Chapter 14 Flashcards

1
Q

Kerberos

A

KDC (Key Distribution Center) -
Kerberos Authentication Server
- hosts KDC functions
- Ticket granting service
- authentication service
Ticket-granting Ticket for requesting Service Ticket
Tickets can expire
Kerberos principal - user or ticket requester
Uses AES
Uses and used by MS Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RADIUS

A

RADIUS:
- Encrypts password only
- UDP 1812/1813
RADIUS/TLS:
- for encrypting entire session
- TCP 2083

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TACACS+

A

Open standard
Created by Cisco
TCP 49
Separates AAA into their own services
Encrypts all auth info, not just password
Better than RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internal SSO protocols
(AAA)

A

Kerberos (most common)
RADIUS
TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet/Web SSO protocols

A
  1. SAML - authentication and authorization assertions (exchanged info)
    - Principal, Service Provider, Identity Provider
  2. OAuth - authorization only; uses tokens
  3. OpenID - authentication; ID provider
  4. OpenID Connect (OIDC) - incorporates OAuth for authorization; JWT for tokens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permission - usually for info object e.g. file
Right - action
Privilege - permission + right

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access control matrix (ACL) - focus on objects
Capability table - focus on user/subject

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Content-dependent access controls - restrict access to data based on the content within an object.
  2. Context-dependent access controls - require specific
    activity before granting users access.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Control Types

A
  1. Discretionary access control - managed by owner via ACL’s
  2. Non-discretionary access control - centrally managed by admin
  3. Role-based
  4. Rule-based - used in firewalls
  5. Attribute-based - more advanced implementation of rule-based; used by SDN
  6. Mandatory access control - uses labels; lattice; Hierarchical, Compartmentalized, Hybrid
  7. Risk-based - considers environment, situation, security policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Control attacks

A

Password attack
Brute-force attack
Spraying attack - circumvent lockouts by rotating across diff accounts
Credential stuffing - try compromised user credentials on other sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly