Chapter 13- Managing Identity and Authentication (IAM) Flashcards

1
Q
  1. What is a subject?
A

Subject is an active entity that accesses a passive object to receive information from or data about an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Subject can be:
A

users, programs, processes, services, computers or anything that can access a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. List company assets:
A

information (data), systems (IT e.g. fileserver), devices (servers, laptops), facilities (building) and personnel (staff)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What is an object?
A

Object is a passive entity that provides information to active subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Examples of objects are:
A

files databases, computers, programs, processes, services, printers and storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is the primary reason why organizations implement access control mechanisms?
A

to prevent losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. There are 3 categories of IT losses:
A

Loss of confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. List security Triad (aka AIC triad, CIA Triad):
A

Confidentiality, Integrity and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is confidentiality?
A

Access Controls help ensure that only authorised subjects can access objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is integrity?
A

Integrity ensures that data or system configurations are not modified without authorization or that is authorized changes occur security controls detect the changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is availability?
A

Availability means that authorised requests for objects must be granted to subjects within a reasonable amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Types of access control:
A

corrective, preventive and detective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is Access Control?
A

Access Control is any hardware, software, administrative policy or procedure that controls access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. List 4 other types of control
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is Preventive Control:
A

Preventive Control attempts to thwart or stop unwanted or unauthorised activity from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. What is Detective Access Control?
A

Detective attempts to discover or detect unwanted or unauthorised activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. What is Corrective Access Control:
A

Corrective Control modifies the environment to return the systems to normal after an unwanted or unauthorised activity has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. What are Deterrent Control?
A

Deterrent Access Control attempts to discourage security policy violations. it is very similar to preventive controls but depends on individuals deciding not to take unwanted action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. What is Recovery Access Control?
A

Recovery Access Control attempts to repair or restore resources, functions and capabilities after a security policy violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. What is Directive Access Control?
A

Directive Access Control attempts to direct, confine or control the actions of subjects to force or encourage compliance with security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. What are Compensating Access Control
A

A compensating Access Control provides an alternative when it is not possible to use a primary control. or when necessary to increase the effectiveness of a primary control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. List access control types based on implementations:
A

physical, technical and administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. What are Administrative Access Controls?
A

Administrative Access controls are policies and procedures defined by an organisation’s security policy and other regulations or requirements. They are sometimes referred to as management controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. What is Logical or Technical Access Control?
A

Logical Access Control are the hardware or software mechanisms used to manage access and to provide protection for resources and systems. e.g. authentication methods, encryption, access control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. What is Physical Control?
A

Physical Access Control are item that you physically touch. They include physical mechanisms deployed to prevent, monitor or detect direct contact with systems or areas within a facility. e.g. mantraps, motion detectors, badges etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. What is Identification?
A

Identification is the process of a subject claiming or professing an identity. e.g. typing a user name, swiping a smartcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. What is Authentication?
A
  1. Authentication verifies the identity of the subject by comparing one or more factors against a database of valid identities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. What is a single two step process?
A

A single two-step process occurs when identification and authentication occur together. Without both, a subject cannot gain access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. What is Authorization?
A

Authorization is a process where subjects are granted access to objects based on proven identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is accountability?

A

Accountability means that Users and other data subjects can be held accountable for their actions when auditing is implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Audit logs provide________:
A

Non Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. List all or nothing aspects of access control:
A

identification and authentication because you either pass or fail with this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. Auditing, logging and monitoring provide ________:
A

Accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. List 3 authentication factors:
A
  • Type 1 (weak): Something you know e.g. pin
  • Type 2: Something you have e.g. smartcard, token
  • Type 3 (stronger): Something you are or do e.g. fingerprints, keystroke dynamics i.e. behavioural biometrics.
  • *Somewhere you are- identifies subject’s location.
36
Q
  1. Describe Context-Aware Authentication.
A

. Mobile Device Management (MDM) systems use context-aware authentication to identify mobile device users. It can identify multiple elements such as the location of the user, the time of day, and the mobile device. If the user meets all the requirements (location, time, and type of device in this example), it allows the user to log on using the other methods such as with a username and password.

