Chapter 4 Flashcards

1
Q

Identification

A

the process of verifying a user’s identity before they can access a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

The process of verifying a user’s identity before granting them access to a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

The process of determining whether a verified user has the necessary permissions to assess a specific resource or perform an action within a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multifactor Authentication (MFA)

A

Using more than one factor of authentication

Factors
-Something you do - your signature

  • Something you exhibit - typing speed
  • Someone you know - certificate that’s coming from a server like VeriSign
  • Somewhere you are - Physical location thing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identification and AAA

A
  • Identification
  • Authentication
  • Authorization
  • Accounting - auditing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A
  • Based on permissions granted
  • Determines resource permissions
    • targets that have permissions applied to them
    • example: files, database rows, web app
  • Can only occur after authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accounting/auditing

A

Track permissions usage for accountability purposes.
Who or what accessed which resource, how long, on what date?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accounting

A

often called auditing, tracking activity, must have separate user accounts for each user.

types of accounting
- Resource access
- Failed logon attempts
- Changes to files/database records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication Methods

A

Password vaults
- Also called “password managers”
- Examples: LastPass, cloud-based vaults to store password keys
- A master key protects the vault - don’t forget it!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One-Time Password (OTP)

A

Unique password (code) generated for single us
- static code sent via e-mail or SMS text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software notification methods (push notification)

A
  • Phone call
  • Short message service (SMS) text.
  • E-mail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HMAC-based one-time password (HOTP)

A

HMAC encrypts a hash to ensure authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Time-based OTP (TOTP)

A
  • code is only valid for a short period of time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Certificate-based Authentication

A

PKI certificates are issued by a trusted authority to an individual entity
- Device, VPN, app access
- Can be stored on a smart card
- Called a Personal Identity Verification (PIV) card
- Common access card (CAC) can authenticate to everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSH Public Key Authentication

A

Sign in with username and password (passphrase) as well as a private key.

Public key stored on server.

Private key stored on admin device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Biometrics

A
  • Fingerprints
  • Retina
  • Iris
  • Facial
  • Voice
  • Vein
  • Gait analysis
17
Q

Efficacy rates

A
  • False acceptance
  • False rejection
  • Crossover error rate
18
Q

Access Control Schemes

A

Credential Policies - Defines who gets access.
- Employees
- Contractors
- Devices
- Service accounts
- Administrator/root accounts
- Privileged Access Management (PAM)

19
Q

Attribute-Based Access Control (ABAC)

A

uses attributes to determine permissions
- Example: date of birth or device type