chapter 2 Flashcards
Basic Security Requirement
Derived Security Requirement
identify information system users, processes acting on behalf of users, or devices.
2 Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite
to allow access to organizational information systems.
- use multifactor authentication
- Enforced a minimum password complexity and change of characters when new passwords are created.
NIST authentication architectural model
1 Registration authority
2 relying party
3 credential service provider
4 relying party
Four means of authenticating user identity
Something the individual knows
something the individual possesses
something the individual is
something the individual does
Risk Assessment for User authentication
Assurance level = should increase as risk increases
Potential impact
Areas of risk = include the ability to operate, asset damage, financial loss, harm to individuals
SP 800-63-3
SP 800-63A
SP 800-63B
SP 800-63C
Digital identity guidelines
Enrollment and identity proofing
authentication and lifecycle management
Federation and Assertions
Identity Assurance Level
IAL1
IAL2
IAL3
Self-asserted
either remote or in-person
In-person identity proofing is required
Authentication Assurance Level
AAL1
AAL2
AAL3
AAL1 uses single-factor authentication.
Proof of possession and control of two-factor authentication
Proof of possession of a key through a cryptographic protocol
Password-Based Authentication is used in access control systems
Guess-Verify attacks
Keyloggers
Phishing
Social Engineering
1st = use some leaked information about passwords
Directly obtain the password
Guess verify Attack
- Online guessing
- Offiline guessing
Send a guess and receive the response in real-time
Obtain a password file/table, try guesses against the file
Lateral Movement
Privilege escalation
attack “weakest” door, and then move laterally to
target
get access to any “weak” account, then exploit
bug/design flaw/configuration oversight to gain elevated access to
resources that are normally protected from app/user