Chapter 2: Authentication and Authorization Flashcards
Understand the Security Concepts of Information Assurance
What are the three steps to access control?
- Identification
- Authentication
- Authorization
Access Control Process
During the first step of the process, {BLANK}, an individual makes a claim about their identity.
Identification
Together, the activities performed ny an access control system are referred to as AAA, or “triple-A”.
What does the three A’s stand for?
Authentication, authorization, and accounting
Access Control Process
During the {BLANK} step, the individual proves thair identity to the satisfaction of the access control system.
Authentication
Access Control Process
The access control system also needs to be satisifed that you are allowed to access the system. This is the third step of the process called {BLANK}.
Authorization
Access Control Process
In addition to indentication, authentication, and authorization, access control systems also provide an {BLANK} functioanlity that allows administrators to track user activity and reconstruct it from logs.
Accounting
In the electronic world, authorization often takes the form of {BLANK} that itemize the specific file system permissions granted to an individual user or a group of users.
Access Control Lists
The simplest and most common control on passwords is setting the {BLANK}.
password length
Organizations may also set {BLANK} requirements. These requirements force users to include different types of characters in their passwords, such as uppercase and lowercase, digits, and special characters.
password complexity
{BLANK} requiremts force users to change their passwors periodically.
password expiration
{BLANK} requirements are designed to prevent users from reusing old passwords.
password history
What are the three authentication factors?
- Something you know
- Something you are
- Something you have
Authentication Factors
What is considersomething you know?
Passwords, Personal Identification Numbers (PINs), and answers to security questions.
Authentication Factors
What is considersomething you are?
Fingerprint, eye pattern, face, or voice.
{BLANK} authentication techniques measure one of your physical characteristics.
Biometric