Chapter 3 - Access Control Flashcards
Access
The flow of information between subject and object
Access control
Used to restricted access and for authentication of access and ensures AIC on the data
Subject
The requesting entity of an object
Object
A passive entity that holds information
Identification
Proving someone is who they say they are
Authentication
A second piece to the credential set
Authorization
Being granted access based on your authenticated identity
Accountability
Now that you have been authorized, you are now responsible
Logical access controls
Boolean operator controls, if authorized than access
Race Condition
Running authorization independent of authentication
Process 1 then 2
Hacker just runs two
What are the factors of authentication?
Something a person knows, has, or is
Verification ratio
Used to see how many people are authenticated by the same token
Auth by knowledge
A password, a pin, a combination
Auth by ownership
Key, badge, access card
Auth by characteristic
Biometrics
Strong auth
2 factor auth
Mutual auth
This is when each side authenticates the other
IdM
Identity management - controlling identitity in an environment for accountability
IDM meta directories
A virtual directory to aggregate identity data stored from HR/SQL/AD etc
This is primarily useful for non-ldap integrated systems
What makes up X.500?
Directory structure standard
Must have a parent child tree
Each entry unique
Attributes defined in schema
Unique IDS called distinguished names
Virtual directory
Similar to meta directories except it doesn’t know the answer .. It points to one
WAM
Web access management
Web server receives auth req
Web server gets access approval
Sends back a session cookie
Browser used cookie in further security context
Cookie
Browser side data storage
Permanent- stored on the hard drive for later usage and access
Session- temporary token stored in memory for use with session state
Single sign on
Sign in once, as long as you use the cookie the server just sent to authenticate you are allowed
Password synchronization
Reduces number of passwords known by changing the multiple systems to the same password
Self-service password reset
Reduces help desk volume by allowing users to reset own password, or security questions and a click the link email
Assisted password reset
Two person password reset, ie. an authenticated help desk person changes it to changemenow and then the user is forced to reset that
What is an example of a bad security question ?
What is your mothers maiden name?
This is public information
Single sign on
One authentication to rule them all!
Account management
Automated construction and destruction of accounts on all necessary systems
Authoritative source
The location of a record where it was written
Identity repository
The centralized location of information regarding accounts
Authoritative system of record
A hierarchy that tracks changes to an environment
User provisioning
From hired to fired what happens to your account
Self-service
Users can change their own information
Federated
If you trust that guy, send me his authenticated session
Digital identity
Made of
Attributes
Entitlements
Traits
Federated identity
This is the authenticated token being passed around
Web portal
A site that contains multiple website feeds
Yahoo
Msn
Portlet
This is an individual module that displays website information on a web portal
XML
Extensible markup language
Used to standardize a way of communicating between platforms
SPML
Service provisioning markup language
Request authority
Provisioning service provider
Provisioning service target
SAML
Security assertion markup language
Used for passing authentication in a unified format
Web services
This is any site that provides a service
SOAP
Simple object access protocol
A means to transmit markup language
XACML
Extensible access control markup language
Used to communicate acl between services
Extensible
Means standardized really
OASIS
Organization keeping all the XML standards
What makes XML standards different?
The schema