Chapter 16: Identity and Access Fundamentals Flashcards

1
Q

identification claim

A

username, account number, email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

authentication information

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

authorization

A

determines if a subject is given rights to carry out requested actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

three main types of factors for authentication

A

something a person knows (password), something a person has (token), something a person is (fingerprint)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

two additional factors

A

somewhere a person is (geolocation), something a person does (keystroke behavior)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

salts

A

random values added to plaintext passwords prior to hashing to add complexity and randomness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cognitive passwords

A

fact or opinion based questions, typically based on life experiences, used to verify an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type I biometric authentication error

A

a legitimate individual is denied access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type II error

A

an impostor granted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CER

A

crossover error rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

crossover error rate of a biometric authentication system

A

the point at which the false rejection rate (Type I errors) is equal to the false acceptance rate (Type II errors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ownership-based authentication

A

something a person owns, such as a token device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

token device

A

password generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

password generator

A

token device; handheld device with a display synchronized with an authentication server and displays to the user a one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OTP

A

one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

synchronous token device

A

requires the device and authentication service to advance to the next OTP in sync with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

asynchronous token device

A

requires a challenge/response scheme to authentication the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

memory card

A

holds information but cannot process information

19
Q

smart card

A

holds information and has the hardware and software to process that information

20
Q

password manager

A

password vault; solution to remembering a myriad of complex passwords

21
Q

JIT

A

just-in-time access

22
Q

just-in-time access

A

provisioning method which elevates users to the necessary privileged access to perform a specific task

23
Q

ASOR

A

authoritative system of record

24
Q

authoritative system of record

A

hierarchical tree-like structure system which tracks subjects and their authorization chains

25
Q

most commonly implemented directory services

A

Microsoft Windows Active Directory (AD)

26
Q

directory services

A

map resource names to their network addresses

27
Q

LDAP

A

Lightweight Directory Access Protocol

28
Q

SSO

A

single sign-on

29
Q

federated identity

A

portable identity and its associated entitlements which allow a user to be authenticated across multiple IT systems and enterprises

30
Q

IDaaS

A

Identity as a Service

31
Q

Identity as a Service

A

a type of Software as a Service (SaaS) offering which provides SSO, FIM, and password management services

32
Q

three identity management services approaches

A

on-premise, cloud-based, and hybrid

33
Q

biometrics

A

most expensive and most protection

34
Q

passwords

A

least protection, cheapest

35
Q

challenge/response protocol with token device

A

authentication service generates a challenge, smart token generates a response based on the challenge

36
Q

mutual authentication

A

user authenticates to system and system authenticates to user

37
Q

identification or authentication access control

A

biometrics

38
Q

directories used in identity management are

A

hierarchical and follow the X.500 standard

39
Q

Lightweight Directory Access Protocol

A

allows subjects and applications to interact with the directory; apps make LDAP request to the directory for information about a user, and users make LDAP requests for information about specific resources

40
Q

password synchronization

A

allows user to maintain one password across multiple systems

41
Q

biometric input for identity verification

A

app identifies points of data as match points, algorithm used to process the match points and translate it to numeric value, authentication approved or denied when the database value is compared with the end user input entered into the scanner

42
Q

FRR

A

false rejection rate; rejects authorized individual

43
Q

FAR

A

false acceptance rate; accepts impostor

44
Q

Type I error

A

FRR