37
Q
  1. What is Cognitive Password?
A

Cognitive Password is a series of challenge questions about facts or predefined responses that only the subject should know. e.g. What is your mother’s maiden name?

38
Q
  1. Describe smartcards:
A

Smartcards is a credit-card sized ID or badge and has integrated circuit chip embedded in it. It is used for identification and authentication purposes.
• Most current smartcards include a microprocessor and one or more certificates.

39
Q
  1. What are hardware tokens?
A

Hardware tokens are password generating devices that users carry with them.

40
Q
  1. List 2 types of tokens:
A

Hardware tokens are password generating devices that users carry with them.

41
Q
  1. What are Synchronous Dynamic Password Tokens?
A

Synchronous Dynamic passwords are time based and synchronized with an authentication server

42
Q
  1. What are Asynchronous Dynamic Password Token?
A

Asynchronous Dynamic Password Tokens generates passwords based on an algorithm and an incrementing counter.

43
Q
  1. What are hardware token problems:
A

if the token or hardware breaks users will not be able to gain access.

44
Q
  1. List the standards that 2 step authorization use:
A

Hash Message Authentication Code (HMAC) One-Time Password (HOTP)
• Time-based One Time Passwords (TOTP)

45
Q
  1. What is Hashed Message Authentication Code One-Time Passwords (HOTP)?
A

Hashed Message Authentication Code (HMAC) use HMAC-One Time Passwords to create onetime passwords. HOTP remains valid until used.

46
Q
  1. What are Time One Time Passwords (TOTP)?
A

Timed One Time Passwords are valid for a certain timeframe and expires if not used.

47
Q
  1. What is the difference between Retina Scans and Iris scans?
A

Retina scans focus on the pattern of blood vessels at the back of the eyes while IRIS scans focus on the coloured area of the eyes.

48
Q
  1. What is False rejection?
A

False Rejection occurs when a valid user is not authenticated. This also called False Negative.

49
Q
  1. What is False Acceptance Rate?
A

False Acceptance occurs when an invalid subject is authenticated. This also known as false positive or Type II error.

50
Q
  1. What is False Rejection Rate (FRR):
A

False Rejection Rate (FRR) is the ratio of false rejections to valid authentications.

51
Q
  1. What is False Acceptance Rate?
A

False Acceptance Rate (FAR) is the ratio of false positives to valid authentications.

52
Q
  1. What is Enrolment (Registration) of biometrics?
A

Enrolment or Registration allows a biometric device to work as an identification and authentication mechanism

53
Q
  1. What is Reference Profile?
A

Reference Profile or Template is the stored sample of a biometric factor.

54
Q
  1. What is the throughput rate for biometrics?
A

The throughput rate is the amount of time the system requires to scan a subject and approve or deny access.

55
Q
  1. What is multi-factor authentication?
A

this is any authentication using 2 or more factors

56
Q
  1. What is Centralised Access Control?
A

Centralised Access Control implies that all authorisation verification is performed by a single entity within the system.

57
Q
  1. What is decentralised Access Control
A

Decentralised Access control implies that various entities throughout a system perform authorization verification. (Distributed Access Control).

58
Q
  1. What is Single Sign On (SSO)?
A

Single Sign On is a centralised access control technique that allows a subject to be authenticated once on a system and to access multiple systems without authenticating again

59
Q
  1. Disadvantage of Single Sign On (SSO)?
A

Once an account is compromised an attacker gains unrestricted access to all other authorised resources

60
Q
  1. Public-Key Infrastructure (PKI) uses ______ when integrating digital certificates into transmission.
A

Lightweight Directory Access Protocol (LDAP)

61
Q
  1. What is Public Key Infrastructure?
A

This is a group of technologies used to manage digital certificates during a certificate lifecycle

62
Q
  1. ________ and __________ can be used to support single sign on capabilities:
A

Lightweight Directory Access Control (LDAP) and Centralised access control systems.

63
Q
  1. what is ticket Authentication?
A

Ticket Authentication is a mechanism that employs third party entity to prove identification and provide authentication. the most common ticket system is Kerberos.

64
Q
  1. What is Kerberos?
A

Kerberos is a single sign on solution for users and provides protection for log on credentials.
• Kerberos provides confidentiality and integrity for authentication traffic.
• it helps protect against eavesdropping and replay attacks.

65
Q
  1. List 5 key elements of Kerberos:
A
Key Distribution Center
•	Kerberos Distribution Center (KDC)
•	Kerberos Authentication Server
•	Ticket-Granting Ticket (TGT)
•	Ticket
66
Q
  1. What is Key Distribution Center (KDC)?
A

Key Distribution Center is a trusted third party that provide authentication services. Uses symmetric cryptography.

67
Q
  1. What is Kerberos Authentication Server?
A

Kerberos Authentication Server hosts the function of the key Distribution Center (KDC): a Ticket Granting Service (TGS) and Authentication Service (AS)

68
Q
  1. What is Ticket Granting Ticket (TGT):
A

a Ticket Granting Ticket (TGT) provides proof that a subject has authenticated through a Key Distribution Center (KDC) and is authorised o request tickets to access other objects.

69
Q
  1. What is a ticket?
A

A ticket is an encrypted message that provides proof that a subject is authorised to access an object.

70
Q
  1. Disadvantage of using Kerberos?
A

Single Line of Failure if it stops working.

71
Q
  1. What is Security Assertion Markup Language (SAML)?
A

Security Assertion Markup Language (SAML) is an XML based language that is used to exchange authentication and authorisation between federated organisations. it is used to provide SSO for browser access.

72
Q
  1. What are Credential Management Systems?
A

Credential Management System provides a storage space for users to keep their credentials when Single Sign On is not available.

73
Q
  1. What is Identity as a Service (IDaaS)?
A

Identity as a Service or Identity and access as a service (IDaaS) is a third party service that provides identity and access management.
• IDaaS effectively provides SSO for the cloud and is especially useful when internal clients access cloud-based software as a service (SaaS) applications. e.g. google, Office 365

74
Q
  1. What are AAA Protocols?
A

Protocols that provide Authentication, Authorisation and Accounting are referred to as AAA Protocols.
• These provide centralized access control with remote access systems such as virtual private networks (VPNs) and other types of network access servers.

75
Q
  1. What is Remote Authentication Dial-in User Service (RADIUS)?
A

Remote Authentication Dial-in User Service centralizes authentication for remote connections. Many internet service providers (ISPs) use RADIUS for authentication.
• RADIUS uses the User Datagram Protocol (UDP).

76
Q
  1. What is Terminal Access Controller Access Control Systems (TACACS+)?
A

Terminal Access Controller Access Control Systems was introduced as an alternative to RADIUS.
• It separates authentication, authorization, and accounting into separate processes, which can be hosted on three separate servers if desired.
• TACACS+ encrypts all of the authentication information.
• TACACS and XTACACS use UDP port 49
• TACACS+ uses Transmission Control Protocol (TCP) port 49.

77
Q
  1. What is Diameter?
A

It supports a wide range of protocols, including traditional IP, Mobile IP, and Voice over IP (VoIP).
• Diameter uses TCP port 3868 or Stream Control Transmission Protocol (SCTP) port 3868
• It also supports Internet Protocol security (IPsec) and Transport Layer Security (TLS) for encryption.

78
Q
  1. What is excessive privilege?
A

excessive privilege occurs when users have more privileges than their work tasks dictate. Unnecessary privileges should be revoked.

79
Q
  1. What are creeping privileges?
A

Creeping privileges (privilege creep involves a user account accumulating privileges over time as job roles and assigned tasks change but unnecessary privileges are never removed.

80
Q
  1. What is the principle of Least Privilege?
A

The principle of least privilege ensure that subjects are granted only the privileges that they need to perform their wok tasks and job functions but no more.

81
Q

a

A

a

82
Q

a

A

a

83
Q

a

A

a

84
Q

a

A

a

85
Q

a

A

a