Chapter 2 Flashcards

1
Q

What is Authentication?

A

Proving identity with credentials such as a username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acronym

AAA

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is authorization?

A

Providing access to resources based on a proven identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting Methods

A

Tracking user activity and recording the activity in logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are audit trails used for?

A

Security professionals use audit trails to recreate the events that preceded a security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the FOUR factors of authentication

A
  1. Something you know
  2. Something you have
  3. Something you are
  4. Somewhere you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the least secure factor of authentication?

A

Something you know.

Knowledge can be stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give examples of common password requirements

A
  • minimum password length
  • password expiration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acronym

KBA

A

Knowledge-Based Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of KBA and what are they used for?

A
  1. Static KBA: Used to verify your identity when you forget your password(i.e. security questions)
  2. Dynamic KBA: Identifies individuals without an account(uses questions generated from real-time data about the user)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Acronym

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of attacks do account lockout policies prevent?

A

Brute force and dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Acronym

CAC

A

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a security key

A

A small electronic device the size of a remote key for a car that is used to authenticate to systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acronym

OTP

A

One Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Acronym

HOTP

A

HMAC-based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do Tokens using the HOTP algorithm stay in sync

A

Both the authentication server and the token use the algorithm with a shared secret key to generate the next code

Password doesn’t expire until it’s used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Acronym

TOTP

A

Time-based One Time Password

expire after a specified period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the strongest individual authentication factor?

A

Something you are (biometrics)

The strongest of the biometric methods are Iris and retina scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the biometric efficacy rate?

A

The performance of the system under ideal conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Acronym

FAR

A

False Acceptance Rate

The percentage of times false acceptance occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Acronym

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is false acceptance?

A

When a biometric system incorrectly identifies an unknown user as a registered user

24
Q

What is false rejection?

A

When a biometric system incorrectly rejects a registered user

25
# Acronym CER
Crossover Error Rate ## Footnote The point where the FAR crosses over with the FRR. A lower CER indicates that the biometric system is more accurate
26
# Acronym MAC
1. Media Access Control 2. Mandatory Access Control ## Footnote Media Access Control is related to the somewhere you are factor of authentication (think MAC address)
27
# Acronym PAM
Privileged Access Management
28
What is Account Management?
Creating, managing, disabling, and terminating accounts.
29
What are examples of account types? ## Footnote and credential policies
* Personnel/end-user accounts * Administrator and root accounts: multifactor authentication * Service accounts: password should not expire * Device accounts
30
What is the main issue with using shared accounts?
Shared accounts prevent effective identification, authentication, authorization and accounting
31
# Acronym PAM
Privileged Access Management ## Footnote Implements security controls over accounts with elevated privileges. i.e allowing authorized users to access the admin account without knowing the password, and logging all related activity
32
Why do account polices require administrators to have two accounts?
To prevent privilege escalation and other attacks
33
What are just-in-time permissions?
A concept implemented by PAM where administrators don't have administrative privileges until they need them
34
What are temporal accounts?
Temporary accounts with administrative privileges that are issued for a limited period of time created by PAM systems
35
What is deprovisioning?
The process used to disable a user's account when they leave the organization
36
What are time-based logins/time-based restrictions
Restrictions that prevent users from logging on or accessing network resources during specific hours
37
Account audit
identifies the privileges granted to users and compares them against what the users need
38
What is privilege creep?
occurs when a user is granted more and more privileges due to changing job requirements but unneeded privileges are never removed ## Footnote a.k.a Permission bloat
39
What is attestation?
A formal process for reviewing user permissions
40
# Acronym LDAP
Lightweight Directory Access Protocol ## Footnote Allows users and applications to retrieve information about users from the organization's directory
41
# Acronym SAML
Security Assertion Markup Language ## Footnote an XML based standard used to exchange authentication and authorization information between different parties. Provides SSO for web based applications
42
# Acronym XML
Extensible Markup Language
43
# Acronym IdP
Identity Provider ## Footnote Creates, maintains, and manages identity information, authentication, and authorization for principals
44
# Acronym SSO
Single Sign on
45
What is the primary purpose of SSO
The identification and authentication of users
46
# Acronym OAuth
Open standard for authorization
47
What does OAuth do?
Allows users to grant one service access to information in another service without disclosing their login credentials
48
What are the authorization models/ access control schemes?
* Role based access control * Rule based access control * Discretionary access control (DAC) * Mandatory Access Control (MAC) * Attribute based access control (ABAC)
49
What is role based access control?
A control scheme that uses roles to grant access by placing users into roles based on their assigned jobs, functions, or tasks ## Footnote example: group based privileges
50
What is rule based access control?
A control scheme based on a set of approved instructions. ## Footnote Some rule-BAC implementations use rules that trigger in response to an event
51
# Acronym and Definition What is DAC?
* Discretionary Access Control * A control scheme where every object has an owner and the owner establishes access for the objects ## Footnote Significantly more flexible than the MAC scheme
52
# Acronym ACL
Action Control List | Also DACL - Discretionary Action Control List
53
# Acronym (Control Schemes) and definition What is MAC?
* Mandatory Access Control * A control scheme that uses labels(sensitivity labels or security labels) to determine access.
54
What is DACL
* Discretionary Access Control List * Identifies who has access and what access they are granted
55
# Acronym and Definition What is ABAC?
* Attribute-Based Access Control * A control scheme that evaluates attributes and grants access to resources based on these attributes ## Footnote Used in software defined networks
56
# Acronym SDN
Software Defined Networks
57
What are the key things you should look out for when reviewing authentication logs
* Account lockouts * Concurrent session usage * Impossible travel time * Blocked content * Resource consumption * Resource inaccessibility * Log Anomalies