Chapter 4 Flashcards
Access Control
allowing the correct users onto the system.
131
Identification versus Authentication
Authentication is a step beyond identification. It requires verifying who that person is… for example a login and a password.
131
5 Factors of authentication
Something you know (PIN, password, etc)
Something you have (smart card, token, etc)
Something you are (biometrics)
Something you do (finger pattern in phone)
Somewhere you are (in the correct country)
Mutual Authentication
When two or more parties authenticate each other
Layered Security vs Defense in Depth
They’re the same thing!
it means don’t rely to heavily on one form of authentication. Instead implement multiple layers of security. IE Multiple locked doors to get to the server
133
Operational Security
How an organization achieves its goals. Includes network access control, authentication, and security topologies after the network installation is complete
134
Security Tokens
ID and authenticate a user. They contain certain rights and access priviledges of the token bearer.
in other words a small piece of data that holds info about the user
Federation
A collection of computer networks that agree on standards of operation including security standards.
Outside of computers: Dominos and papa johns both let you order online and deliver the pizza to you
135
Federated Identity
Linking a user’s ID with their privileges in a manner that can be used across business boundaries
135
Transitive Access
If A = B and B = C then A = C
Basically one group trusts you because another group that they trust trusts you.
It’s easier but all of this trusting makes the trusters suceptable to hacking
136
PAP
Password Authentication Protocol
Sends the username and password to the authentication server in plain text
139
SPAP
Shiva Password Authentication Protocol
Replaced PAP. Encrypts the username and password
139
CHAP
Challenge Handshake Authentication Protocol
designed to stop man-in-the-middle attacks. During the initial authentication, the connecting machine is asked to generate a random number (usually a hash) and send it to the server
139
TOTP
Time-Based One-Time Password
algorithm uses a time-based factor to create unique passwords
139
HOTP
HMAC-Based One-Time Password
algorithm based on using a Hash Message Authentication Code algorithm.
139