Chapter 2 Flashcards

1
Q

What is Authentication?

A

Proving identity with credentials such as a username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acronym

AAA

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is authorization?

A

Providing access to resources based on a proven identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting Methods

A

Tracking user activity and recording the activity in logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are audit trails used for?

A

Security professionals use audit trails to recreate the events that preceded a security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the FOUR factors of authentication

A
  1. Something you know
  2. Something you have
  3. Something you are
  4. Somewhere you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the least secure factor of authentication?

A

Something you know.

Knowledge can be stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give examples of common password requirements

A
  • minimum password length
  • password expiration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acronym

KBA

A

Knowledge-Based Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of KBA and what are they used for?

A
  1. Static KBA: Used to verify your identity when you forget your password(i.e. security questions)
  2. Dynamic KBA: Identifies individuals without an account(uses questions generated from real-time data about the user)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Acronym

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of attacks do account lockout policies prevent?

A

Brute force and dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Acronym

CAC

A

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a security key

A

A small electronic device the size of a remote key for a car that is used to authenticate to systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acronym

OTP

A

One Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Acronym

HOTP

A

HMAC-based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do Tokens using the HOTP algorithm stay in sync

A

Both the authentication server and the token use the algorithm with a shared secret key to generate the next code

Password doesn’t expire until it’s used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Acronym

TOTP

A

Time-based One Time Password

expire after a specified period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the strongest individual authentication factor?

A

Something you are (biometrics)

The strongest of the biometric methods are Iris and retina scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the biometric efficacy rate?

A

The performance of the system under ideal conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Acronym

FAR

A

False Acceptance Rate

The percentage of times false acceptance occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Acronym

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is false acceptance?

A

When a biometric system incorrectly identifies an unknown user as a registered user

24
Q

What is false rejection?

A

When a biometric system incorrectly rejects a registered user

25
Q

Acronym

CER

A

Crossover Error Rate

The point where the FAR crosses over with the FRR. A lower CER indicates that the biometric system is more accurate

26
Q

Acronym

MAC

A
  1. Media Access Control
  2. Mandatory Access Control

Media Access Control is related to the somewhere you are factor of authentication (think MAC address)

27
Q

Acronym

PAM

A

Privileged Access Management

28
Q

What is Account Management?

A

Creating, managing, disabling, and terminating accounts.

29
Q

What are examples of account types?

and credential policies

A
  • Personnel/end-user accounts
  • Administrator and root accounts: multifactor authentication
  • Service accounts: password should not expire
  • Device accounts
30
Q

What is the main issue with using shared accounts?

A

Shared accounts prevent effective identification, authentication, authorization and accounting

31
Q

Acronym

PAM

A

Privileged Access Management

Implements security controls over accounts with elevated privileges. i.e allowing authorized users to access the admin account without knowing the password, and logging all related activity

32
Q

Why do account polices require administrators to have two accounts?

A

To prevent privilege escalation and other attacks

33
Q

What are just-in-time permissions?

A

A concept implemented by PAM where administrators don’t have administrative privileges until they need them

34
Q

What are temporal accounts?

A

Temporary accounts with administrative privileges that are issued for a limited period of time created by PAM systems

35
Q

What is deprovisioning?

A

The process used to disable a user’s account when they leave the organization

36
Q

What are time-based logins/time-based restrictions

A

Restrictions that prevent users from logging on or accessing network resources during specific hours

37
Q

Account audit

A

identifies the privileges granted to users and compares them against what the users need

38
Q

What is privilege creep?

A

occurs when a user is granted more and more privileges due to changing job requirements but unneeded privileges are never removed

a.k.a Permission bloat

39
Q

What is attestation?

A

A formal process for reviewing user permissions

40
Q

Acronym

LDAP

A

Lightweight Directory Access Protocol

Allows users and applications to retrieve information about users from the organization’s directory

41
Q

Acronym

SAML

A

Security Assertion Markup Language

an XML based standard used to exchange authentication and authorization information between different parties. Provides SSO for web based applications

42
Q

Acronym

XML

A

Extensible Markup Language

43
Q

Acronym

IdP

A

Identity Provider

Creates, maintains, and manages identity information, authentication, and authorization for principals

44
Q

Acronym

SSO

A

Single Sign on

45
Q

What is the primary purpose of SSO

A

The identification and authentication of users

46
Q

Acronym

OAuth

A

Open standard for authorization

47
Q

What does OAuth do?

A

Allows users to grant one service access to information in another service without disclosing their login credentials

48
Q

What are the authorization models/ access control schemes?

A
  • Role based access control
  • Rule based access control
  • Discretionary access control (DAC)
  • Mandatory Access Control (MAC)
  • Attribute based access control (ABAC)
49
Q

What is role based access control?

A

A control scheme that uses roles to grant access by placing users into roles based on their assigned jobs, functions, or tasks

example: group based privileges

50
Q

What is rule based access control?

A

A control scheme based on a set of approved instructions.

Some rule-BAC implementations use rules that trigger in response to an event

51
Q

Acronym and Definition

What is DAC?

A
  • Discretionary Access Control
  • A control scheme where every object has an owner and the owner establishes access for the objects

Significantly more flexible than the MAC scheme

52
Q

Acronym

ACL

A

Action Control List

Also DACL - Discretionary Action Control List

53
Q

Acronym (Control Schemes) and definition

What is MAC?

A
  • Mandatory Access Control
  • A control scheme that uses labels(sensitivity labels or security labels) to determine access.
54
Q

What is DACL

A
  • Discretionary Access Control List
  • Identifies who has access and what access they are granted
55
Q

Acronym and Definition

What is ABAC?

A
  • Attribute-Based Access Control
  • A control scheme that evaluates attributes and grants access to resources based on these attributes

Used in software defined networks

56
Q

Acronym

SDN

A

Software Defined Networks

57
Q

What are the key things you should look out for when reviewing authentication logs

A
  • Account lockouts
  • Concurrent session usage
  • Impossible travel time
  • Blocked content
  • Resource consumption
  • Resource inaccessibility
  • Log Anomalies