Chapter 2 - Identity & Access Management Flashcards
Identification
Occurs when users claim or profess their identity with identifiers such as usernames or email addresses
Authentication
Proves an identity with some type of credentials such as a username and password.
AAA
Authentication, authorization and accounting work together with identification to provide a comprehensive access management system.
- Authorization: if users can provide their identitiy, they are not automatically granted access to all resources within a system. Instead, they are granted authorization to access resources based on their proven identity
- Accounting methods track user activity and record it in activity logs, enabling admins to be able to create an audit trail
Password keys
Used to reset passwords on a system. Often a bootable optical disc or bootable USB flash drive. After rebooting the system to the device they allow you to recover or reset all user and administrator passwords.
KBA
Knowledge-Based-Authentication can be used to prove the identity of individuals.
- Static KBA: typically used to verify your identity when you have forgotten your password, ie. being prompted to answer questions you previously did when registering such as your mother’s maiden name.
- Dynamic KBA: identifies individuals without an account, often used for high-risk transactions such as with a financial institution or healthcare company. The site queries public and private data sources, such as credit reports or third party organizations, then crafts multiple choice questions only the user would know and often includes a “none of these apply” answer.
Smart card
Credit-card sized cards that have an embedded microchip and certificate and uses certificate-based authentication to satisfy the “something you have” authentication, often used in 2FA.
They use embedded certificates with digital signatured and encryption.
Certificates
Digital files that support cryptography for increased security.
-Embedded certificate holds a user’s private key (which is only accessible to the user) and is matched with a public key (that is publicly available to others). The private key is used each time the user logs on to a network.
PKI supports issuing and managing certificates
Token key
Also called a key fob or a token, it’s an electronic device the size of a remote key of a car that includes an LCD (liquid crystal display) that displays a number, which changes periodically, such as every 60 seconds. They are sometimes called hardware tokens to differentiate them from software tokens.
The token is synced to a server that knows what the number is at any moment. It’s a one-time use, rolling password. Users often use tokens to authenticate via a website.
HMAC
Hash-based Message Authentication Code uses a hash function and cryptographic key for manty different cryptographic functions.
HOTP
HMAC-based One-Time Password is an open source standard used for creating one-time passwords, similar to those used in tokens or key fobs, using a secret key, incremental timer and HMAC to create a hash of the result, resulting in a HOTP value of six to eight digits.
*NOTE: a password created with HOTP remains valid until it is used and thus remains usable forever potentially if never used.
TOTP
Time-based One-Time Password is similar to HOTP but uses a timestamp instead of a counter to expire after 30 seconds or whenever you choose. Also open source.
Hardware tokens that use the HOTP and TOTP standards are very inexpensive compared to ones using proprietary algorithms.
SMS
Short Message Service, can be used to send a PIN for 2FA.
Push notifications can similarly be enabled for 2FA so users don’t need to re-enter data/remember a password, just press “allow” or similar, making it user friendly.
FAR
False Acceptance Rate, in regards to the efficacy rate of user identification/authorization.
Alt: True Acceptance
FRR
False Rejection Rate, in regards to the efficacy rate of user identification/authorization.
Alt: True Rejection
CER
Crossover Error Rate, referring to the point with the FRR crosses over with the FAR. A lower CER indicates a biometric system is more accurate.
Biometric systems allow you to adjust the sensitivity or threshold level where errors occur. Increasing sensitivity decreases the number of false matches and increasing the number of false rejections, and vice versa.