CH4 Flashcards
The security features that govern how users and processes communicate and interact with systems and resources. The primary function is to protect information from unauthorized access (confidentiality), modification (integrity), or disruption (availability).
Access Controls
Used to identify unique records in a set, such as a username. This is the process of the subject supplying an identifier to the object.
Identification
This is how identification is proven to be genuine. The process of the subject supplying verifiable credentials to the object.
Authentication
Defines how access rights and permissions are granted. The process of assigning authenticated subjects the permission to carry out a specific operation.
Authorization.
States that all users - whether they are individual contributors, managers, directors, or executives - should be granted only the level of privilege they need to do their jobs, and no more.
Principle of least privilege
An administrative control that dictates that a single individual should not perform all critical - or privileged-level duties. Important duties must be separated or divided among several individuals within the organization.
Separation of duties
List 4 key concepts of identification.
Identities should be unique, nondescriptive, securely issued AND Identities can be location based.
What are the 3 categories of factors
knowledge (something the user knows), possession (something the user has), inherence (something the user is).
A knowledge-based authentication that requires a user to answer a question based on something familiar to them.
cognitive password
With this type of authentication, a user is asked to provide proof that he owns something specific (security badge, token, smart card, etc.).
Authentication by ownership or possession.
An authentication method that holds user info within a magnetic strip and relies on a reader to process the info. The user inserts the card into the reader and supplies their PIN.
Memory Card
Similar to memory card, this has a microprocessor and integrated circuits. The user inserts the card into a reader, enters pin.
Smartcard
This type of authentication requires communication over a channel that is distinct from the first factor.
Out-of-band authentication
Authenticates a user based on some physical or behavioral characteristic, sometimes referred to as a biometric attribute.
Authentication by Characteristic
Authentication in which 2 or more factors must be presented.
Multi-factor Authentication
Company acquired by Cisco that has a very popular multifactor authentication solution.
Duo Security
With this Duo product, you can configure Trusted Endpoints policies to check the posture of the device that is trying to connect to the network, application, or cloud resources.
Duo Beyond
This Duo product provides multifactor authentication access to cloud applications using SAML.
Duo Access Gateway
This concept assumes that no system or user will be “trusted” when requesting access to the corporate netowrk, systems, and applicatinos hosted on-prem or in the cloud. You must first verify their trustworthiness before granting access.
Zero Trust
What are the 3 primary authorization models
object capability, security labels, and ACLs