
a good password security policy will address which 3 topics?
complexity, expiration and history
in windows ___ you can set rules for passwords, logins and lockouts
local security policy
windows ___ are like local security policy, but can work across an active directory in windows network server
group policy objects
in Linux, use the command ___ to see the permissions for all the files in a directory
“ls -l”
in Linux, permission rights for an object are shown by the three characters ___ repeated 3 times for the ___, ___ and ___ respectively
rwx; owner; group; everyone else
to give full permissions in Linux to the owner, but only read permissions to groups and others, use the alphabetical command _____ or the numeric command _____
chmod g=r FileName; chmod 744 FileName