Chapter 2 Flashcards
AAA
Authentication, authorization, and accounting
Authorization
Authentication occurs when the user proves the claimed identity (such as with a password) and the credentials are verified (such as with a password). Users are granted authorization to access resources based on their proven identity. This can be as simple as granting a user permission to read data in a shared folder. Access control systems include multiple security controls to ensure that users can access resources they’re authorized to use, but no more.
Accounting
Accounting methods track user activity and record the activity in logs. For example, audit logs track activity, and administrators use these to create an audit trail. An audit trail allows security professionals to re-create the events that preceded a security incident.
audit trail
Audit trail track user activity and record the activity in logs. For example, audit logs track activity, and administrators use these to create an audit trail. An audit trail allows security professionals to re-create the events that preceded a security incident.
Identification
Identification occurs when a user claims an identity, such as with a username or email address.
The four authentication factors
Something you know, such as a password or personal identification number (PIN)
Something you have, such as a smart card, a phone, or a USB token
Something you are, such as a fingerprint or other biometric identification
Somewhere you are, such as your home or office
somewhere you are
The reason is that location is not really a strong authentication factor by itself. For example, would you trust the fact that someone is located in your home as proof that they are you? Of course not! Location-based authentication is not normally used by itself and is instead treated as an added assurance when combined with one or more of the other three factors.
Something You Know
The something you know authentication factor typically refers to a shared secret, such as a password or a PIN. This factor is the least secure form of authentication because knowledge can be stolen. If I can find out someone’s password, I can use it to impersonate them.
Complex passwords
Complex passwords use a mix of character types. Strong passwords use a mix of character types and have a minimum password length of at least eight characters. A password expiration identifies when a password must be changed.
password history
A password history system remembers past passwords and prevents users from reusing them. It’s common for password policy settings to remember the last 24 passwords and prevent users from reusing them until they’ve used 24 new passwords.
When using password history, it’s common to also use the minimum password age setting. Imagine this is set to 1 day, and the password history is set to 24. After users change their password, they can’t change it again until a day has passed. It’ll take them 24 days of changing their password every day before they can reuse the original password. Otherwise, a crafty user who was determined to keep the same password could just immediately change their password 24 times and then return it to the original password once that password is cleared out of the history!
Password Managers
A password manager (or password vault) is a single source designed to keep most of your passwords. Instead of requiring you to memorize many different passwords, you only need to remember the password to open the vault. It keeps these passwords in an encrypted format, preventing unauthorized users from seeing them.
For example, Google Chrome includes a password manager built into the browser. Once you log in to Google and enter a username and password at another site, Chrome will ask if you want to save it. Click Save, and Chrome will store your credentials for you. The next time you go to the same site, Chrome will automatically fill in the credentials. Chrome allows you to sync your passwords across multiple devices, too. When you enable this option, your passwords are stored with your Google account. After launching Chrome and logging onto Google, you’ll have access to all your passwords stored with your account.
Knowledge-Based Authentication
There are two types: static KBA and dynamic KBA.
Static KBA is typically used to verify your identity when you’ve forgotten your password. After creating your account (or when you create your account), you’re prompted to answer questions about yourself, such as your first dog’s name or your mother’s maiden name. Later, when you try to retrieve a forgotten password, you’re first prompted to answer the same questions.
Dynamic KBA Dynamic KBA identifies individuals without an account. Organizations use this for high-risk transactions, such as with a financial institution or a healthcare company. The site queries public and private data sources like credit reports, vehicle registrations, and property records. It then crafts multiple-choice questions that only the user would know and often includes an answer similar to “none of these apply.” Some examples are: At which of the following addresses have you lived? Which of the following amounts is closest to your mortgage payment? When was your home built?
Users typically have a limited amount of time to answer these questions. This limits the amount of time an attacker can do searches on the Internet to identify accurate answers.
KBA
knowledge-based authentication
identity proofing.
Knowledge-based authentication may also be used to help confirm a new user’s identity when they are creating an account for the first time. This process is known as identity proofing. Identity proofing is an important step in the provisioning process that creates accounts for new users as they join the organization.
Implementing Account Lockout Policies
Accounts will typically have lockout policies preventing users from guessing the password. If a user enters the wrong password too many times (such as three or five times), the system locks the user’s account. Two key phrases associated
with account lockout policies on Microsoft systems are:
Account lockout threshold. This is the maximum number of times a user can enter the wrong password. When the user exceeds the threshold, the system locks the account.
Account lockout duration. This indicates how long an account remains locked. It could be set to 30, indicating that the system will lock the account for 30 minutes. After 30 minutes, the system automatically unlocks the account. If the duration is set to 0, the account remains locked until an administrator unlocks it.
Account lockout policies thwart some password attacks, such as brute force attacks and dictionary attacks.
default passwords.
These should be changed before putting the application or device into service. Changing defaults also includes changing the default name of the Administrator account, if possible.
something you have
The something you have authentication factor refers to something you can physically hold. This section covers many of the common items in this factor, including smart cards, security keys, software tokens, and hardware tokens. It also covers two open-source protocols used with both hardware and software tokens.
Smart Card Authentication
Smart cards are credit card-sized cards that have an embedded microchip and a certificate. Users insert the smart card into a smart card reader, similar to how someone would insert a credit card into a credit card reader. The smart card reader reads the card’s information, including the details from the embedded digital certificate, which provides certificate-based authentication.
Embedded certificate. The embedded certificate holds a user’s private key (which is only accessible to the user) and is matched with a public key (that is publicly available to others). The private key is used each time the user logs on to a network.
Public Key Infrastructure (PKI). the PKI supports issuing and managing certificates.
Smart cards are often used with two-factor authentication where users have something (the smart card)
and know something (such as a password or PIN). Smart cards include embedded certificates used with digital signatures and encryption. They are used to gain access to secure locations and to log on to computer systems.
PKI
Public Key Infrastructure. the PKI supports issuing and managing certificates. Part of Smart Card Authentication
Embedded certificate.
Smart card component . Embedded certificate. The embedded certificate holds a user’s private key (which is only accessible to the user) and is matched with a public key (that is publicly available to others). The private key is used each time the user logs on to a network.
security key
A security key is an electronic device about the size of a remote key for a car. You can easily carry one in your pocket or purse or connect it to your key chain. The security key is used to authenticate to systems.
The security key contains cryptographic information that completes the authentication process. In this case, the token has a USB connector or wireless interface to connect to your computer or phone.
Hard Tokens
A hard token (or hardware token) is an electronic device about the size of a remote key for a car. You can easily carry one in your pocket or purse or connect it to your key chain. The token is used to authenticate to systems. The token includes a liquid crystal display (LCD) that displays a number on the screen, such as the one shown in Figure 2.3. This number is known as a one-time password (OTP) and the user provides it to the authentication server to prove that they currently have possession of the token.
OTP
One tine password
Soft Tokens
A soft token (or software token) is an application that runs on a user’s smartphone and generates one-time passwords in the same way that hardware tokens display them on their LCD screen.