Chapter 2 Flashcards
What is Authentication?
Proving identity with credentials such as a username and password
Acronym
AAA
Authentication, Authorization, Accounting
What is authorization?
Providing access to resources based on a proven identity
Accounting Methods
Tracking user activity and recording the activity in logs
What are audit trails used for?
Security professionals use audit trails to recreate the events that preceded a security incident
What are the FOUR factors of authentication
- Something you know
- Something you have
- Something you are
- Somewhere you are
What is the least secure factor of authentication?
Something you know.
Knowledge can be stolen
Give examples of common password requirements
- minimum password length
- password expiration
Acronym
KBA
Knowledge-Based Authentication
What are the two types of KBA and what are they used for?
- Static KBA: Used to verify your identity when you forget your password(i.e. security questions)
- Dynamic KBA: Identifies individuals without an account(uses questions generated from real-time data about the user)
Acronym
PKI
Public Key Infrastructure
What type of attacks do account lockout policies prevent?
Brute force and dictionary attacks
Acronym
CAC
Common Access Card
What is a security key
A small electronic device the size of a remote key for a car that is used to authenticate to systems
Acronym
OTP
One Time Password
Acronym
HOTP
HMAC-based One-Time Password
How do Tokens using the HOTP algorithm stay in sync
Both the authentication server and the token use the algorithm with a shared secret key to generate the next code
Password doesn’t expire until it’s used
Acronym
TOTP
Time-based One Time Password
expire after a specified period of time
What is the strongest individual authentication factor?
Something you are (biometrics)
The strongest of the biometric methods are Iris and retina scans
What is the biometric efficacy rate?
The performance of the system under ideal conditions
Acronym
FAR
False Acceptance Rate
The percentage of times false acceptance occurs
Acronym
FRR
False Rejection Rate
What is false acceptance?
When a biometric system incorrectly identifies an unknown user as a registered user
What is false rejection?
When a biometric system incorrectly rejects a registered user
Acronym
CER
Crossover Error Rate
The point where the FAR crosses over with the FRR. A lower CER indicates that the biometric system is more accurate
Acronym
MAC
- Media Access Control
- Mandatory Access Control
Media Access Control is related to the somewhere you are factor of authentication (think MAC address)
Acronym
PAM
Privileged Access Management
What is Account Management?
Creating, managing, disabling, and terminating accounts.
What are examples of account types?
and credential policies
- Personnel/end-user accounts
- Administrator and root accounts: multifactor authentication
- Service accounts: password should not expire
- Device accounts
What is the main issue with using shared accounts?
Shared accounts prevent effective identification, authentication, authorization and accounting
Acronym
PAM
Privileged Access Management
Implements security controls over accounts with elevated privileges. i.e allowing authorized users to access the admin account without knowing the password, and logging all related activity
Why do account polices require administrators to have two accounts?
To prevent privilege escalation and other attacks
What are just-in-time permissions?
A concept implemented by PAM where administrators don’t have administrative privileges until they need them
What are temporal accounts?
Temporary accounts with administrative privileges that are issued for a limited period of time created by PAM systems
What is deprovisioning?
The process used to disable a user’s account when they leave the organization
What are time-based logins/time-based restrictions
Restrictions that prevent users from logging on or accessing network resources during specific hours
Account audit
identifies the privileges granted to users and compares them against what the users need
What is privilege creep?
occurs when a user is granted more and more privileges due to changing job requirements but unneeded privileges are never removed
a.k.a Permission bloat
What is attestation?
A formal process for reviewing user permissions
Acronym
LDAP
Lightweight Directory Access Protocol
Allows users and applications to retrieve information about users from the organization’s directory
Acronym
SAML
Security Assertion Markup Language
an XML based standard used to exchange authentication and authorization information between different parties. Provides SSO for web based applications
Acronym
XML
Extensible Markup Language
Acronym
IdP
Identity Provider
Creates, maintains, and manages identity information, authentication, and authorization for principals
Acronym
SSO
Single Sign on
What is the primary purpose of SSO
The identification and authentication of users
Acronym
OAuth
Open standard for authorization
What does OAuth do?
Allows users to grant one service access to information in another service without disclosing their login credentials
What are the authorization models/ access control schemes?
- Role based access control
- Rule based access control
- Discretionary access control (DAC)
- Mandatory Access Control (MAC)
- Attribute based access control (ABAC)
What is role based access control?
A control scheme that uses roles to grant access by placing users into roles based on their assigned jobs, functions, or tasks
example: group based privileges
What is rule based access control?
A control scheme based on a set of approved instructions.
Some rule-BAC implementations use rules that trigger in response to an event
Acronym and Definition
What is DAC?
- Discretionary Access Control
- A control scheme where every object has an owner and the owner establishes access for the objects
Significantly more flexible than the MAC scheme
Acronym
ACL
Action Control List
Also DACL - Discretionary Action Control List
Acronym (Control Schemes) and definition
What is MAC?
- Mandatory Access Control
- A control scheme that uses labels(sensitivity labels or security labels) to determine access.
What is DACL
- Discretionary Access Control List
- Identifies who has access and what access they are granted
Acronym and Definition
What is ABAC?
- Attribute-Based Access Control
- A control scheme that evaluates attributes and grants access to resources based on these attributes
Used in software defined networks
Acronym
SDN
Software Defined Networks
What are the key things you should look out for when reviewing authentication logs
- Account lockouts
- Concurrent session usage
- Impossible travel time
- Blocked content
- Resource consumption
- Resource inaccessibility
- Log Anomalies